ServiceNow HIPAA Compliance Guide: BAA, Security Controls, and Best Practices

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

ServiceNow HIPAA Compliance Guide: BAA, Security Controls, and Best Practices

Kevin Henry

HIPAA

May 26, 2025

6 minutes read
Share this article
ServiceNow HIPAA Compliance Guide: BAA, Security Controls, and Best Practices

Business Associate Agreement Overview

A Business Associate Agreement establishes the HIPAA obligations between you (as a covered entity or business associate) and ServiceNow when the platform stores or processes protected health information (PHI). It defines permitted uses and disclosures, required safeguards, breach notification duties, and how subcontractors are bound to the same protections.

Before enabling PHI in any instance, confirm that a Business Associate Agreement is fully executed and that the agreement explicitly scopes which ServiceNow services and environments are HIPAA-eligible. Ensure the BAA addresses log retention expectations, backup and recovery, data return or destruction, and timelines for security incident notification.

Operationalize the BAA by classifying PHI data elements in your catalogs and records, minimizing collection where possible, and documenting data flows for integrations. Align responsibilities and escalation paths with your internal privacy office and security team so BAA commitments translate into day‑to‑day procedures.

  • Verify covered services and instances before any PHI onboarding.
  • Restrict PHI to approved processes; remove or mask it in nonproduction.
  • Collect attestations and evidence that support BAA terms during audits.

Implementing Security Controls

Map ServiceNow configurations to the HIPAA Security Rule using a Risk Management Framework. Start with a control baseline that covers account management, audit logging, encryption, change control, and business continuity. Use policy-to-control mappings so you can trace each configuration back to a HIPAA safeguard.

Governance and control mapping

  • Define a HIPAA control register and assign ownership, testing methods, and evidence sources within your GRC/IRM program.
  • Schedule periodic risk analyses, document findings, and track corrective actions to closure.
  • Apply change management for any configuration that affects PHI handling.

Platform hardening and monitoring

  • Enable audit logs for read/write events on PHI tables and forward logs to your SIEM.
  • Harden integrations by requiring modern ciphers and validating endpoints.
  • Separate duties for developers and administrators; restrict direct database access.

Secure SDLC and data lifecycle

  • Sanitize data in sub‑production; never copy raw PHI to test or dev instances.
  • Use scoped apps, code scanning, and change reviews to prevent insecure scripts.
  • Apply retention policies consistent with legal and BAA requirements.

Managing Access and Authentication

Implement strong identity controls with Single Sign‑On and Multi-Factor Authentication. Enforce least privilege through roles and the Access Control List (ACL) engine to govern table, record, and field access. Review privileges regularly to keep access aligned with job responsibilities.

  • Require SAML or OIDC SSO plus MFA; disable local accounts except for break‑glass.
  • Design role hierarchies that separate clinical, billing, privacy, and admin duties.
  • Use ACL conditions and scripts sparingly; prefer data‑driven rules tied to groups.
  • Set session timeouts, restrict API tokens, and rotate credentials frequently.
  • Run quarterly access re‑certifications and automate joiner/mover/leaver workflows.

Data Encryption Techniques

Protect PHI in transit with Transport Layer Security (TLS) and enforce modern protocol versions and strong cipher suites for web, API, and email channels. For mutual trust, consider mutual TLS for sensitive integrations and require certificate pinning where feasible.

At rest, use platform-provided encryption for databases and attachments, and apply column or field-level encryption to sensitive attributes. For heightened control, consider client-side or edge encryption so encryption keys stay within your environment, along with scheduled key rotation and revocation procedures.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Document a key management plan covering generation, storage, rotation, and disposal.
  • Encrypt integration secrets and validate that backups and logs storing PHI are encrypted.
  • Test recovery to ensure encrypted data remains accessible during incidents.

Compliance Certifications and Standards

HIPAA is a law, not a certification. Instead, you demonstrate due diligence through risk analysis, documented controls, and independent attestations. Align your program to recognized frameworks such as the NIST Risk Management Framework and control catalogs that map to HIPAA requirements.

Leverage commonly referenced attestations and standards—such as SOC 2 Type II and ISO/IEC 27001—and map them to your HIPAA control objectives. Where applicable, use HITRUST CSF mappings to streamline evidence collection, but validate scope and system boundaries so you do not assume coverage where it does not apply.

  • Maintain a living compliance matrix that links HIPAA safeguards to tested controls.
  • Store test results, screenshots, and tickets as audit evidence with clear ownership.
  • Review third‑party attestations annually and reconcile any scope changes.

Incident Response and Vulnerability Management

Build an incident program that rapidly detects, contains, and reports security events involving PHI. Use playbooks for triage, classification, and root‑cause analysis, and rehearse with tabletop exercises. Align notification timelines with the BAA and the HIPAA Breach Notification Rule.

Strengthen response with Incident Response Automation: auto‑enrich indicators, open tasks to accountable teams, and orchestrate containment steps for compromised accounts or integrations. Preserve forensic evidence, and track corrective actions to prevent recurrence.

For vulnerabilities, integrate your scanners through Vulnerability Scanning Integration so findings flow into remediation backlogs. Prioritize exploitable issues on PHI‑touching assets, set SLAs by severity, and manage risk acceptances with time‑bound exceptions and executive approval.

  • Continuously monitor for misconfigurations affecting encryption, access, or logging.
  • Correlate incidents with change records to spot regression risks after releases.
  • Report metrics: time to detect, contain, and remediate, plus open risk by severity.

Shared Responsibility in HIPAA Compliance

ServiceNow secures the underlying cloud infrastructure, core platform services, baseline encryption, and physical facilities, and provides attestations and the Business Associate Agreement. You are responsible for data classification, configuration of security controls, user and role management, integrations, and operational monitoring.

  • Platform provider: data center security, infrastructure patching, service availability, baseline encryption, and BAA commitments.
  • Customer: ACL design, MFA enforcement, PHI minimization, retention policies, audit logging, incident handling, vendor risk, and secure integrations.
  • Shared: vulnerability management, uptime and disaster recovery planning, and evidence collection for audits.

Treat HIPAA as an ongoing program. Tie your ServiceNow HIPAA compliance activities to a Risk Management Framework, automate the highest‑impact controls, and continuously test access, encryption, and response processes to keep PHI protected and audit‑ready.

FAQs

What is a Business Associate Agreement in ServiceNow?

It is a contract that sets HIPAA obligations when ServiceNow handles PHI. The BAA defines allowed uses, required safeguards, breach notification duties, subcontractor requirements, and how PHI is returned or destroyed. You must execute it and confirm which services and instances are covered before storing PHI.

How does ServiceNow handle data encryption for HIPAA?

ServiceNow provides encryption in transit using Transport Layer Security and encryption at rest for stored data. You can add field‑level and client‑side or edge encryption, implement key rotation, and ensure backups and logs containing PHI are encrypted. Document key management and test recovery regularly.

What security controls does ServiceNow implement for HIPAA compliance?

The platform offers access controls, audit logging, baseline encryption, and integration security features. You configure roles, the Access Control List, Multi-Factor Authentication, logging, retention, and monitoring. Use a Risk Management Framework to map and test controls against HIPAA safeguards.

How is the shared responsibility model structured with ServiceNow?

ServiceNow secures the cloud infrastructure and core platform and commits to safeguards through the BAA. You manage data classification, ACLs, MFA, configurations, integrations, logging, and response. Both parties collaborate on vulnerability management, availability, and audit evidence to maintain HIPAA compliance.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles