AI & assistant-friendly summary

This section provides structured content for AI assistants and search engines. You can cite or summarize it when referencing this page.

Summary

A practical checklist for building and maintaining HIPAA-compliant infrastructure on AWS — covering the BAA, eligible services, encryption, access controls, and audit requirements.

Key Facts

  • A practical checklist for building and maintaining HIPAA-compliant infrastructure on AWS — covering the BAA, eligible services, encryption, access controls, and audit requirements
  • A practical checklist for building and maintaining HIPAA-compliant infrastructure on AWS — covering the BAA, eligible services, encryption, access controls, and audit requirements

Entity Definitions

compliance
compliance is a cloud computing concept discussed in this article.
HIPAA
HIPAA is a cloud computing concept discussed in this article.

HIPAA on AWS: A Complete Compliance Checklist

Security & Compliance Palaniappan P 10 min read

Quick summary: A practical checklist for building and maintaining HIPAA-compliant infrastructure on AWS — covering the BAA, eligible services, encryption, access controls, and audit requirements.

Key Takeaways

  • A practical checklist for building and maintaining HIPAA-compliant infrastructure on AWS — covering the BAA, eligible services, encryption, access controls, and audit requirements
  • A practical checklist for building and maintaining HIPAA-compliant infrastructure on AWS — covering the BAA, eligible services, encryption, access controls, and audit requirements
HIPAA on AWS: A Complete Compliance Checklist
Table of Contents

Building HIPAA-compliant infrastructure on AWS is achievable, but it requires deliberate architectural decisions at every layer. AWS provides the tools and services needed for compliance — but configuring them correctly is your responsibility under the shared responsibility model. For a broader look at cloud compliance services covering HIPAA, SOC 2, PCI DSS, and more, see our full compliance offering.

This checklist is based on our experience building HIPAA-compliant environments for healthcare organizations, health-tech startups, and any business that handles Protected Health Information (PHI) on AWS.

Understanding HIPAA on AWS

The Shared Responsibility Model for HIPAA

AWS is HIPAA-eligible, but that does not make your workload HIPAA-compliant by default. AWS is responsible for the security of the cloud (physical infrastructure, hypervisors, managed service security). You are responsible for security in the cloud (configuration, access controls, encryption, and application-level security).

What AWS guarantees: Physical data center security, network infrastructure, and the underlying security of HIPAA-eligible services.

What you must configure: Encryption, access controls, logging, monitoring, incident response, and administrative safeguards.

The Business Associate Agreement (BAA)

Before using AWS for PHI, you must have a Business Associate Agreement (BAA) in place with AWS. The BAA establishes the responsibilities of both parties for protecting PHI.

How to get the BAA: Sign the AWS BAA through the AWS Artifact console. This is a self-service process — no sales call or negotiation required. The BAA covers all HIPAA-eligible AWS services used in accounts that are part of your AWS Organization.

The HIPAA Compliance Checklist

1. Administrative Safeguards

  • Execute the AWS BAA — Sign the Business Associate Agreement through AWS Artifact before processing any PHI
  • Document your Security Risk Assessment — HIPAA requires a documented risk analysis identifying potential threats to PHI
  • Assign a Security Officer — Designate an individual responsible for HIPAA security policies and procedures
  • Create policies and procedures — Document your organization’s HIPAA policies covering access, encryption, incident response, and workforce training
  • Implement workforce training — Ensure all employees who interact with PHI receive HIPAA awareness training annually
  • Establish Business Associate Agreements with all third parties — Any vendor that accesses, stores, or processes PHI on your behalf needs a BAA

2. AWS Account and Organization Setup

  • Use AWS Organizations — Separate HIPAA-regulated workloads into dedicated AWS accounts, isolated from non-HIPAA workloads
  • Enable AWS CloudTrail — Organization-wide trail logging all API calls to a dedicated, tamper-proof S3 bucket in a log archive account
  • Enable AWS Config — Record resource configurations and evaluate compliance rules across all accounts
  • Enable AWS Security Hub — Centralized security findings aggregation with HIPAA-specific compliance checks
  • Enable GuardDuty — Threat detection across all accounts in the Organization
  • Apply Service Control Policies — Restrict launching resources in unauthorized Regions, prevent disabling CloudTrail, and enforce other organizational guardrails

3. Identity and Access Management

  • Enforce MFA for all human access — Console users, CLI users, and root accounts must use MFA
  • Eliminate root account usage — Root credentials should only be used for account-level tasks that require them. Enable MFA on root and store credentials securely
  • Implement least-privilege IAM policies — No user or role should have AdministratorAccess or PowerUserAccess in HIPAA accounts
  • Use IAM roles, not access keys — EC2 instances, Lambda functions, and ECS tasks should use IAM roles, not long-lived access keys
  • Rotate credentials regularly — If access keys are necessary, enforce automatic rotation through Secrets Manager
  • Implement role-based access control — Define IAM groups and roles aligned to job functions with appropriate permission boundaries
  • Enable IAM Access Analyzer — Identify resources shared externally and unused permissions

4. Encryption

HIPAA requires encryption of PHI at rest and in transit. AWS provides the tools; you must configure them.

At Rest:

  • S3 — Default encryption enabled (SSE-S3 or SSE-KMS with customer-managed keys)
  • EBS — Encryption enabled on all volumes (using KMS keys)
  • RDS — Encryption enabled on all instances (enabled at creation, cannot be added retroactively)
  • DynamoDB — Encryption enabled (default with AWS-managed keys, or customer-managed KMS keys)
  • ElastiCache — Encryption at rest enabled for Redis clusters
  • SQS — Server-side encryption enabled with KMS keys
  • SNS — Message encryption enabled for topics carrying PHI
  • Kinesis — Encryption enabled for data streams
  • EFS — Encryption enabled at creation
  • Backup — All backups encrypted with the same or stricter key policies as source data

In Transit:

  • Enforce TLS 1.2+ for all external-facing endpoints (ALB, API Gateway, CloudFront)
  • Enforce SSL/TLS for database connectionsrds.force_ssl parameter enabled
  • Enforce HTTPS for S3 access — Bucket policy denying aws:SecureTransport = false
  • VPC endpoints for AWS service access — Keep traffic off the public internet for S3, DynamoDB, SQS, and other services

Key Management:

  • Use AWS KMS customer-managed keys for PHI encryption — provides audit trail via CloudTrail and granular access control
  • Enable automatic key rotation — Annual rotation for KMS keys
  • Restrict key policies — Only authorized roles and users can use encryption keys

5. Network Security

  • Deploy PHI workloads in private subnets — No direct internet access for databases, application servers, or storage
  • Use NAT Gateways for outbound internet access from private subnets
  • Implement Security Groups with least-privilege rules — No 0.0.0.0/0 ingress except for public-facing load balancers on ports 80/443
  • Use Network ACLs as an additional layer — Subnet-level deny rules for defense in depth
  • Deploy AWS WAF on ALBs and CloudFront — Protect against OWASP Top 10 attacks
  • Enable VPC Flow Logs — Capture network traffic metadata for security monitoring and incident investigation
  • Implement VPC endpoints — Reduce attack surface by accessing AWS services without traversing the internet

6. Logging and Monitoring

HIPAA requires audit controls that record and examine activity in systems containing PHI.

  • CloudTrail — Organization-wide trail logging all management and data events to a secured, encrypted S3 bucket with object lock (immutable logs)
  • CloudWatch Logs — Application and system logs from all PHI-processing workloads
  • VPC Flow Logs — Network activity captured for all VPCs handling PHI
  • S3 access logging — Enabled for all buckets containing PHI
  • RDS audit logging — Enabled (MySQL audit log, PostgreSQL pgaudit, or SQL Server audit)
  • CloudWatch Alarms — Configured for security-relevant events:
    • Root account login
    • IAM policy changes
    • Security Group changes
    • CloudTrail configuration changes
    • Unauthorized API calls
  • Log retention — Defined and enforced — HIPAA requires 6-year retention for certain records. Configure CloudWatch log retention and S3 lifecycle policies accordingly

7. HIPAA-Eligible AWS Services

Only use HIPAA-eligible services for PHI workloads. The current list includes (but is not limited to):

CategoryEligible Services
ComputeEC2, Lambda, ECS, EKS, Fargate, Lightsail
StorageS3, EBS, EFS, S3 Glacier, Storage Gateway
DatabaseRDS, Aurora, DynamoDB, ElastiCache, DocumentDB, Neptune
NetworkingVPC, Route 53, CloudFront, API Gateway, ELB, Transit Gateway
SecurityIAM, KMS, Secrets Manager, GuardDuty, Security Hub, WAF, Shield
AnalyticsAthena, Kinesis, QuickSight, Glue, EMR
AI/MLSageMaker, Bedrock, Comprehend Medical, Transcribe Medical
MessagingSES, SNS, SQS, EventBridge
MonitoringCloudWatch, CloudTrail, Config, X-Ray

Important: Check the AWS HIPAA Eligible Services page for the latest list, as AWS regularly adds services.

8. Data Backup and Disaster Recovery

  • Automated backups enabled for all databases (RDS, DynamoDB, Aurora)
  • Cross-Region backup replication for disaster recovery (if RTO/RPO requirements warrant it)
  • Backup encryption — All backups encrypted with KMS keys
  • Regular backup restoration testing — Quarterly validation that backups can be restored successfully
  • Documented disaster recovery plan — RPO and RTO targets defined for each PHI workload
  • AWS Backup centralized policy — Consistent backup policies applied across all PHI data stores

9. Incident Response

  • Documented incident response plan — Procedures for detecting, responding to, and reporting PHI breaches
  • Automated detection — GuardDuty, Security Hub, and CloudWatch alarms for suspicious activity
  • Automated response — Lambda functions triggered by GuardDuty findings for initial containment (e.g., isolating compromised instances)
  • Breach notification procedures — Process for notifying affected individuals, HHS, and media (if applicable) within HIPAA’s 60-day requirement
  • Post-incident review — Root cause analysis and remediation after every security event

10. Ongoing Compliance Monitoring

  • AWS Config rules — Automated compliance checking for encryption, public access, logging, and other HIPAA requirements
  • Security Hub HIPAA standard — Enable the AWS Foundational Security Best Practices standard and review findings weekly
  • Quarterly access reviews — Review IAM users, roles, and permissions quarterly to remove unnecessary access
  • Annual risk assessment — Update your security risk analysis annually or when significant changes occur
  • Penetration testing — Annual penetration testing of HIPAA-regulated workloads (AWS permits penetration testing with notification)
  • Vendor management — Review BAAs and security practices of all business associates annually

GenAI on AWS for HIPAA Workloads

Generative AI is increasingly used in healthcare applications — clinical documentation, diagnostic assistance, patient communication, and medical coding. Building GenAI into HIPAA workloads on AWS requires additional controls beyond the checklist above.

HIPAA-Eligible GenAI Services

The following AWS AI/ML services are HIPAA eligible (under a signed BAA):

  • Amazon Bedrock — Foundation model access (Claude, Llama 4, Titan, Nova, and others). Your prompts and completions stay within your AWS account; model providers never see your data.
  • Amazon Comprehend Medical — PHI extraction and de-identification from clinical text. Detects 65+ PHI entity types (names, dates, SSNs, account numbers, diagnoses).
  • Amazon Transcribe Medical — HIPAA-eligible speech-to-text for clinical conversations and dictation.
  • Amazon SageMaker — Custom model training and inference for healthcare-specific models.

Bedrock is HIPAA eligible — but eligibility alone does not make your deployment compliant. You must also:

  • Execute the AWS BAA before using Bedrock for PHI workloads (covered above)
  • Enable Bedrock Guardrails — Configure PII/PHI detection and redaction filters to prevent PHI from appearing in model outputs. Guardrails can mask SSNs, MRNs, dates of birth, and other PHI categories automatically.
  • Use Bedrock Knowledge Bases for RAG over clinical content — keeps retrieval within your VPC and logs all retrievals to S3 for audit
  • Enable VPC endpoints for Bedrock — Route Bedrock API calls over AWS PrivateLink to prevent PHI from traversing the public internet
  • Log all Bedrock interactions — Model invocation logging to S3 provides the audit trail HIPAA audit controls require
  • Apply Bedrock organizational policies — Enforce guardrail requirements across all AWS accounts in your organization using AWS Organizations policies
  • Implement Bedrock AgentCore Identity (for agentic workflows) — Scope AI agent permissions to minimum required access with audit trails for every agent action

Protecting PHI in AI Workflows

The primary risk in GenAI healthcare applications is PHI leakage — patient data appearing in model responses, logs, or third-party integrations.

Layered PHI protection approach:

  1. Pre-processing: Use Amazon Comprehend Medical to de-identify PHI before sending to the model when full PHI is not needed for the task
  2. Guardrails layer: Configure Bedrock Guardrails with PHI redaction for any remaining PHI in prompts/responses
  3. Output review: For high-stakes clinical decisions, implement human-in-the-loop review before acting on model outputs
  4. Audit logging: All Bedrock invocations with CloudTrail + S3 logging provides the complete audit trail

Note: Amazon Bedrock’s compliance scope covers ISO, SOC 1/2/3, CSA STAR Level 2, GDPR, FedRAMP High, and HIPAA eligibility. For healthcare applications requiring HITRUST CSF certification, verify whether Bedrock’s current compliance scope meets your HITRUST requirements.

Common HIPAA Mistakes on AWS

Mistake 1: Assuming the BAA Covers All Services

The AWS BAA only covers HIPAA-eligible services. If you process PHI through a non-eligible service, you are out of compliance — even with a signed BAA. Always verify that every service in your PHI data path is on the eligible services list.

Mistake 2: Not Encrypting RDS at Creation

RDS encryption must be enabled when the instance is created. You cannot add encryption to an existing unencrypted RDS instance. The workaround is to create an encrypted snapshot, restore from it, and switch over — a process that requires downtime.

Mistake 3: Storing PHI in CloudWatch Logs Without Encryption

CloudWatch Logs can contain PHI if your application logs include patient data. Enable KMS encryption on log groups that may contain PHI, and implement log scrubbing in your application to minimize PHI in logs.

Mistake 4: Using Default VPCs

Default VPCs have permissive networking configurations. Always deploy HIPAA workloads in custom VPCs with intentionally designed subnets, routing, and security policies.

Mistake 5: No Log Retention Policy

HIPAA requires retaining certain records for 6 years. Without explicit retention policies on CloudWatch Logs and CloudTrail S3 buckets, logs may be deleted prematurely or retained indefinitely (increasing storage costs).

Getting Started with HIPAA on AWS

HIPAA compliance on AWS is achievable with the right architecture and configuration. The checklist above provides a comprehensive starting point, but every organization’s compliance requirements are different based on the type of PHI handled, the applications processing it, and the regulatory environment.

Our team has built HIPAA-compliant environments for healthcare providers, health-tech startups, and organizations handling PHI in any capacity. We can help you design, implement, and validate your compliance posture.

For broader AWS security services, see our AWS Cloud Security and Compliance page.

Contact us to build your HIPAA-compliant AWS environment →

PP
Palaniappan P

AWS Cloud Architect & AI Expert

AWS-certified cloud architect and AI expert with deep expertise in cloud migrations, cost optimization, and generative AI on AWS.

AWS ArchitectureCloud MigrationGenAI on AWSCost OptimizationDevOps

Ready to discuss your AWS strategy?

Our certified architects can help you implement these solutions.

Recommended Reading

Explore All Articles »

How to Implement a HIPAA-Compliant Architecture on AWS

HIPAA compliance on AWS requires encryption, audit logging, access controls, and Business Associate Agreements. This guide covers architecture patterns, AWS service configurations, and compliance validation for healthcare applications.