How to Design a HIPAA‑Compliant Cloud Architecture: Best Practices and Reference Architecture

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

How to Design a HIPAA‑Compliant Cloud Architecture: Best Practices and Reference Architecture

Kevin Henry

HIPAA

March 02, 2026

8 minutes read
Share this article
How to Design a HIPAA‑Compliant Cloud Architecture: Best Practices and Reference Architecture

HIPAA Compliance Requirements

Understand scope and PHI data flows

Begin by identifying where Protected Health Information PHI is created, received, maintained, or transmitted. Map every data flow—including batch transfers, APIs, backups, logs, and analytics—to ensure no pathway escapes control. This scoping step drives every control you put in place.

Administrative, physical, and technical safeguards

HIPAA’s Security Rule is risk based. You must implement policies for workforce training, incident response, business continuity, vendor oversight, and sanctions. On the technical side, enforce access controls, audit controls, integrity protections, transmission security, and contingency planning that align with your risk profile.

Security Risk Assessment and risk management

Conduct a formal Security Risk Assessment at least annually and upon major changes. Document threats, likelihood, and impact, then select controls and compensating measures. Track risks in a living register and prove progress with measurable remediation plans.

BAA, documentation, and minimum necessary

Execute a Business Associate Agreement with your cloud provider and any downstream services that handle PHI. Adopt the “minimum necessary” standard by limiting PHI collection, retention, and internal exposure. Maintain evidence: architectures, SOPs, test records, and audit reports that demonstrate due diligence.

Shared Responsibility Model

What the cloud provider covers

The provider secures the cloud: facilities, hardware, core networking, and managed service baselines. They deliver compliance attestations and platform controls, but those do not automatically secure your workloads. You inherit secure primitives, not finished compliance.

What you must own

You secure what’s in the cloud: configurations, data classification, encryption choices, key management, identity policies, network segmentation, and application code. You also own monitoring, incident response, and proving compliance to auditors with artifacts and Immutable Audit Logs.

Operational guardrails

Codify shared responsibility in policies and infrastructure-as-code. Use preventive controls (service control policies, organization guardrails), detective controls (config rules, drift detection), and responsive controls (auto-remediation). Treat multi-account or multi-project boundaries as isolation domains for PHI.

Data Encryption Practices

Encryption at rest

Encrypt all PHI at rest by default—including object storage, databases, block volumes, caches, and backups. Prefer customer-managed keys with centralized key lifecycles, rotation, revocation, and separation of duties. Use FIPS 140-2 Encryption modules or validated HSM-backed services to meet rigorous assurance needs.

Encryption in transit

Use TLS 1.2+ everywhere, enforcing modern cipher suites and certificate hygiene. For service-to-service calls inside private networks, add mutual TLS or secure service meshes to authenticate workloads. Terminate TLS only at trusted boundaries and re-encrypt to backend services.

Key management patterns

  • Leverage a cloud KMS with hardware-backed root keys; consider HSM partitions for higher assurance.
  • Apply envelope encryption to reduce operational overhead while maintaining strong key separation.
  • Support BYOK or HYOK when regulatory or customer contracts require external key ownership.
  • Automate rotation, usage logging, and periodic cryptographic hygiene reviews.

Field-level protections and tokenization

For highly sensitive elements—SSNs, diagnosis codes, biometrics—add field-level encryption or tokenization. This minimizes PHI exposure in downstream systems like analytics, support tools, and logs. Combine deterministic encryption with format-preserving options where needed for join operations.

Network Security and Isolation

VPC and subnet design

Place workloads in a dedicated Virtual Private Cloud VPC with clearly separated subnets for web, app, and data tiers. Keep PHI-processing systems on private subnets with no direct inbound internet access. Use egress allow lists and NAT or private service endpoints to restrict outbound paths.

Segmentation and zero trust

Segment by environment (prod, staging, dev) and by data domain to contain blast radius. Apply security groups and network ACLs with default‑deny policies and explicit, least-privilege rules. Layer zero-trust principles: strong identity, continuous verification, and context-aware access to services.

Perimeter and edge protections

  • Front public endpoints with a managed WAF and DDoS protection, enforcing TLS and request validation.
  • Use private service endpoints and peering for cloud-native services to avoid traversing the public internet.
  • Inspect traffic with IDS/IPS where appropriate, and log flow records for forensics and capacity planning.

Resilience and recovery

Design for failure with multi-AZ deployment and well-tested backup and restore. Encrypt backups and replicas, and protect snapshots with immutable or write-once retention. Regularly run restore drills to prove RTO/RPO for PHI systems.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Identity and Access Management

Strong authentication and federation

Centralize identities via SSO and enforce Multi-Factor Authentication MFA for all privileged and PHI-accessing accounts. Prefer phishing-resistant factors where possible. Disable long‑lived static credentials and audit root or owner accounts with extra scrutiny.

Least privilege and fine-grained policy

Grant access by role and attribute (RBAC/ABAC) with scoped permissions to specific resources and actions. Use short session durations and just‑in‑time elevation with approvals and logging. Separate duties for development, operations, security, and key custodians.

Service identities and secrets

Issue workload identities to applications and automation, rotating credentials automatically. Store secrets in a dedicated secrets manager with access policies and audit trails. Avoid embedding secrets in images, code, or environment variables that reach shared systems.

Access reviews and lifecycle

Automate provisioning and deprovisioning tied to HR events, including contractors and vendors. Run periodic access reviews for high‑risk roles and PHI data sets. Capture approvals and changes in Immutable Audit Logs for auditor transparency.

Logging Monitoring and Audit Trails

Centralized, immutable, and comprehensive

Aggregate platform, network, application, database, and KMS logs into a central, access‑controlled repository. Enable Immutable Audit Logs using write-once storage, versioning, or cryptographic sealing to prevent tampering. Time-synchronize sources to support reliable event correlation.

Protecting logs from PHI spill

Prevent PHI from entering logs with strict redaction, tokenization, and schema validation. Gate debug modes and sampling in production. Limit who can query sensitive logs and monitor for anomalous access patterns.

Detection and response

Stream logs to a SIEM for rules, baselines, and threat intelligence. Alert on high-risk events such as denied access to PHI stores, KMS key misuse, configuration drift, and data egress anomalies. Tie detections to a tested incident response plan with clear containment steps.

Retention and evidence

Define retention to satisfy legal and business needs, then enforce it with lifecycle policies. Maintain dashboards and reports that map events to HIPAA control objectives. During audits, produce chain‑of‑custody evidence, investigator access records, and remediation notes.

Reference Architectures and Frameworks

NIST Cloud Computing Reference Architecture alignment

Use the NIST Cloud Computing Reference Architecture to clarify actors (consumer, provider, broker, auditor, carrier) and responsibilities. Map your services to these roles to expose gaps in governance, monitoring, and data stewardship for PHI.

Baseline HIPAA-compliant cloud blueprint

  • Foundation: multi-account structure with guardrails, centralized identity, logging, and KMS/HSM.
  • Network: dedicated VPCs per environment, private subnets, VPC endpoints, transit routing, and default-deny policies.
  • Ingress: managed load balancer with TLS 1.2+, WAF, DDoS protection, and strict request filtering.
  • Compute: container or serverless runtime with least-privilege roles, image signing, and runtime controls.
  • Data: encrypted databases, object storage with bucket policies, field-level encryption for sensitive elements, and tokenization for analytics.
  • Observability: central SIEM, metrics, traces, and Immutable Audit Logs with WORM retention.
  • Operations: IaC pipelines, policy-as-code, continuous compliance checks, and automated drift remediation.

Data and analytics with PHI

Segregate raw, curated, and analytics zones with progressively stricter controls. Use pseudonymization or tokenization before moving data into shared analytics platforms. Enforce query-level access controls and differential privacy techniques where feasible.

Resiliency, backup, and disaster recovery

Encrypt backups with customer-managed keys and test restoration regularly. Use cross‑region replication for critical PHI workloads with failover runbooks. Validate that DR environments inherit the same IAM, network, and logging controls as production.

Change management and continuous compliance

Manage all infrastructure with code, peer reviews, and automated tests. Continuously evaluate configurations against HIPAA-aligned benchmarks and your Security Risk Assessment. Treat every deviation as a ticket with owner, due date, and evidence of closure.

Conclusion

Designing a HIPAA‑compliant cloud architecture means aligning shared responsibilities, encrypting PHI everywhere, isolating networks, enforcing strong IAM, and maintaining verifiable, Immutable Audit Logs. Ground decisions in a recurring Security Risk Assessment and structure your stack with a NIST Cloud Computing Reference Architecture lens. With these practices, you can scale securely while demonstrating compliance with clarity and evidence.

FAQs

What are the key HIPAA requirements for cloud architecture?

You need administrative, physical, and technical safeguards tailored by a documented Security Risk Assessment. Practically, that means least‑privilege access, encryption for PHI at rest and in transit, continuous monitoring with Immutable Audit Logs, tested incident response, and a signed BAA with every service that touches PHI.

How does the shared responsibility model affect HIPAA compliance?

The provider secures the cloud infrastructure, while you secure your data, identities, configurations, and application code. Compliance evidence—access policies, encryption settings, monitoring, and response procedures—remains your responsibility, even when using managed services.

What encryption standards are mandatory for PHI in the cloud?

HIPAA does not mandate specific algorithms; it requires risk‑appropriate protections and treats encryption as an addressable safeguard. In practice, use TLS 1.2+ for data in transit and employ FIPS 140-2 Encryption modules or validated HSM/KMS for data at rest, with customer‑managed keys, rotation, and strong key access controls.

How can logging and monitoring support HIPAA audits?

Centralized, Immutable Audit Logs create a trustworthy record of access, configuration changes, and security events. Combined with a SIEM, alerts, and retention policies, they let you reconstruct incidents, prove least privilege, and demonstrate continuous compliance with auditor-ready evidence.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles