46 HIPAA Controls Mapped

HIPAA Compliance for Healthcare Tech Teams

Prove PHI protection with your Terraform configurations. Map IaC to HIPAA Security Rule requirements automatically. No more compliance spreadsheets.

Start HIPAA Assessment See Coverage

Security Rule Safeguards

We map your cloud infrastructure to all three categories of HIPAA Security Rule safeguards.

Administrative Safeguards

Policies, procedures, and organizational requirements

  • 164.308(a)(1) - Security Management
  • 164.308(a)(3) - Workforce Security
  • 164.308(a)(4) - Information Access
  • 164.308(a)(5) - Security Awareness

Physical Safeguards

Physical access to systems and facilities

  • 164.310(a)(1) - Facility Access
  • 164.310(b) - Workstation Use
  • 164.310(c) - Workstation Security
  • 164.310(d)(1) - Device Controls

Technical Safeguards

Technology controls protecting ePHI

  • 164.312(a)(1) - Access Control
  • 164.312(b) - Audit Controls
  • 164.312(c)(1) - Integrity Controls
  • 164.312(e)(1) - Transmission Security

PHI Protection, Proven in Code

Your Terraform configurations already implement HIPAA requirements. We extract and present them as audit evidence.

164.312(a)(2)(iv) - Encryption at Rest

# RDS database with PHI resource "aws_db_instance" "phi_db" { storage_encrypted = true kms_key_id = aws_kms_key.phi.arn # HIPAA: ePHI encrypted with # customer-managed KMS key }

164.312(e)(2)(ii) - Encryption in Transit

# ALB with TLS 1.2+ resource "aws_lb_listener" "https" { port = 443 protocol = "HTTPS" ssl_policy = "ELBSecurityPolicy-TLS13-1-2-2021-06" # HIPAA: TLS 1.2 minimum for PHI transit }

164.312(b) - Audit Controls

# CloudTrail for PHI access logging resource "aws_cloudtrail" "hipaa" { name = "hipaa-audit-trail" is_multi_region_trail = true enable_log_file_validation = true kms_key_id = aws_kms_key.logs.arn }

164.312(a)(1) - Access Control

# IAM policy with least privilege resource "aws_iam_policy" "phi_access" { policy = jsonencode({ Statement = [{ Effect = "Allow" Action = ["s3:GetObject"] Resource = "arn:aws:s3:::phi-bucket/*" Condition = { Bool = { "aws:SecureTransport": "true" }} }] }) }

Simplify HIPAA Compliance

Stop manually documenting security controls. Let your Terraform speak for itself.

Start Free Assessment