Getting Started

HIPAA Compliance for SaaS: A Complete Guide

Healthcare customers will not sign your contract without HIPAA compliance for SaaS—and they should not. If your SaaS handles protected health information (PHI), you are responsible for safeguards that protect patient privacy and keep your business out of regulatory trouble.

This guide explains what HIPAA compliance means for SaaS providers, who falls under its requirements, and how to implement the administrative, technical, and physical safeguards that help you stay audit-ready.

What Is HIPAA Compliance for SaaS?

HIPAA compliance for SaaS means your software and operations meet all applicable HIPAA Security Rule standards when handling PHI.

The Health Insurance Portability and Accountability Act (HIPAA) sets federal requirements for protecting sensitive health data. If your SaaS creates, receives, maintains, or transmits PHI for healthcare customers, you fall under HIPAA.

For cloud-based software providers, compliance involves:

  • Implementing administrative, physical, and technical safeguards

  • Signing Business Associate Agreements (BAAs) with healthcare customers

  • Maintaining documented policies and procedures that show how you protect PHI

Who Needs HIPAA Compliance?

Where you fit in the HIPAA ecosystem determines your obligations.

Covered Entities

Covered entities are directly regulated by HIPAA. They include:

  • Healthcare providers who transmit health information electronically

  • Health plans

  • Healthcare clearinghouses

Business Associates

Business associates handle PHI on behalf of covered entities. Most SaaS companies that support healthcare workloads become business associates when they:

  • Store patient records

  • Process claims or billing data

  • Host infrastructure where PHI resides

Cloud hosting providers can also be business associates when their services involve PHI.

The 18 PHI Identifiers Under HIPAA

Health information becomes “protected” when it includes any of 18 specific identifiers tied to an individual. These include:

  • Names

  • Geographic data smaller than a state

  • Dates related to an individual (for example, birth dates, admission dates)

  • Phone numbers and email addresses

  • Social Security numbers and medical record numbers

  • Health plan beneficiary numbers and account numbers

  • Certificate or license numbers and vehicle identifiers

  • Device identifiers and serial numbers

  • Web URLs and IP addresses

  • Biometric identifiers

  • Full-face photographs and similar images

  • Any other unique identifying characteristic

If your SaaS handles data that combines health information with any of these identifiers, HIPAA likely applies.

The Four Main HIPAA Rules

Four core rules define HIPAA compliance requirements for healthcare SaaS companies.

Privacy Rule

The Privacy Rule governs how PHI can be used and disclosed. For SaaS providers, this means understanding permissible uses and ensuring your platform supports appropriate access and restrictions.

Security Rule

The Security Rule requires administrative, physical, and technical safeguards to protect electronic PHI (ePHI). This rule has the most direct impact on SaaS architecture, configuration, and day-to-day operations.

Breach Notification Rule

When PHI is compromised, HIPAA defines who you must notify and by when. Affected individuals, the Department of Health and Human Services (HHS), and in some cases media outlets must be notified within specific timeframes.

Enforcement Rule

The Office for Civil Rights (OCR) enforces HIPAA through complaint investigations and compliance audits. Penalties range from corrective action plans to fines up to $2,190,294 per violation.

HIPAA Safeguards for Cloud-Native Healthcare SaaS

The Security Rule organizes safeguards into three categories. Each category matters for cloud-native SaaS.

Administrative Safeguards

Administrative safeguards focus on policies, procedures, and workforce management, including:

  • Security management process: Policies for identifying and mitigating risks

  • Workforce training: Regular education on HIPAA requirements and security practices

  • Access management: Procedures for granting and revoking system access

  • Contingency planning: Backup, disaster recovery, and emergency operation procedures

Physical Safeguards

Physical safeguards address facility and device security.

In cloud-native environments, many data center controls are managed by your cloud provider. You remain responsible for:

  • Workstation security (for example, laptops used to access PHI)

  • Media disposal (for example, secure wiping of storage devices)

Technical Safeguards

Technical safeguards protect ePHI through technology, including:

  • Access controls: Unique user IDs and role-based permissions

  • Audit controls: Logging of access and activity involving ePHI

  • Integrity controls: Mechanisms to prevent unauthorized data alteration

  • Transmission security: Encryption for data in transit

Required vs. Addressable Safeguards

A common point of confusion is the difference between required and addressable safeguards.

Safeguard TypeDefinitionImplementation Requirement
RequiredImplemented exactly as specifiedNo flexibility—implement as written
AddressableAssessed for reasonablenessImplement, implement alternative, or document why not applicable

“Addressable” does not mean optional — HHS has proposed making all safeguards required. For addressable safeguards, you must:

  1. Assess whether the safeguard is reasonable for your environment.

  2. If it is, implement it.

  3. If not, document your reasoning and implement an equivalent alternative control.

How to Implement HIPAA Compliance for SaaS Providers

A step-by-step approach helps you avoid gaps in your HIPAA program.

1. Conduct a HIPAA Risk Assessment

Start by mapping where PHI exists in your systems, how it flows between components, and what vulnerabilities could expose it. This assessment forms the foundation of your compliance program and should be updated regularly, especially after major system or process changes. Automated risk assessments can reduce manual effort and strengthen this process over time.

2. Develop Policies and Procedures

Document:

Written policies show your compliance posture and guide daily operations.

3. Implement Technical Security Controls

Translate policy into practice with technical controls:

  • Encryption at rest and in transit to protect data throughout its lifecycle

  • Unique user IDs to ensure accountability

  • Role-based access controls to limit PHI exposure

  • Automatic session timeouts

  • Comprehensive audit logging

4. Execute Business Associate Agreements

BAAs define the legal relationship between your SaaS and covered entities. They outline:

  • Permitted uses and disclosures of PHI

  • Security obligations

  • Breach notification responsibilities

5. Train Your Workforce on HIPAA Requirements

Provide initial training and ongoing refreshers for every team member with access to PHI. Document all training activities—auditors will ask for evidence.

6. Establish Documentation and Audit Trails

HIPAA requires you to retain policies for at least six years.

Beyond retention, you should:

  • Maintain audit trails of key security activities

  • Keep evidence of control operation readily accessible for compliance reviews

7. Create Breach Response Procedures

Your incident response plan should define:

  • How you investigate potential breaches

  • How you determine notification requirements

  • How you execute internal and external communication workflows

HIPAA-Compliant Software Checklist

Use this checklist to evaluate whether your SaaS supports HIPAA requirements.

Access Controls and Authentication

  • Unique user IDs for every account

  • Role-based access limiting PHI exposure

  • Multi-factor authentication (MFA)

  • Automatic session termination after inactivity

Encryption Standards

  • Encryption of ePHI at rest and in transit

  • Use of strong, industry-standard algorithms (for example, AES-256 for storage and TLS 1.2+ for transmission)

Audit Logging and Monitoring

  • Logging of all access to ePHI

  • Log retention aligned with your policies and regulatory expectations

  • Monitoring for suspicious activity patterns

Data Backup and Recovery

  • Regular backups

  • Documented disaster recovery procedures

  • Periodic testing of recovery processes

Vendor and Third-Party Management

  • Risk evaluation for subcontractors who may access PHI

  • BAAs with each relevant vendor

  • Ongoing oversight of vendor security and compliance posture

How to Maintain Continuous HIPAA Compliance

Reaching compliance once is not enough. Maintaining HIPAA compliance requires ongoing attention.

Automate Evidence Collection

Manual evidence gathering is slow, error-prone, and hard to scale.

Platforms like Drata automate evidence collection across your tech stack, reduce manual work, and help keep documentation current and organized for audits.

Monitor Controls in Real Time

Point-in-time assessments miss configuration drift between audits.

Continuous monitoring helps you:

  • Detect configuration changes and control failures sooner

  • Respond to issues before they lead to violations

Conduct Regular Risk Assessments

Risk assessments are not one-time exercises. Reassess when you:

  • Add new systems or integrations

  • Experience security incidents

  • Make significant organizational or infrastructure changes

HIPAA Compliance and Other Frameworks for Healthcare SaaS Companies

Most healthcare SaaS companies pursue multiple frameworks at once. HIPAA often overlaps with:

SOC 2

SOC 2 security controls overlap significantly with HIPAA requirements. Many organizations pursue both, using shared controls to reduce duplicate effort.

ISO 27001

ISO 27001 is an international standard for information security management. It provides a comprehensive framework that supports HIPAA-related controls and shows security maturity to global customers.

HITRUST CSF

The HITRUST Common Security Framework incorporates HIPAA requirements into a certifiable framework. Healthcare enterprises increasingly request HITRUST certification from their vendors.

Drata can help you manage controls and evidence that support HIPAA, SOC 2, ISO 27001, and HITRUST, but third-party assessments and certifications are issued by independent auditors and certification bodies.

HIPAA Violation Penalties

Non-compliance carries real consequences in both civil and criminal categories.

Civil Penalty Tiers

TierLevel of CulpabilityConsequence
Tier 1Unknowing violationLowest penalties
Tier 2Reasonable causeModerate penalties
Tier 3Willful neglect, correctedHigher penalties
Tier 4Willful neglect, not correctedMaximum penalties

Criminal Penalties

Willful violations can result in criminal charges, substantial fines, and imprisonment.

Breach Notification Obligations

Breaches affecting 500 or more individuals require notification to:

  • Affected individuals

  • HHS

  • Prominent media outlets in the relevant state or jurisdiction

These notifications must occur without unreasonable delay and no later than 60 days after discovery.

Turn HIPAA Compliance into a Competitive Advantage

HIPAA compliance opens doors to healthcare customers in a market projected at $37.68 billion who will not consider vendors without it.

Instead of viewing compliance as a burden, treat it as a trust signal that:

  • Accelerates sales cycles

  • Reduces security review friction

  • Differentiates your SaaS in a crowded market

FAQs About HIPAA Compliance for Saa

No. There is no official government HIPAA certification.

SaaS providers demonstrate HIPAA alignment through:

  • Third-party assessments and audits

  • Documented policies and procedures

  • Independent certifications and attestations (for example, HITRUST) that include HIPAA-related controls

Timelines vary based on:

  • Your current security posture

  • System complexity

  • Existing documentation and control maturity

Companies with mature security programs typically move faster than organizations starting from scratch.

Yes. Major cloud providers offer HIPAA-eligible services and will sign BAAs.

You remain responsible for:

  • Choosing HIPAA-eligible services

  • Configuring them securely

  • Operating them in line with your policies and HIPAA requirements

  • HIPAA compliant: An organization follows HIPAA rules and can show how it protects PHI.

  • HIPAA certified: Not an official designation—there is no government HIPAA certification program.

Third-party frameworks like HITRUST provide certifiable validation that can include HIPAA-related requirements.

No. Encryption is one safeguard among many.

You still need:

  • Administrative safeguards

  • Workforce training

  • Policies and procedures

  • BAAs

  • All other applicable safeguards under HIPAA

HIPAA does not set a specific frequency.

Risk assessments should occur:

  • On a regular cadence (for example, annually)

  • Whenever you make significant changes to systems, processes, or your threat environment


APRIL 27, 2026
HIPAA Collection
Navigate HIPAA With Confidence
Get a Demo

Navigate HIPAA With Confidence