HIPAA Compliance for Microsoft Azure: BAA, Covered Services, and Setup Guide
Successfully handling Protected Health Information (PHI) in the cloud requires more than turning on encryption. This guide explains how HIPAA compliance for Microsoft Azure works, how Microsoft’s Business Associate Agreement (BAA) applies to HIPAA-Eligible Services, and how to implement, validate, and document the Administrative and Technical Safeguards you need.
Understanding the Business Associate Agreement
What a BAA is and why it matters
A Business Associate Agreement is a contract required by HIPAA when a vendor creates, receives, maintains, or transmits PHI on your behalf. In Azure, Microsoft acts as a business associate for specific cloud services, and the BAA sets expectations for safeguarding PHI, breach notification, permitted uses and disclosures, subcontractor obligations, and termination and data return/deletion.
How the BAA applies to Azure
The BAA applies only to Azure services designated as HIPAA-Eligible Services (also called “covered services”). You are responsible for using those services appropriately and configuring them to meet HIPAA requirements. Using a non-covered service for PHI places compliance at risk because the BAA does not extend to that workload.
Action steps
- Identify where PHI will be stored, processed, or transmitted in Azure.
- Confirm each service in the architecture is HIPAA-eligible and in-scope under Microsoft’s BAA.
- Document how you will meet Administrative Safeguards (policies, risk analysis, workforce training) and Technical Safeguards (access control, audit, integrity, transmission security).
Identifying HIPAA-Eligible Azure Services
Verification workflow
- Check Microsoft’s published list of HIPAA-Eligible Services and note the exact product names and any prerequisites or exclusions.
- Validate eligibility again during design changes—eligibility can evolve as services are updated or renamed.
- Limit PHI strictly to covered services; use data loss prevention and tagging to prevent sprawl to non-covered services.
Design tips
- Prefer platform services with built-in encryption at rest and in transit.
- Use private connectivity (Private Link, VNets, firewalls) to minimize public exposure.
- Centralize keys and secrets in Azure Key Vault and control access via least privilege.
Implementing Security Controls in Azure
Administrative Safeguards
- Risk analysis and risk management: inventory assets, map data flows for PHI, and maintain a living risk register with owners and remediation timelines.
- Workforce security: train users on PHI handling, acceptable use, and incident reporting; require periodic access reviews.
- Contingency planning: implement backup, restoration testing, and disaster recovery for systems that store or process PHI.
- Vendor management: obtain BAAs from downstream service providers that touch PHI.
Technical Safeguards
- Access control: enforce multifactor authentication, just-in-time elevation (PIM), and least-privilege role assignments; segment admin from user roles.
- Audit controls: enable Azure Monitor, Activity Logs, and resource diagnostics; centralize logs in Log Analytics and monitor with Microsoft Sentinel.
- Integrity controls: use hashing, immutability features (e.g., storage versioning/immutable blobs) and secure change management for infrastructure as code.
- Transmission security: require TLS for all endpoints; use private endpoints and VPN/ExpressRoute for sensitive flows.
- Encryption: ensure encryption at rest is enabled (server-side encryption, TDE for databases, disk encryption) and manage customer-managed keys when required.
Physical and organizational measures
- Rely on Microsoft’s data center physical safeguards for covered services.
- Implement device and endpoint policies for administrators with access to PHI-bearing systems.
Navigating the Shared Responsibility Model
What Microsoft handles
- Security of the cloud: data center facilities, host infrastructure, and foundational platform controls for covered services.
- Service-level features: built-in encryption capabilities, redundancy options, and platform logging hooks.
What you handle
- Security in the cloud: tenant configuration, identity and access, key management, network controls, and workload hardening.
- Data governance: classifying PHI, restricting where PHI can reside, retention, and sanitization.
- Compliance evidence: policies, procedures, risk assessments, test results, and incident documentation.
Practical mapping
- Designate owners for each control family; create a RACI matrix for identity, networking, data, and logging.
- Automate guardrails so responsibilities are enforced by code, not just policy.
Utilizing Azure Compliance Tools
Compliance Manager
Use Compliance Manager to assess your HIPAA program, track improvement actions, assign owners, and store evidence. Its HIPAA-related assessments help you map Administrative and Technical Safeguards to specific tasks and generate a compliance score to focus remediation.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Azure Policy
- Deploy Azure Policy initiatives mapped to HIPAA/HITRUST requirements to audit or deny noncompliant configurations (for example, missing encryption, public endpoints, or no logging).
- Assign policies at the management group level so all subscriptions that may handle PHI inherit the same guardrails.
- Continuously remediate drift with policy assignments that include automatic fixes where safe.
Defender for Cloud and monitoring
- Enable Defender for Cloud’s regulatory compliance dashboard to surface gaps against HIPAA-aligned controls.
- Ingest platform and resource logs into Log Analytics and build alerts or workbooks tailored to PHI workloads.
Data protection and discovery
- Use Microsoft Purview capabilities to discover, classify, and label data stores that may contain PHI.
- Deploy DLP rules to prevent exfiltration of PHI to non-covered services.
Establishing and Documenting Compliance
Program setup checklist
- Create an Azure landing zone for PHI with dedicated subscriptions, management groups, role boundaries, and resource naming/tagging conventions.
- Define data boundaries: which regions are allowed, which services may store PHI, and required encryption/key-management standards.
- Implement identity standards: MFA, conditional access, PIM, break-glass accounts, and quarterly access reviews.
- Standardize logging: enable diagnostic settings by policy, retain logs for a period aligned to your legal and investigative needs.
- Establish incident response: playbooks, on-call rotations, tabletop exercises, and breach-notification procedures.
Documentation expectations
- Maintain policies and procedures for every HIPAA safeguard area; include version history and approvals.
- Keep an asset and data-flow inventory specifically noting PHI repositories and integrations.
- Record evidence: screenshots of Azure Policy compliance, Defender for Cloud findings, test results, and remediation tickets.
- Store the current BAA/terms version, effective date, and a change log to demonstrate ongoing due diligence.
Reviewing Microsoft Online Services Terms
Where the BAA lives and how to accept it
Microsoft incorporates its HIPAA Business Associate Agreement into the Microsoft Online Services Terms and related data protection documentation. Acceptance typically occurs when you enter a qualifying customer agreement and use covered services; you don’t usually execute a separate BAA. Keep a copy of the current terms and note the effective date for your records.
Staying current
- Recheck the list of HIPAA-Eligible Services during major service or architecture changes.
- Review term updates on a regular cadence and capture evidence of review and acceptance in your compliance repository.
Common pitfalls
- Assuming every Azure feature is covered by the BAA—confirm eligibility before handling PHI.
- Relying on default settings—enforce encryption, private access, and logging via Azure Policy.
- Storing evidence informally—auditors expect organized, versioned documentation.
Conclusion
HIPAA compliance for Microsoft Azure hinges on three practices: use only HIPAA-Eligible Services covered by the Business Associate Agreement, implement Administrative and Technical Safeguards with enforceable guardrails, and maintain clear, current documentation. With Compliance Manager, Azure Policy, and disciplined architecture, you can confidently run PHI workloads in Azure.
FAQs
What is included in Microsoft's Business Associate Agreement?
Microsoft’s BAA defines permitted uses and disclosures of PHI, requires appropriate safeguards, outlines breach-notification obligations, extends obligations to subcontractors, and covers return or deletion of PHI at termination. It applies only to HIPAA-Eligible Services identified as covered; you must configure and operate those services in a compliant manner.
How do I verify which Azure services are HIPAA-eligible?
Confirm eligibility by consulting Microsoft’s published list of HIPAA-Eligible Services and the terms that identify covered services. Revalidate during design changes and restrict PHI strictly to those services. In practice, add guardrails with Azure Policy to prevent resources that are not on your approved, HIPAA-eligible list from being created in PHI environments.
What security controls are required for HIPAA compliance in Azure?
Implement Administrative Safeguards (risk analysis, workforce training, contingency planning, vendor oversight) and Technical Safeguards (access control with MFA and least privilege, audit logging and monitoring, integrity controls, transmission security, and encryption at rest). Use platform capabilities such as Key Vault, private endpoints, Defender for Cloud, Azure Monitor, and Microsoft Sentinel to operationalize these controls.
How does the shared responsibility model affect HIPAA compliance?
Microsoft secures the cloud platform and provides features in covered services, while you secure your tenant and workloads. You decide where PHI resides, configure identity and network controls, manage keys, monitor activity, and maintain documentation and incident response. Compliance results from both parties meeting their responsibilities.
Table of Contents
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.