Is Microsoft Teams HIPAA Compliant? BAA, Security Features, and Setup Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Microsoft Teams HIPAA Compliant? BAA, Security Features, and Setup Checklist

Kevin Henry

HIPAA

August 23, 2025

8 minutes read
Share this article
Is Microsoft Teams HIPAA Compliant? BAA, Security Features, and Setup Checklist

HIPAA Compliance Overview

Microsoft Teams can be used to handle Protected Health Information (PHI) in a HIPAA-compliant manner when you execute a Business Associate Agreement (BAA) with Microsoft and configure appropriate safeguards. HIPAA is a regulation, not a product certification; no tool is “HIPAA certified.” Compliance depends on how you deploy, secure, and govern the service.

HIPAA requires administrative, physical, and technical safeguards. In practice, that means completing a risk analysis, implementing policies and workforce training, enforcing access controls, applying Encryption Standards for data in transit and at rest, and maintaining documentation and Audit Logging. Microsoft 365 provides capabilities to meet many of these needs, but configuration and ongoing oversight remain your responsibility.

Business Associate Agreement Requirements

A signed Business Associate Agreement (BAA) is essential before using Teams for PHI. The BAA defines Microsoft’s responsibilities as a Business Associate, including security commitments, breach notification, and permitted uses of PHI. It also clarifies the shared-responsibility model: Microsoft secures the cloud, while you secure how your organization uses it.

Verify that the BAA you execute includes Microsoft Teams as an in-scope service under your licensing. Keep the executed agreement and any referenced terms on file, track versions and effective dates, and document the internal approval that PHI use in Teams is permitted under your risk management program.

  • Confirm your Microsoft 365 plan supports the controls you need (for example, Data Loss Prevention and advanced auditing features).
  • Establish BAAs with any other vendors that might process PHI alongside Teams (e.g., contact center solutions, transcription, or archiving tools).
  • Remember: the Microsoft BAA does not extend to third-party apps you add to Teams.

Security Features in Microsoft Teams

Access and Identity Controls

  • Multi-Factor Authentication (MFA) and Conditional Access reduce account takeover risk and allow granular enforcement by user, device, and location.
  • Role-Based Access Controls help you grant least-privilege admin roles, limit who can create teams or change policies, and separate duties for security and compliance tasks.

Information Protection and Governance

  • Data Loss Prevention (DLP) for chat and channel messages detects and blocks sharing of PHI, with policy tips to educate users in the flow of work.
  • Sensitivity labels classify teams and content, enforce encryption and external sharing restrictions, and apply consistent collaboration settings.
  • Retention policies and labels preserve or delete messages, files, transcripts, and recordings according to your legal and operational requirements.
  • eDiscovery and legal hold allow you to search, export, and preserve Teams content for investigations and litigation.

Encryption and Data Security

  • Microsoft 365 uses strong Encryption Standards for data at rest and in transit. Teams meetings and media streams are encrypted; optional end-to-end encryption is available for specific 1:1 VoIP scenarios, with feature trade-offs.
  • Customer-managed options (such as advanced encryption controls available in certain plans) can add key management layers for heightened assurance.

Visibility and Auditing

  • Unified Audit Logging records user, admin, and policy events across Teams and underlying workloads to support investigations and compliance reporting.
  • Alerting and activity monitoring help you detect DLP violations, abnormal admin changes, and unusual sign-ins.

Meetings and Collaboration Controls

  • Meeting policies control who can bypass the lobby, present, record, or chat. You can restrict external participants and disable cloud recording where PHI risk is high.
  • Files shared in Teams are stored in SharePoint or OneDrive, where the same labels, DLP, and access controls apply.

Configuration Steps for HIPAA Compliance

  1. Define scope and complete a risk analysis

Document how Teams will handle PHI (chat, files, meetings, voice), identify threats, and select safeguards to reduce risk to a reasonable and appropriate level.

  • Execute and file the BAA

  • Complete the BAA with Microsoft before enabling PHI use in Teams. Verify in-scope services, note effective dates, and store the agreement in your compliance repository.

  • Harden identity with MFA and Conditional Access

  • Enforce Multi-Factor Authentication for all accounts, block legacy protocols, and require compliant or managed devices for accessing PHI. Apply Role-Based Access Controls and, if available, just-in-time elevation for admins.

  • Apply information protection and DLP

  • Deploy Sensitivity labels to classify teams and content, and create Data Loss Prevention policies for Teams messages and files to prevent accidental or unauthorized PHI disclosure.

  • Set retention and meeting policies

  • Define retention for chats, channels, transcripts, and recordings. Limit who can record, where recordings are stored, and how long they are kept. Disable features that you cannot govern safely.

  • Secure endpoints and sessions

  • Use device management and mobile application protection to require encryption, PIN, and remote wipe on endpoints. Restrict downloads to unmanaged devices and block copy/paste where appropriate.

  • Enable Audit Logging and eDiscovery

  • Turn on auditing, set retention for logs consistent with your policy, and configure alerts for risky activity. Define eDiscovery workflows and role assignments for investigations.

  • Control external access and apps

  • Restrict guest access, limit external federation, and allow only vetted third-party apps. Maintain an app allowlist and review permissions regularly.

  • Train your workforce and test regularly

  • Educate users on handling PHI in Teams, simulate DLP scenarios, and run incident response drills so staff know how to report and contain issues quickly.

    Ready to simplify HIPAA compliance?

    Join thousands of organizations that trust Accountable to manage their compliance needs.

    Additional Security Measures

    • Advanced encryption and key management options can add customer-controlled protection for eligible content types.
    • Information Barriers prevent certain groups from communicating or sharing files, reducing inappropriate PHI exposure across roles.
    • Communication monitoring tools can help detect risky or noncompliant messaging behavior and trigger remediation workflows.
    • Privileged access strategies (break-glass accounts, just-in-time admin, and dedicated admin workstations) reduce the blast radius of credential compromise.
    • Security baselines, automated configuration assessments, and continuous posture management help you keep settings aligned with policy.

    Limitations and Considerations

    • Shared responsibility: Microsoft secures the platform; you must configure controls, govern data, and train users to keep PHI safe.
    • Licensing matters: features like advanced DLP, auditing, or key management may require specific plans or add-ons; verify what your subscription includes.
    • End-to-end encryption trade-offs: enabling it for certain calls can disable features such as recording or compliance monitoring; confirm it fits your use case.
    • Third-party apps, bots, and connectors may process PHI outside Microsoft’s BAA; evaluate vendors, negotiate BAAs, or disable nonessential integrations.
    • PSTN calling, voicemail, and transcription can involve additional processors; review flows and apply recording and retention rules carefully.
    • Do not use consumer versions of Teams for PHI. Keep all PHI in enterprise Microsoft 365 tenants governed by your BAA and policies.

    This material is for informational purposes and does not constitute legal advice. Consult your compliance and legal teams for requirements specific to your organization.

    Ongoing Compliance and Monitoring

    • Continuously monitor Audit Logging, DLP alerts, and sign-in risk signals; escalate and investigate promptly.
    • Review admin roles, Conditional Access, and guest access monthly; remove stale accounts and tighten exceptions.
    • Reassess risks after feature changes, mergers, or new workflows; update policies, labels, and retention accordingly.
    • Test incident response and eDiscovery processes; document outcomes and improvements.
    • Revalidate vendor BAAs and app permissions on a set cadence; maintain an approved app catalog for Teams.
    • Deliver ongoing training and just-in-time guidance inside Teams to reinforce correct PHI handling.

    Conclusion

    So, is Microsoft Teams HIPAA compliant? With a signed Business Associate Agreement, strong configuration, and disciplined operations, you can use Teams to handle PHI in a compliant manner. Focus on identity security (MFA and RBAC), information protection (DLP, labels, retention), encryption and auditing, and continuous monitoring to keep controls effective as your environment evolves.

    FAQs.

    What is required to make Microsoft Teams HIPAA compliant?

    Execute a BAA with Microsoft, complete a risk analysis, and configure Teams with core safeguards: Multi-Factor Authentication, Conditional Access, Role-Based Access Controls, Data Loss Prevention for chats and files, appropriate retention, and comprehensive Audit Logging. Train users, restrict external apps, and monitor continuously.

    How does the BAA with Microsoft affect HIPAA compliance?

    The BAA makes Microsoft a Business Associate and commits it to safeguard PHI within in-scope services and provide breach notification. It does not, by itself, make your organization compliant—you must configure controls, manage access, and enforce policies for how PHI is created, shared, stored, and retained in Teams.

    Which security features support HIPAA compliance in Microsoft Teams?

    Key features include Encryption Standards for data in transit and at rest, Data Loss Prevention for chats and channels, sensitivity labels, retention policies, eDiscovery and legal hold, Audit Logging and alerts, Multi-Factor Authentication, Conditional Access, and Role-Based Access Controls for least-privilege administration.

    Can third-party integrations impact HIPAA compliance in Teams?

    Yes. Third-party apps, bots, and connectors may access or store PHI outside Microsoft’s BAA. Only allow vetted integrations, execute separate BAAs where needed, limit app permissions, and review app activity routinely. If you cannot obtain adequate assurances, block the integration for PHI workflows.

    Share this article

    Ready to simplify HIPAA compliance?

    Join thousands of organizations that trust Accountable to manage their compliance needs.

    Related Articles