Is Salesforce HIPAA Compliant? Yes—With a BAA and Proper Configuration
Salesforce can support HIPAA requirements when you execute a Business Associate Agreement (BAA) and configure the platform to protect Protected Health Information (PHI). Compliance hinges on your choices—eligible services, security controls, and ongoing governance aligned to the HIPAA Security Rule.
This guide explains how to use Salesforce responsibly for PHI: which agreements and features matter, how to harden the environment, and how to monitor, audit, and govern day to day.
Understanding Business Associate Agreements with Salesforce
A Business Associate Agreement (BAA) is the contract that permits Salesforce to handle PHI on your behalf and sets expectations for safeguards, reporting, and subcontractor controls. Without a signed BAA, you should not store or process PHI in Salesforce.
Review your BAA closely to confirm in-scope services and mutual obligations. Typical BAA elements include permitted uses/disclosures, administrative and technical safeguards, breach notification timelines, subcontractor flow‑downs, and PHI return or destruction. Align internal policies and workforce training to what the BAA requires.
- Inventory PHI data flows and confirm they land only in BAA‑covered services.
- Document where PHI resides (objects, fields, files) and who can access it.
- Map BAA commitments to specific platform controls and operating procedures.
Utilizing Salesforce HIPAA-Compliant Services
Use only HIPAA‑eligible Salesforce services identified in your agreement and supporting documentation. Many organizations build on the core Platform and Health‑focused capabilities, and add features that strengthen Data Encryption and monitoring (e.g., Platform Encryption, Event Monitoring, and extended field history).
Architect with PHI in mind. Keep PHI in clearly labeled fields and objects, minimize its spread to emails, reports, and attachments, and avoid placing PHI in collaboration posts or logs. Validate that data import/export processes, templates, and automations do not inadvertently expose PHI.
- Prefer structured data over free‑text; apply field‑level protections to PHI fields.
- Evaluate add‑ons that enhance encryption, auditing, and retention where required.
- Test common workflows (cases, messaging, documents) to ensure PHI stays controlled.
Implementing Security Measures for PHI Protection
The HIPAA Security Rule expects risk‑based safeguards. In Salesforce, pair strong configuration with disciplined operations to protect PHI across its lifecycle. Treat Data Encryption, identity controls, and data loss prevention as foundational.
- Encryption: enforce TLS for data in transit; use Platform Encryption for selected fields and files at rest; manage keys and rotation rigorously.
- Identity and sessions: require MFA, restrict login IP ranges and hours, set strict session timeouts, and monitor high‑risk authentication events.
- Data loss prevention: limit report export/download permissions, control API access, govern email and file sharing, and scan free‑text inputs for PHI.
- Endpoint posture: apply MDM to mobile users, disable offline storage where unnecessary, and verify device encryption and lock policies.
- Resilience: back up critical objects and files, test restores, and document recovery procedures.
Configuring Role-Based Access Controls
Design Role‑Based Access Control (RBAC) so users see only the minimum PHI needed. Combine profiles for baselines, permission sets for incremental rights, and roles and sharing rules for record‑level access. Avoid broad powers such as “View All Data” unless tightly justified and monitored.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
- Object/field controls: restrict PHI fields with field‑level security; use page layouts and dynamic forms to hide sensitive fields from non‑privileged users.
- Record access: implement roles, territories, and criteria‑based sharing; use teams or care‑team constructs to scope access precisely.
- Separation of duties: split administrative tasks (e.g., user provisioning, key management, report building) across different personnel.
- Access hygiene: recertify permissions regularly, log privileged actions, and gate high‑assurance tasks behind MFA.
Maintaining Audit Trails in Salesforce
Audit Trail Management proves who did what, when, and to which data. Enable configuration change tracking, field history on PHI fields, and advanced audit features for extended retention and integrity. Centralize high‑value events for security analytics.
- Configuration: track setup changes to detect risky admin actions or drift.
- Data changes: record create/update/delete activity on PHI; preserve historical values where policy requires.
- User activity: logins, API calls, report exports, and large data operations should feed your SIEM for alerting and investigation.
- Retention and integrity: align log retention to policy and legal holds; store copies in tamper‑evident repositories.
- Operationalize: define triage playbooks, escalation paths, and metrics for audit coverage and timeliness.
Managing Third-Party Integrations for Compliance
Third‑Party Compliance Integration is not automatic. Any app, connector, or service that touches PHI must be evaluated, secured, and covered by its own BAA or appropriate agreement. Limit integration scopes to the least PHI necessary.
- Security by design: use Named Credentials, OAuth scopes, IP allowlists, and mutual TLS where possible; rotate secrets and certificates on schedule.
- Data minimization: filter payloads, tokenize where feasible, and avoid placing PHI in URLs, logs, or message headers.
- Marketplace apps: a security review is not a substitute for a BAA; validate vendor obligations, data flows, and encryption claims.
- Ingress/egress controls: sanitize web forms and emails, and block routes that could send PHI to non‑covered services.
Ensuring Continuous HIPAA Compliance Monitoring
Compliance is ongoing. Establish governance that continuously measures security posture, validates controls, and reacts quickly to changes in users, integrations, and data. Tie platform checks to your enterprise risk management program.
- Governance: assign a HIPAA security officer, define policies, and conduct periodic risk analyses tied to the HIPAA Security Rule.
- Continuous monitoring: review configuration baselines, encryption coverage, RBAC drift, and high‑risk events; automate alerts for anomalies.
- Lifecycle discipline: integrate security reviews into change management, new app onboarding, and integration updates.
- Training and drills: educate users who handle PHI and practice incident response for suspected disclosures.
Conclusion
Salesforce can be part of a HIPAA‑compliant environment when you sign a BAA, select HIPAA‑eligible services, enforce strong encryption and RBAC, maintain robust audit trails, govern third‑party connections, and monitor continuously. Treat these controls as a living program to keep PHI protected.
FAQs.
What Salesforce services are covered under the HIPAA BAA?
Coverage depends on your executed BAA and the HIPAA‑eligible services it lists. Only those designated services are in scope for PHI, and coverage does not automatically extend to every cloud, add‑on, or third‑party app. Verify eligibility before enabling features and confine PHI to services named in your BAA.
How does Salesforce ensure encryption of PHI?
Data in transit is protected with TLS, and you can enable Platform Encryption to encrypt selected fields and files at rest. Effective Data Encryption also includes disciplined key management, rotation, and monitoring to ensure encryption remains active and aligned with your risk assessment.
What security configurations are required for HIPAA compliance in Salesforce?
Requirements stem from your risk analysis under the HIPAA Security Rule, but common controls include MFA, RBAC with least privilege, field‑level security on PHI, Platform Encryption, restricted exports and APIs, IP and session policies, comprehensive audit logging, backup and recovery, and tested incident response.
Are third-party Salesforce integrations HIPAA compliant by default?
No. Each integration that handles PHI must be independently vetted, secured, and covered by its own BAA or contractual assurances. Limit shared data to what’s necessary, secure connections, and audit vendors and apps to confirm ongoing compliance.
Table of Contents
- Understanding Business Associate Agreements with Salesforce
- Utilizing Salesforce HIPAA-Compliant Services
- Implementing Security Measures for PHI Protection
- Configuring Role-Based Access Controls
- Maintaining Audit Trails in Salesforce
- Managing Third-Party Integrations for Compliance
- Ensuring Continuous HIPAA Compliance Monitoring
- FAQs.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.