Is Office 365 HIPAA Compliant? BAA, Security Settings, and Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Office 365 HIPAA Compliant? BAA, Security Settings, and Checklist

Kevin Henry

HIPAA

August 11, 2025

9 minutes read
Share this article
Is Office 365 HIPAA Compliant? BAA, Security Settings, and Checklist

Business Associate Agreement Overview

Office 365 can support HIPAA requirements when you execute a Business Associate Agreement (BAA) with Microsoft and configure the service appropriately. The BAA authorizes Microsoft, as a Business Associate, to handle Electronic Protected Health Information (ePHI) under specified safeguards and limits, enabling covered entities and business associates to use eligible Office 365 services with ePHI.

The BAA does not, by itself, make your organization HIPAA compliant. It defines Microsoft’s responsibilities while leaving critical operational, administrative, and technical controls in your hands. You must still implement policies, controls, and training that align with the HIPAA Security Rule.

What the BAA typically covers

  • Permitted and required uses/disclosures of ePHI by Microsoft in delivering Office 365 services.
  • Administrative, physical, and technical safeguards, including breach notification obligations.
  • Requirements for subcontractors who may access ePHI to provide equivalent protections.
  • Procedures for return or deletion of ePHI upon contract termination.
  • Scope of covered online services so you clearly know which workloads may host ePHI.
  • Shared responsibility boundaries between Microsoft and your organization.

How to obtain and validate the BAA

  • Confirm your Office 365 plan and services are HIPAA-eligible and require a BAA.
  • Review and accept the BAA as part of your contract or administrative onboarding process.
  • Archive the executed BAA, record acceptance details, and maintain it in your compliance repository.
  • Inventory which Office 365 services will store or process ePHI and verify they are within the BAA’s scope.
  • Reassess when you add new services, third‑party apps, or integrations that could touch ePHI.

Customer Responsibilities for HIPAA Compliance

HIPAA compliance in Office 365 follows a shared responsibility model: Microsoft secures the cloud infrastructure; you configure identities, access, data protections, and operational processes. Your program must address Administrative Safeguards, as well as technical and physical measures appropriate to your risk profile.

Administrative Safeguards you must implement

  • Designate a security official and define roles and responsibilities for safeguarding ePHI.
  • Publish policies/procedures for access control, acceptable use, incident response, and change management.
  • Conduct workforce training and enforce sanctions for policy violations.
  • Perform a recurring HIPAA Risk Assessment and maintain risk management plans.
  • Plan for contingency operations, backup, and disaster recovery for critical Office 365 data.
  • Manage vendors and connected apps; execute BAAs where required.

Technical responsibilities in Office 365

  • Require Multi-Factor Authentication for all users, with stronger methods for admins and high‑risk roles.
  • Use Conditional Access to enforce least privilege, restrict risky sign‑ins, and require compliant devices.
  • Limit admin privileges, use just‑in‑time access, and maintain emergency (“break‑glass”) accounts.
  • Control external sharing and guest access; apply data classification and labeling to ePHI.
  • Enable and routinely review Audit Logging and alerting for sensitive activities.
  • Apply Data Loss Prevention, safe collaboration settings, and secure email protections.
  • Configure retention, legal hold, and deletion schedules consistent with your policy and law.

Documentation and evidence

  • Maintain configuration baselines, change logs, and screenshots of critical control settings.
  • Keep training records, access review results, and incident response test reports.
  • Document where ePHI resides, who can access it, and how it is protected across Office 365.

Configuring Security Settings

Build a secure-by-default baseline, then layer controls that specifically protect ePHI. Start with identity, extend to devices and apps, and finish with data protections and monitoring.

Identity and access hardening

  • Enforce Multi-Factor Authentication for every user; require phishing‑resistant methods where feasible.
  • Implement Conditional Access policies to require compliant or hybrid‑joined devices and block legacy authentication.
  • Adopt least privilege: minimize permanent admin roles, enable just‑in‑time elevation, and review privileges quarterly.
  • Create two monitored break‑glass accounts with long, unique passwords stored offline; exclude them from risky policies only as needed.

Device and app protections

  • Require device compliance (encryption, OS security baseline, screen lock) before granting access to ePHI.
  • Apply app protection policies to prevent copy/paste, local saves to unmanaged devices, and unauthorized backups.
  • Use session controls for download restrictions, especially on unmanaged endpoints and for high‑risk sessions.

Data protection policies

  • Deploy Data Loss Prevention rules that detect health‑related identifiers and prevent oversharing of ePHI.
  • Use sensitivity labels to classify ePHI and automatically apply encryption and access restrictions.
  • Harden email: prevent auto‑forwarding to external domains, enable anti‑phishing, and use message encryption when needed.
  • Set external sharing defaults to least‑privilege and require explicit invitations for access to SharePoint/OneDrive content.

Logging, monitoring, and response

  • Verify Unified Audit Logging is enabled and retained for an interval aligned to your policy.
  • Create alerting for high‑risk activities: mass downloads, transport rule changes, role assignments, and external sharing spikes.
  • Integrate logs with your SIEM and define triage/runbooks for incidents involving ePHI.
  • Test your incident response and breach notification workflows at least annually.

Data Encryption in Office 365

Office 365 applies multiple layers of encryption to protect ePHI in transit and at rest. You can also add message‑level and customer‑managed key options for heightened control.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Encryption in transit

  • TLS secures connections between clients, services, and partner mail systems.
  • Use S/MIME or Office 365 Message Encryption for message‑level confidentiality and rights enforcement.

Encryption at rest

  • Service‑side encryption protects Exchange mailboxes, SharePoint/OneDrive files, and Teams data at rest.
  • Per‑file encryption and key management isolate content and support rapid revocation when access is removed.

Customer key options

  • Customer‑managed keys allow you to control the root of trust for select workloads.
  • Establish key rotation, backup, and custodianship procedures; loss of keys can render data unrecoverable.

Compliance Certifications and Audits

Microsoft’s cloud services undergo independent audits (for example, SOC and ISO standards) and maintain certifications used in many healthcare due‑diligence reviews. These attestations demonstrate control maturity in Microsoft’s environment but do not equal HIPAA certification of your organization.

What these mean for you

  • Use audit reports to support vendor risk assessments and control inheritance decisions.
  • Map Microsoft controls to your HIPAA policies, then document how your configurations close any gaps.
  • Rely on certifications as evidence, but still implement Administrative Safeguards and validate your technical settings.

Conducting Risk Assessments

A HIPAA Risk Assessment is a recurring, structured evaluation of risks to ePHI confidentiality, integrity, and availability. In Office 365, focus on how identities, devices, sharing, and data handling could expose ePHI.

Scope and inventory

  • Identify where ePHI lives: Exchange, SharePoint, OneDrive, Teams, third‑party apps, and backups.
  • Document data flows, sharing patterns, and integrations that process ePHI.

Analyze threats and vulnerabilities

  • Assess risks from credential theft, misconfiguration, excessive privileges, and data exfiltration.
  • Estimate likelihood and impact, then assign risk ratings to prioritize remediation.

Evaluate Office 365 controls

  • Validate Multi-Factor Authentication, Conditional Access, and least‑privilege role assignments.
  • Review DLP, sensitivity labels, sharing restrictions, and encryption settings.
  • Confirm Audit Logging, alert policies, and incident response are working as designed.

Plan of action and tracking

  • Create a remediation plan with owners, milestones, and acceptance criteria.
  • Track residual risk, document risk acceptance where justified, and reassess at least annually or after major changes.

Developing a Compliance Checklist

  • Execute and archive the Business Associate Agreement; verify covered services hosting ePHI.
  • Identify ePHI repositories and data flows across Office 365 and connected systems.
  • Enforce Multi-Factor Authentication for all users and stronger methods for admins.
  • Implement Conditional Access: require compliant devices, restrict risky sign‑ins, and block legacy protocols.
  • Apply least privilege, enable just‑in‑time admin elevation, and maintain break‑glass accounts.
  • Deploy device management and app protection to prevent data leakage from unmanaged endpoints.
  • Configure DLP and sensitivity labels to classify and protect ePHI; set conservative external sharing defaults.
  • Use message‑level encryption (e.g., S/MIME or OME) for emails containing ePHI when appropriate.
  • Verify Unified Audit Logging, set alerting on sensitive activities, and integrate with your SIEM.
  • Harden email hygiene and block auto‑forwarding to external domains.
  • Define retention, legal hold, backup, and recovery objectives for ePHI.
  • Document Administrative Safeguards: policies, training, sanctions, and incident response plans.
  • Complete a HIPAA Risk Assessment, document findings, and execute remediation plans.
  • Review vendor connections and third‑party apps; execute BAAs where required.
  • Maintain a due‑diligence file with relevant certifications and audit summaries.
  • Test incident response and disaster recovery annually; update after major changes.

With a properly executed BAA, strong identity and access controls, robust data protection, and an ongoing risk management process, Office 365 can be configured to support HIPAA compliance for your organization’s ePHI.

FAQs.

What is a Business Associate Agreement in Office 365?

A Business Associate Agreement is a contractual addendum that sets Microsoft’s obligations as a Business Associate when Office 365 processes ePHI. It defines permitted uses/disclosures, safeguards, breach notification, subcontractor requirements, and data return/deletion, enabling you to lawfully use eligible Office 365 services with ePHI when you also implement your own HIPAA controls.

How does Office 365 ensure data encryption for HIPAA compliance?

Office 365 encrypts data in transit with TLS and at rest with service‑side encryption. You can add message‑level protection using S/MIME or Office 365 Message Encryption and, for select workloads, use customer‑managed keys to control the encryption root of trust. These layers help protect ePHI while preserving search, collaboration, and recovery capabilities.

What are the key customer responsibilities for using Office 365 under HIPAA?

Your responsibilities include executing the BAA, enforcing Multi-Factor Authentication, applying Conditional Access and least privilege, enabling and reviewing Audit Logging, configuring DLP and sensitivity labels, managing device/app protections, defining retention and incident response, training the workforce, and conducting a documented HIPAA Risk Assessment on a recurring basis.

How can organizations perform a HIPAA risk assessment in Office 365?

Define the scope and inventory where ePHI resides, analyze threats and vulnerabilities, evaluate control effectiveness (identity, access, encryption, DLP, sharing, and logging), rate risks by likelihood/impact, and produce a remediation plan with owners and timelines. Reassess at least annually or after significant changes and retain evidence of decisions and outcomes.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles