Is Cloudflare HIPAA Compliant? BAA, Covered Services, and Best Practices
Cloudflare can form part of a HIPAA-compliant architecture when you execute a Business Associate Agreement, confine Protected Health Information to covered services, and implement strong administrative, physical, and technical safeguards. The guidance below explains how to make your Cloudflare deployment align with HIPAA requirements while protecting Electronic Protected Health Information (ePHI).
HIPAA Compliance Requirements for Cloudflare
What HIPAA expects of a Cloudflare deployment
- Execute a Business Associate Agreement before transmitting or processing ePHI through Cloudflare.
- Limit ePHI to the specific covered services identified in your agreement and order form.
- Apply Data Encryption in transit and at rest, enforce least privilege, and use Multi-Factor Authentication for administrative access.
- Run a formal Risk Assessment that includes Cloudflare’s role, data flows, and residual risks.
- Enable logging and auditing without capturing ePHI in URLs, headers, or query strings; set prudent retention and access controls.
- Define Breach Notification Procedures and an incident response runbook that incorporates vendor coordination.
Responsibilities division
Cloudflare provides security capabilities (for example, TLS termination, WAF, DDoS protection, and access controls). You determine whether ePHI traverses Cloudflare, configure features to minimize exposure, and document how the platform fits your HIPAA policies and procedures.
Importance of Business Associate Agreement
A Business Associate Agreement establishes Cloudflare’s obligations when it handles ePHI on your behalf. Without a BAA, you should not send ePHI through the platform. The BAA clarifies permitted uses and disclosures, security measures, subcontractor flow-downs, and Breach Notification Procedures.
What to verify in your BAA
- Covered services and explicit exclusions, including whether any caching, logging, or compute features are in scope.
- Encryption expectations, key management responsibilities, and acceptable cipher standards.
- Access control, audit, and reporting obligations, including log availability and retention.
- Incident handling timelines, notification triggers, cooperation duties, and evidence preservation.
- Data return or destruction on termination and limits on secondary use.
Confirm that your internal policies, vendor inventory, and Risk Assessment reference the executed BAA and align with its terms.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Scope of Covered Cloudflare Services
Only services explicitly listed in your executed BAA and order documentation should process or store ePHI. Treat all other features as out of scope by default. If a capability is not named as covered, avoid routing ePHI through it or re-architect to prevent exposure.
Common inclusions and careful exclusions
- Often included categories may involve core network security and delivery functions (for example, WAF, DDoS protection, traffic acceleration, or DNS). Your agreement governs the specifics.
- Capabilities that store, transform, or expose payload data—such as caching of responses containing ePHI, certain logging or analytics features, or serverless/edge compute with data persistence—are frequently excluded unless the BAA explicitly covers them.
- Design patterns: keep ePHI out of URLs and query strings, mark non-cacheable responses, redact sensitive headers, and route non-covered traffic paths directly to origin.
Review new Cloudflare features before adoption to ensure they are either covered or segregated from ePHI data flows.
Data Protection and Encryption Strategies
Encryption in transit
- Enforce HTTPS everywhere, prefer TLS 1.2+ (ideally TLS 1.3), disable weak ciphers, and enable HSTS where appropriate.
- Terminate TLS at the edge and re-encrypt to the origin (Full or mutual TLS). Use client certificate pinning or mTLS for administrative and API endpoints that touch ePHI.
- Rotate certificates and keys on a defined schedule and restrict who can manage them. Use dedicated certificates for sensitive hostnames.
Encryption at rest and data minimization
- Minimize ePHI exposure: avoid placing identifiers in URLs, cookies, or headers that could appear in logs or caches.
- Scrub or tokenize sensitive fields before they reach the edge when feasible. Apply encryption at rest on any systems that store logs or payloads containing ePHI.
- Set cache-busting headers (for example, no-store) for responses containing ePHI; confirm that intermediate caches do not retain those objects.
Combine Data Encryption with strict data minimization so that even if a control fails, limited sensitive content is exposed.
Risk Assessment and Incident Response
Conducting a HIPAA-ready Risk Assessment
- Map data flows that involve Cloudflare: ingress, edge processing, logs, and egress to origin. Identify where ePHI might appear.
- Evaluate threats such as cache misconfiguration, sensitive URL parameters, misrouted traffic, credential compromise, and third-party integrations.
- Record existing controls (WAF rules, TLS policies, RBAC, MFA, redaction) and note residual risks with owners and timelines.
Incident response and Breach Notification Procedures
- Define triage criteria for potential ePHI exposure (for example, accidental caching or logging of identifiers).
- Establish escalation paths to security, privacy, and legal teams, and include vendor coordination steps with Cloudflare support.
- Preserve logs and evidence, assess the probability of compromise, and apply HIPAA Breach Notification Procedures, including required timelines and documentation.
- Run tabletop exercises that simulate edge-related incidents and validate that roles, contacts, and playbooks are current.
User Authentication and Access Controls
Administrative and user access
- Require Multi-Factor Authentication for all administrator accounts and integrate SSO via SAML or OIDC where available.
- Use role-based access control and least privilege; grant time-bound, scoped access for sensitive actions (for example, certificate changes, firewall edits, log exports).
- Prefer scoped API tokens over global keys; rotate credentials on a set cadence and upon role changes.
- Restrict dashboard access by network location or device posture and monitor for anomalous logins.
Zero Trust patterns
- Front internal apps that display ePHI with strong identity-aware policies and continuous session evaluation.
- Set short session lifetimes and require step-up authentication for high-risk actions.
Best Practices for Maintaining HIPAA Compliance
- Keep ePHI out of URLs, query strings, and headers; validate that application logs never capture ePHI.
- Disable or bypass caching for any content that could contain ePHI; apply explicit no-store directives.
- Harden TLS configurations, enforce HSTS, and use mTLS for administrative APIs touching ePHI.
- Implement WAF rules, bot management, and rate limiting tuned to your application’s threat model.
- Mandate Multi-Factor Authentication, use SSO and RBAC, and review access quarterly.
- Run an annual Risk Assessment (and upon major change), track remediation, and test incident response with Breach Notification Procedures.
- Review your BAA whenever you add features; ensure only covered services handle ePHI and update documentation.
- Set log retention to the minimum necessary, encrypt storage, and tightly control who can export or analyze logs.
FAQs.
What is a Business Associate Agreement with Cloudflare?
A Business Associate Agreement is a contract that defines how Cloudflare, as a business associate, may receive, use, protect, and disclose ePHI on your behalf. It establishes required safeguards, audit and reporting expectations, and Breach Notification Procedures, and it specifies exactly which services are permitted to handle ePHI.
Which Cloudflare services are covered under HIPAA?
Only the services explicitly identified as covered in your executed BAA and order documents are in scope. Common categories can include core network security and delivery features, while capabilities that store or analyze payload data may be excluded unless expressly listed. Treat any service not named as covered as out of scope for ePHI.
How does Cloudflare ensure data encryption for ePHI?
Cloudflare enables strong TLS for data in transit, supports modern cipher suites, and can re-encrypt traffic from the edge to your origin. You can enforce HTTPS, require mutual TLS for sensitive endpoints, and manage certificate rotation. Pair these controls with encryption at rest wherever ePHI is stored and with strict data minimization to reduce exposure.
Can non-Enterprise Cloudflare customers obtain a BAA?
Generally, BAAs are available only with eligible Enterprise agreements. If you do not have an Enterprise contract, assume a BAA is not available and avoid routing ePHI through Cloudflare until your agreement and covered services are in place.
Table of Contents
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.