PHI in Cloud Storage: What’s Allowed Under HIPAA and How to Stay Compliant

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

PHI in Cloud Storage: What’s Allowed Under HIPAA and How to Stay Compliant

Kevin Henry

HIPAA

January 10, 2026

6 minutes read
Share this article
PHI in Cloud Storage: What’s Allowed Under HIPAA and How to Stay Compliant

Storing PHI in cloud storage is allowed under HIPAA when you and your cloud service provider implement the Security Rule Requirements and sign a Business Associate Agreement. This guide explains what’s permitted, how responsibilities are shared, and the practical steps you can take to keep Electronic Protected Health Information (ePHI) secure and compliant.

HIPAA Compliance for Cloud Storage

What’s allowed under HIPAA

You may store, process, and transmit PHI in the cloud if the provider will execute a Business Associate Agreement and the service can support required safeguards. Consumer-grade storage without a BAA, public sharing links, and unencrypted exports of PHI fall outside acceptable use.

Compliance is not a single feature; it’s a program. You must apply administrative, physical, and technical safeguards, document decisions, and limit access to the minimum necessary. Your processes, not just the vendor’s platform, determine whether PHI in cloud storage stays compliant.

Understand the Shared Responsibility Model

Cloud security is distributed. The Shared Responsibility Model clarifies who does what so nothing is missed.

  • Your responsibilities: configuration hardening, Access Controls, user training, risk analysis, encryption key choices, monitoring, incident response, and Risk Management Policies.
  • Provider responsibilities: data center security, underlying infrastructure protections, baseline service reliability, and certain default controls disclosed in documentation.

Even with strong provider controls, you remain accountable for how PHI is uploaded, shared, retained, and accessed inside your tenant.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Security Rule Requirements in context

  • Administrative safeguards: risk analysis and management, workforce training, policies and procedures, contingency planning.
  • Physical safeguards: facility access, device and media controls, secure disposal of media that may hold ePHI.
  • Technical safeguards: Access Controls, unique user IDs, audit logging, integrity protections, and transmission security.

Business Associate Agreement Requirements

Essential BAA terms for cloud storage

  • Permitted uses and disclosures of PHI, including any de-identification or aggregation language.
  • Obligation to implement Security Rule Requirements and to maintain safeguards appropriate to the risk.
  • Timely reporting of security incidents and potential breaches, including incident details and cooperation duties.
  • Flow-down requirements to subcontractors that may access PHI.
  • Access, amendment, and accounting of disclosures support when requested by you.
  • Return or secure destruction of PHI upon termination, or continued protections if retention is required.
  • Right to receive attestations or summaries of audits, penetration tests, and vulnerability management activities.
  • Data segregation, backup and recovery commitments, and clear roles around encryption and key management.

Negotiation checklist

  • Defined breach/incident notification timeframes and points of contact.
  • Clear responsibilities for encryption at rest and in transit, including FIPS-validated modules when available.
  • Log retention and access for compliance review, with records preserved for at least six years.
  • Geographic data handling disclosures and subcontractor oversight expectations.

Risk Analysis and Management

Perform a rigorous, cloud-aware risk analysis

  • Inventory assets: accounts, buckets, databases, backups, keys, and integrations touching ePHI.
  • Map data flows from ingestion to archival to identify exposure points and third-party dependencies.
  • Evaluate threats such as misconfigurations, public sharing, overly broad roles, orphaned users, and key leakage.
  • Rate likelihood and impact, document findings in a risk register, and tie each to specific mitigations.

Update your analysis whenever you add services, change architectures, or experience incidents. Retain documentation and decisions as part of your Risk Management Policies.

Manage and track risk reductions

  • Create plans of action with owners, deadlines, and acceptance criteria.
  • Automate configuration checks for encryption, public access, and MFA.
  • Continuously monitor logs and alerts, and test incident response playbooks.

Security Measures for ePHI

Technical safeguards to implement

  • Access Controls: enforce least privilege with role- or attribute-based access, MFA, and just-in-time elevation.
  • Audit controls: enable immutable, tamper-evident logging; forward to a SIEM; review high-risk events.
  • Integrity: use object versioning, checksums, and write-once (WORM) retention where appropriate.
  • Transmission security: require TLS 1.2+ end to end; disable legacy protocols and ciphers.
  • Session management: short-lived credentials, automatic logoff, and device posture checks.

Administrative and physical measures

  • Workforce training focused on minimum necessary access, secure sharing, and phishing resistance.
  • Change management for storage policies, lifecycle rules, and network exposure.
  • Vendor due diligence aligned to your risk thresholds and the Shared Responsibility Model.

Data Encryption Best Practices

Data Encryption Standards and configurations

  • At rest: use AES‑256 or better with service-side or envelope encryption; prefer FIPS 140‑2/3 validated modules where available.
  • In transit: enforce TLS 1.2 or 1.3 with modern cipher suites; require certificate validation and perfect forward secrecy.

Key management and operations

  • Select the right model: provider-managed keys, customer-managed keys (CMK), BYOK, or HYOK/HSM based on sensitivity.
  • Rotate keys regularly, segregate keys by environment and dataset, and enforce dual control for key changes.
  • Restrict who can administer vs. use keys; log and alert on all key events; back up critical keys securely.
  • Avoid pitfalls: storing keys alongside data, leaving snapshots unencrypted, or allowing downgrade to weak ciphers.

Data Backup and Recovery Strategies

Design for resilience and compliance

  • Follow the 3‑2‑1 rule: three copies on two media, with one offsite or logically isolated.
  • Use immutable, versioned backups with encryption and separate access paths from production.
  • Define RPO/RTO targets for each workload holding PHI and align provider SLAs accordingly.
  • Replicate across regions where appropriate and validate restorations with regular, documented tests.
  • Include a data backup plan, disaster recovery plan, and emergency mode operations plan to satisfy contingency requirements.

Mobile Device Access Controls

Secure PHI access from phones, tablets, and laptops

  • Enroll devices in MDM/EMM; require full-device or secure-container encryption and strong screen locks.
  • Use phishing-resistant MFA, certificate-based authentication, and per-app or always-on VPN as needed.
  • Block rooted/jailbroken devices; restrict copy/paste, local downloads, and offline caching of PHI.
  • Enable remote wipe, rapid lockout for lost devices, and automated patching and OS updates.
  • Apply conditional access based on device health, location, and risk; log mobile access for auditing.

FAQs.

What is required in a Business Associate Agreement for cloud storage?

A BAA must define permitted uses and disclosures of PHI, require Security Rule-aligned safeguards, mandate prompt incident and breach reporting, flow obligations to subcontractors, support access/amendment/accounting requests, and specify return or destruction of PHI at termination. It should also clarify encryption, logging, backup expectations, and provide a pathway for audit evidence.

How can covered entities ensure HIPAA compliance in the cloud?

Choose services that will sign a BAA, complete a cloud-specific risk analysis, implement least-privilege Access Controls and encryption, enable comprehensive logging, and align backup and recovery with contingency standards. Continuously monitor configurations, train staff, and document Risk Management Policies and processes.

What security measures are essential for protecting PHI in cloud storage?

Enforce MFA and role-based Access Controls, encrypt data at rest and in transit using strong Data Encryption Standards, maintain tamper-evident logs, enable versioning and integrity checks, segment networks, and apply automated alerts and incident response. Pair these with administrative safeguards like training and policy enforcement.

How does the shared responsibility model affect HIPAA compliance?

The provider secures the infrastructure, while you secure configurations, identities, keys, data sharing, monitoring, and response. A clear Shared Responsibility Model prevents gaps by assigning each safeguard—technical, administrative, and physical—to the right owner and verifying it through your risk management process.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles