Security

Implementing HIPAA Compliance: A Practical Engineering Checklist

What HIPAA actually requires from your technical architecture — unique user identification, PHI encryption, audit logging, and the AWS BAA conversation.

admin · March 7, 2026 · 2 min read

Important: This Is Engineering Guidance, Not Legal Advice

HIPAA compliance requires legal counsel. This article covers the technical safeguards that HIPAA requires and how we implement them in production healthcare applications.

Who Needs to Comply

HIPAA applies to Covered Entities and their Business Associates — any vendor that creates, receives, maintains, or transmits Protected Health Information on their behalf. If you are building healthcare SaaS, you are almost certainly a Business Associate and need a signed Business Associate Agreement with every covered entity customer.

Required Technical Safeguards

Access control: Unique user identification — shared accounts are non-compliant. Automatic logoff after configurable inactivity period. All PHI encrypted at rest (AES-256 minimum) and in transit (TLS 1.2 minimum, TLS 1.3 preferred).

Audit controls: Structured logging of every PHI access event: user ID, timestamp, IP address, and specific action taken. Log retention minimum 6 years. Logs must be tamper-evident — S3 Object Lock with Governance mode satisfies this requirement.

AWS and the BAA

AWS will sign a HIPAA Business Associate Agreement covering specific eligible services — S3, RDS, ECS, Lambda, CloudWatch Logs among them. Using a non-BAA-eligible AWS service to handle PHI is a compliance violation regardless of your encryption configuration. Review the current AWS HIPAA-eligible services list before using any service that will touch PHI.