Is Microsoft OneDrive HIPAA Compliant? BAA, Security Features, and Setup Checklist

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Microsoft OneDrive HIPAA Compliant? BAA, Security Features, and Setup Checklist

Kevin Henry

HIPAA

June 13, 2025

7 minutes read
Share this article
Is Microsoft OneDrive HIPAA Compliant? BAA, Security Features, and Setup Checklist

Yes—OneDrive for Business can support HIPAA compliance when you execute a Business Associate Agreement with Microsoft and configure the platform to protect Protected Health Information. Compliance is a shared responsibility: you must implement controls, train users, and continuously monitor.

HIPAA Compliance Requirements

HIPAA sets standards for safeguarding Protected Health Information (PHI), including electronic PHI stored or shared in cloud services like OneDrive for Business. To use OneDrive in a HIPAA-aligned way, you need policies, technology, and proof of due diligence working together.

Core requirements you must address

  • Risk Assessment: Perform an initial and periodic risk analysis to identify threats to ePHI confidentiality, integrity, and availability, and document mitigation plans.
  • Administrative safeguards: Define policies, workforce training, vendor management, and incident response procedures aligned to HIPAA.
  • Technical safeguards: Enforce Encryption in Transit and Encryption at Rest, unique user authentication, Access Controls, session timeouts, and Audit Logs.
  • Physical safeguards: Secure endpoints and storage locations; restrict PHI access to approved, managed devices.
  • Minimum necessary and data governance: Limit PHI access and sharing to the least privilege needed for a role.
  • Breach notification: Establish processes for detection, investigation, containment, and required notifications.
  • Documentation: Maintain policies, procedures, system configurations, and evidence of control operation.

Business Associate Agreement Importance

A Business Associate Agreement (BAA) is a HIPAA-required contract that binds a vendor handling PHI to specific privacy, security, and breach-notification obligations. Without an executed BAA, you should not store or process PHI in that service.

Microsoft offers a BAA for eligible Microsoft 365 services, including OneDrive for Business. You must ensure your organization has accepted and documented this BAA and that your licensing covers the services in scope for PHI. Keep a copy with your compliance records.

Operationalizing the BAA

  • Verify scope: Confirm OneDrive for Business is listed and understand any exclusions.
  • Align responsibilities: Map BAA obligations to your internal controls and vendor oversight.
  • Define contacts: Establish escalation paths for incidents and legal notices.
  • Review annually: Reconfirm coverage when services, features, or business processes change.

OneDrive Security Features

OneDrive for Business includes security and compliance capabilities that help you meet HIPAA’s technical safeguard requirements when properly configured.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Encryption and key management

  • Encryption in Transit using modern TLS to protect data over networks.
  • Encryption at Rest with per-file encryption and strong ciphers to protect stored data.
  • Advanced options such as customer-managed keys and additional encryption layers for highly sensitive PHI.

Identity and Access Controls

  • Multi-factor authentication, strong password policies, and conditional access to enforce device compliance and location-based restrictions.
  • Role- and group-based access aligned to least privilege, including just-in-time elevation for admins when needed.

Data protection and governance

  • Data Loss Prevention (DLP) rules to detect PHI patterns and prevent risky sharing or downloads.
  • Sensitivity labels and encryption-based policies to classify PHI and automatically enforce restrictions.
  • Retention and records policies to preserve required versions and support legal or regulatory holds.

Visibility, monitoring, and response

  • Audit Logs and advanced auditing to track access, sharing, deletions, and administrator actions.
  • Alerting for unusual behavior such as mass downloads, external sharing spikes, or DLP violations.
  • eDiscovery and investigation workflows to support incident response and legal inquiries.

Configuring OneDrive for HIPAA

Setup Checklist

  • Execute the Business Associate Agreement with Microsoft and file it in your compliance repository.
  • Complete a documented Risk Assessment for OneDrive, including data flows, threats, and compensating controls.
  • Require multi-factor authentication for all users and block legacy authentication protocols.
  • Lock down sharing: disable “anyone” links, require sign-in, set short link expirations, and restrict external sharing to approved domains.
  • Enable DLP policies for PHI detection; notify users on violations and automatically block risky actions.
  • Apply sensitivity labels to PHI with encryption and rights restrictions; require labels on upload for sensitive locations.
  • Harden endpoints: require compliant, encrypted devices; block download/sync to unmanaged devices; enable remote wipe.
  • Turn on Audit Logs; enable advanced auditing where available; create alert policies for DLP hits and anomalous sharing.
  • Set retention policies and versioning; define recovery procedures for ransomware or accidental deletion.
  • Limit third‑party app access; review OAuth consents and disable unapproved connectors.
  • Document configuration baselines and change-control approvals; test controls before onboarding PHI.

Configuration tips

  • Prefer SharePoint sites for team PHI with controlled membership; use OneDrive for an individual’s work-in-progress only when needed.
  • Provision access through groups, not individuals, to simplify reviews and attestation.
  • Validate DLP and label policies with realistic test files before production rollout.

Access Control Implementation

Effective Access Controls reduce exposure and enforce Minimum necessary use of PHI. Map roles to groups, provision access via those groups, and avoid broad, permanent privileges.

  • Group-based access: Tie OneDrive sharing and SharePoint permissions to job functions.
  • Conditional access: Require MFA, compliant devices, and session controls that limit download or require web-only access for higher risk scenarios.
  • Guest governance: Allow external access only for approved partners, with expiration and owner recertification.
  • Admin safety: Use just-in-time elevation and log all privileged actions; separate duties to reduce risk.
  • Periodic attestation: Quarterly reviews to remove stale access and tighten overshared content.

User Training for HIPAA

Technology fails without informed users. Provide concise, role-specific training and frequent refreshers focused on practical behavior.

  • Recognize PHI and apply the correct sensitivity label before sharing or storing.
  • Use secure links with restricted recipients instead of attachments; avoid personal accounts for any PHI.
  • Verify recipients and permissions before sending; revoke access when the task ends.
  • Report lost devices, suspected phishing, or misdirected sharing immediately.
  • Complete short, periodic modules and simulated phishing to reinforce good habits.

Compliance Monitoring and Audits

Continuous oversight proves your controls work and surfaces drift before it becomes a breach. Build monitoring into daily operations and audit on a set cadence.

  • Enable and retain Audit Logs; route high-severity alerts to your security operations workflow.
  • Review DLP incidents, external sharing reports, and anomalous activity weekly; investigate root causes.
  • Run quarterly access recertifications and inventory public or external links to PHI locations.
  • Test incident response with tabletop exercises; document lessons learned and control updates.
  • Refresh the Risk Assessment annually or after major changes; track remediation to closure.
  • Maintain evidence: policies, screenshots, change tickets, and training records for auditors.

Conclusion

OneDrive for Business can be part of a HIPAA-compliant program when you execute a Business Associate Agreement, enforce Encryption in Transit and Encryption at Rest, implement strong Access Controls, monitor with Audit Logs, train users, and sustain a documented Risk Assessment cycle. Treat compliance as an ongoing operational discipline—not a one-time setup.

FAQs.

What is a Business Associate Agreement in HIPAA compliance?

A Business Associate Agreement is a required contract between a covered entity and a vendor that handles PHI. It defines permitted uses and disclosures, security responsibilities, breach-notification duties, and other terms that protect PHI throughout the vendor relationship.

How does OneDrive protect Protected Health Information?

OneDrive for Business uses Encryption in Transit and Encryption at Rest, supports robust Access Controls with MFA and conditional access, and provides DLP, sensitivity labels, retention, and detailed Audit Logs. When configured correctly, these features help you prevent unauthorized access and demonstrate accountability.

Can OneDrive be used for storing PHI without a BAA?

No. You should not store or process PHI in OneDrive unless your organization has executed a BAA with Microsoft covering OneDrive for Business and you have implemented the necessary administrative, technical, and physical safeguards.

What are the best practices for configuring OneDrive for HIPAA?

Execute the BAA, complete a Risk Assessment, require MFA, restrict external sharing and anonymous links, enable DLP and sensitivity labels for PHI, enforce device compliance and session controls, turn on Audit Logs with alerts, set retention and versioning, and review access and sharing regularly.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles