Is O365 HIPAA Compliant? Microsoft 365 Requirements and Setup Guide

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is O365 HIPAA Compliant? Microsoft 365 Requirements and Setup Guide

Kevin Henry

HIPAA

July 27, 2025

6 minutes read
Share this article
Is O365 HIPAA Compliant? Microsoft 365 Requirements and Setup Guide

Yes—O365, now Microsoft 365, can be used in a HIPAA-compliant manner when you put the right agreements, controls, and monitoring in place. The platform supplies robust security capabilities, but you remain responsible for safeguarding Protected Health Information (PHI) and proving due diligence.

This guide walks you through the essential requirements and a practical setup path using Microsoft Purview, Multi-Factor Authentication, Conditional Access Policies, Audit Logging, and Data Loss Prevention.

Sign Business Associate Agreement

Why it matters

A Business Associate Agreement (BAA) makes Microsoft a Business Associate for covered services, setting obligations to protect PHI and notify you of incidents. Without a BAA, you should not store or process PHI in Microsoft 365.

Action steps

  • Confirm your organization is a HIPAA Covered Entity or Business Associate and identify which Microsoft 365 services will handle PHI.
  • Work with your Microsoft licensing channel to ensure your agreement includes HIPAA terms (the BAA) for in-scope cloud services.
  • Document which workloads are covered (Exchange Online, SharePoint Online, OneDrive, Teams) and any excluded services you will block.
  • Execute BAAs with third-party add-ins, connectors, and integration partners that touch PHI.
  • Retain a signed copy, renewal dates, and contacts for privacy/security officers in your compliance repository.

Evidence to keep

  • Signed BAA and scope of covered services.
  • System inventory listing PHI locations across Microsoft 365.
  • Policies restricting PHI use in non-covered services.

Conduct HIPAA Risk Assessment

Scope and methodology

Perform an enterprise-wide risk analysis focused on how PHI flows through Microsoft 365. Evaluate threats, likelihood, and impact, then choose reasonable and appropriate safeguards with documented rationale.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Action steps

  • Map PHI data flows across Exchange, SharePoint, OneDrive, Teams, devices, and external sharing.
  • Identify key risks: account compromise, misconfigured sharing, lost devices, malware, insider misuse, and over-privileged admins.
  • Use Microsoft Purview Content Explorer/Activity Explorer to locate PHI and validate controls.
  • Leverage Secure Score and compliance assessments to prioritize remediation.
  • Create a risk register, treatment plan, and testing cadence; track closure with evidence.

Deliverables

  • Risk analysis report with control mapping to HIPAA Security Rule safeguards.
  • Risk treatment plan, owners, timelines, and acceptance where applicable.
  • Annual review schedule and event-driven reassessments after significant changes.

Select Microsoft 365 Plan

Capabilities to require

  • Identity and access: Multi-Factor Authentication and Conditional Access Policies.
  • Data protection: Microsoft Purview Information Protection (sensitivity labels and encryption) and Data Loss Prevention for email, files, and chats.
  • Visibility: unified Audit Logging with retention aligned to your policy; advanced auditing if longer retention is required.
  • Device safeguards: Endpoint management (Intune) for compliant devices and app protection on mobile.
  • Threat defense: anti-phishing, anti-malware, and safe link/attachment protections.
  • eDiscovery/legal hold for investigations and incident response.

Plan guidance

  • Small to midsize: Microsoft 365 Business Premium often covers core HIPAA needs when properly configured.
  • Enterprise: Microsoft 365 E3 is a common baseline; E5 or add-ons provide advanced audit, automated labeling, and extended analytics.

No plan alone makes you compliant. Policies, configuration, and ongoing governance are essential.

Configure Technical Safeguards

Encryption and information protection

  • Publish Microsoft Purview sensitivity labels to classify PHI and apply encryption with usage rights.
  • Enable Office Message Encryption for secure external email when sharing PHI.
  • Disable legacy/basic authentication and enforce modern auth everywhere.

Data integrity and threat protection

  • Enable anti-malware, anti-phishing, and safe links/attachments to reduce malicious content risks.
  • Use versioning and retention so PHI changes are tracked and recoverable.

Endpoint and network safeguards

  • Use Intune to require compliant devices, disk encryption, screen lock, and app protection policies for mobile apps.
  • Restrict legacy protocols and limit access from risky or unknown locations.

Implement Access Controls

Identity hardening

  • Require Multi-Factor Authentication for all users, using strong methods such as authenticator apps, FIDO2 keys, or passkeys.
  • Adopt least privilege: reduce Global Admins, use role-based access control, and approve privileged actions only when needed.

Conditional Access Policies

  • Require MFA and compliant or domain-joined devices for access to Exchange, SharePoint, OneDrive, and Teams.
  • Block legacy authentication; enforce session controls and sign-in risk policies.
  • Create break-glass accounts stored offline with strict monitoring.

Lifecycle and sharing

  • Automate provisioning/deprovisioning; promptly disable separated users.
  • Restrict guest access and external sharing; allow only approved domains for PHI collaboration.

Enable Audit Logging

Turn on and tune

  • Enable unified Audit Logging in Microsoft Purview to capture user and admin activity across workloads.
  • Set retention to meet policy; consider advanced audit for extended retention and high-value events.
  • Create alert policies for risky actions: DLP overrides, external sharing, role changes, and mailbox access.

Operationalize reviews

  • Stream audit logs to a SIEM for correlation and incident response.
  • Define who reviews which reports, how often, and escalation steps; document outcomes for compliance evidence.

Manage Data Loss Prevention

Discover and protect PHI

  • Use Microsoft Purview DLP to detect PHI with Sensitive Information Types (e.g., Social Security numbers, national provider identifiers) and custom patterns.
  • Apply DLP policies across Exchange, SharePoint, OneDrive, and Teams to block, encrypt, or warn on risky sharing.
  • Extend protection to endpoints to monitor clipboard, printing, removable media, and unauthorized uploads.

Policy design best practices

  • Start in test mode with policy tips to educate users; tighten actions after review.
  • Scope rules narrowly for PHI locations, add exceptions for approved workflows, and require business justification for overrides.
  • Measure effectiveness via incident trends and fine-tune detection to reduce false positives.

Conclusion

Microsoft 365 can support HIPAA compliance when you sign a Business Associate Agreement, complete a risk assessment, choose the right plan, and configure technical safeguards. Strong access controls, comprehensive Audit Logging, and disciplined Data Loss Prevention round out a defensible program that protects PHI and withstands scrutiny.

FAQs

What is a Business Associate Agreement in Microsoft 365?

A Business Associate Agreement is the contractual commitment that makes Microsoft a Business Associate for covered cloud services. It spells out responsibilities for safeguarding PHI, breach notification, and permitted uses, and it is required before storing or transmitting PHI in Microsoft 365.

How does Microsoft 365 support PHI protection?

Microsoft 365 provides built-in security and compliance features—such as Microsoft Purview sensitivity labels, encryption, Data Loss Prevention, Multi-Factor Authentication, Conditional Access Policies, and unified Audit Logging—that you configure to protect PHI across email, files, chats, and endpoints.

What technical safeguards are required for HIPAA compliance in O365?

Core safeguards include access controls (MFA and least privilege), transmission and storage security (encryption and modern auth), integrity protections (anti-malware and safe links), activity monitoring (Audit Logging and alerts), and data controls (DLP, retention, and sensitivity labels). Device compliance and secure external sharing are also essential.

Is a special Microsoft 365 plan needed for HIPAA compliance?

No single plan guarantees compliance. Choose a license set that includes identity protection, Purview Information Protection and DLP, auditing, threat defense, endpoint management, and eDiscovery. Many small organizations use Business Premium; larger enterprises start with E3 and add E5 capabilities or targeted add-ons for advanced needs.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles