HIPAA Security Rule 2003
Deprecated Framework
This framework has been superseded by HIPAA Omnibus Final Rule 2013. Organizations should migrate to the 2013 rule, which strengthened privacy and security protections and expanded compliance obligations to business associates.
Best for: Covered entities and business associates that create, receive, maintain, or transmit electronic protected health information (ePHI). This includes hospitals, clinics, health insurers, billing companies, and cloud providers handling ePHI under a BAA. There is no size or revenue threshold. SaaS vendors serving healthcare customers are business associates and must comply directly. HHS OCR enforcement carries civil penalties up to $2.13 million per violation category per year.
🏛 U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) · HIPAA Security Rule 2003 (superseded by Omnibus 2013) Official source →
Get Started
module "..." {
source = "hipaasecurity2003.compliance.tf/terraform-aws-modules/<module>/aws"
version = "<version>"
}
What Compliance.tf Covers vs. What You Handle
What Compliance.tf automates
- Audit Logging and Monitoring: Nine controls covering CloudTrail configuration (multi-region, S3 data events, log validation, CloudWatch integration), API Gateway stage logging, CloudFront access logs, CloudWatch log group retention at 365 days, and CodeBuild project logging.
- Encryption at Rest: Verifies encryption on API Gateway stage caches, CloudTrail log files (KMS CMK), and AWS Backup recovery points. The full benchmark extends coverage to S3, EBS, RDS, and other storage services beyond the sample controls shown here.
- Encryption in Transit: Checks CloudFront TLS enforcement and ACM certificate expiration within 30 days. The full benchmark adds ELB listener configurations and other transit encryption checks.
- Backup and Recovery: Four controls: AWS Backup plan retention minimums (35 days), recovery point retention periods, manual deletion protection on recovery points, and Auto Scaling health check configuration for availability.
- Incident Response Readiness: Checks that the AWS account security contact is registered and that CloudWatch alarms have configured actions, confirming alerts are wired to responsible personnel.
What you handle
- Audit Logging and Monitoring: Defining which logs constitute your ePHI audit trail, establishing review procedures, and training workforce members on log analysis. You also need a documented process for responding when log anomalies are detected.
- Encryption at Rest: Key management policy, rotation schedules, IAM-based key access restrictions, and documented encryption standards. The addressable specification under §164.312(a)(2)(iv) requires you to assess whether encryption is reasonable and appropriate for your environment and record your rationale if you choose an alternative measure.
- Encryption in Transit: Selecting minimum TLS versions, managing certificate lifecycle beyond expiration alerting, and confirming that all network paths carrying ePHI (including internal service-to-service traffic) enforce encryption.
- Backup and Recovery: Developing and testing a full contingency plan per §164.308(a)(7), including disaster recovery and emergency mode operation procedures. This means documented RTO/RPO targets, periodic recovery testing, and a process for activating emergency mode operations.
- Incident Response Readiness: Writing an incident response plan that satisfies §164.308(a)(6), training your workforce on breach notification procedures under the HITECH Act's Breach Notification Rule, and running periodic tabletop exercises. Compliance.tf confirms the alerting infrastructure exists but cannot verify your human response processes.
Controls by Category
Administrative Safeguards: Contingency Plan (§164.308(a)(7)) (1 control)
The paper-versus-practice gap is where organizations fail §164.308(a)(7) most often. A documented backup policy does not satisfy an auditor who can demonstrate that manual deletion of recovery points was never disabled. Assessors want retention enforced at the infrastructure level, not just described in a policy document, and they check health check configurations as evidence that availability commitments are backed by actual controls.
Administrative Safeguards: Security Management Process (§164.308(a)(1)) (1 control)
A missing security contact on an AWS account is a concrete signal that incident response ownership has not been formalized. Alongside designated contacts, assessors check for active alarm configurations, confirming both that the organization can detect security events and that someone is wired to receive the alert. §164.308(a)(1) requires procedures to prevent, detect, contain, and correct security violations, and these two controls are the minimum infrastructure evidence for that requirement.
Technical Safeguards: Audit Controls (§164.312(b)) (7 controls)
The most common finding here is logging enabled on primary services but absent from supporting infrastructure like API gateways and build pipelines. §164.312(b) requires hardware, software, and procedural mechanisms that record and examine activity in systems containing ePHI. Assessors want to see log integrity controls (CloudTrail validation is the obvious one) and retention periods long enough to support incident investigations.
Technical Safeguards: Encryption at Rest (§164.312(a)(2)(iv)) (2 controls)
Backup recovery points and API Gateway caches are where assessors most often find gaps. The core question is whether ePHI at rest is encrypted as an access control mechanism and whether key management is defensible. KMS-managed CMKs carry more weight than default encryption when you're explaining your key management posture.
Technical Safeguards: Transmission Security (§164.312(e)(1)) (1 control)
Expect an assessor to examine TLS configuration, certificate validity, and HTTPS enforcement on every public-facing endpoint carrying ePHI. Expired or soon-to-expire certificates get flagged because they can trigger fallback to unencrypted connections or availability outages. Internal service-to-service paths are a frequent gap that falls outside what these controls check.
Additional Controls (58)
AWS Database Migration Service (1)
AWS IAM (1)
AWS Lambda (2)
AWS WAF (1)
Amazon CloudWatch Logs (1)
Amazon DynamoDB (3)
Amazon DynamoDB Accelerator (1)
Amazon EBS (1)
Amazon EC2 (3)
Amazon EFS (2)
Amazon EKS (1)
Amazon EMR (1)
Amazon ElastiCache (1)
Amazon OpenSearch Service (4)
Amazon RDS (6)
Amazon Redshift (5)
Amazon S3 (12)
Amazon SNS (1)
Amazon SageMaker (4)
Elastic Load Balancing (4)
Other (3)
Related Frameworks
Frequently Asked Questions
Does HIPAA apply to my organization if we only handle ePHI as a vendor, not as a healthcare provider?
Yes. If you create, receive, maintain, or transmit ePHI on behalf of a covered entity, you are a business associate under HIPAA. The HITECH Act of 2009, implemented through the 2013 Omnibus Rule, made business associates directly liable for compliance with the HIPAA Security Rule (administrative, physical, and technical safeguards) and certain Privacy and Breach Notification Rule provisions. You must sign a Business Associate Agreement (BAA) and implement the required safeguards independently. This applies to cloud providers, SaaS companies, IT consultants, and any other vendor with access to ePHI.
Is there a formal HIPAA certification or audit report like SOC 2?
No. HHS does not recognize any official HIPAA certification, and there is no accredited third- party certification program. Organizations demonstrate compliance through documented risk assessments, policies, and evidence of implemented controls. Firms that offer 'HIPAA compliance assessments' produce a report, but it carries no regulatory standing. HHS OCR evaluates compliance through its own investigations and audit program. Your primary compliance artifact is a thorough, current risk analysis per §164.308(a)(1)(ii)(A).
How does the 'addressable' vs 'required' distinction work for implementation specifications?
Required specifications must be implemented as stated. Addressable specifications require you to assess whether the specification is reasonable and appropriate for your environment. If it is, implement it. If not, document why and implement an equivalent alternative, or document why the safeguard does not apply. 'Addressable' does not mean optional. Failing to document your rationale for not implementing an addressable specification is itself a violation. Encryption under §164.312(a)(2)(iv) and §164.312(e)(2) are the most common addressable specifications where organizations must make and record this decision.
How often must we conduct a HIPAA risk assessment?
The Security Rule at §164.308(a)(1)(ii)(A) requires an accurate and thorough risk analysis but does not specify a frequency. HHS OCR guidance and enforcement history make clear that risk assessments must be reviewed and updated periodically and whenever significant environmental changes occur. Annual reviews are the widely accepted standard. OCR has penalized organizations that performed a risk assessment once and never revisited it. Major infrastructure changes, new systems processing ePHI, and security incidents should all trigger a reassessment.
What is the relationship between this 2003 Security Rule and the HITECH Act?
The HITECH Act (2009) substantially strengthened HIPAA enforcement. It extended Security Rule obligations directly to business associates, introduced mandatory breach notification requirements, restructured civil monetary penalties with a statutory annual cap of $1.5 million per violation type (adjusted annually for inflation to over $2 million at the top tier), and authorized state attorneys general to bring HIPAA enforcement actions. The 2013 Omnibus Rule codified HITECH's changes into the HIPAA regulations. The controls in this benchmark address the Security Rule as modified by those subsequent rules.