HIPAA Compliant Terraform Modules
Enforced Before terraform apply
PHI protection requires encryption at rest and in transit, audit logging, access controls, and backup policies. These modules enforce the Technical Safeguards before you deploy.
If your application handles protected health information (PHI), HIPAA's Security Rule applies to your infrastructure — any AWS resource that touches patient data is in scope. Organizations pursuing HITRUST certification will find these controls map directly to HITRUST CSF requirements.
161
Controls
21
Clauses
34
AWS Modules
No credit card or AWS account needed to start.
From the team behind terraform-aws-modules. 2B+ provisions worldwide.
Three Steps to HIPAA Compliant Infrastructure
For terraform-aws-modules users, migration is a one-line change. Same workflow, same interface. Bringing your own modules? We can make those compliant too. Join the beta.
Change One Line
Run Terraform Commands
Compliance Enforced
Every compliance requirement you define is enforced automatically. Nothing to scan, nothing to remediate.
Controls Enforced for HIPAA
161 controls across 21 clauses and AWS services
- AWS WAF rules should have CloudWatch metrics enabled
Additional Controls
153 additional controls enforced for HIPAA
HIPAA Scope: What We Handle vs. What You Own
compliance.tf handles the infrastructure configuration layer for HIPAA. Here is what it covers and what stays with your team.
compliance.tf Enforces for HIPAA
- Technical safeguard controls (encryption, access controls, audit logging)
- HIPAA Security Rule section mapping (§164.312, §164.308)
- Deployment-time evidence generation via AWS-native tools
- Upstream module updates (terraform-aws-modules kept in sync)
- Exception management with audit trail
- Control documentation and safeguard mapping matrices
Your Team Still Handles for HIPAA
- Business Associate Agreements (BAA) execution and management
- Workforce training and security awareness programs
- Physical safeguards for facilities and workstations
- Breach notification procedures and timelines
- Administrative policies and procedures documentation
- Risk analysis and risk management programs
- Patient rights and access request handling
compliance.tf handles Technical Safeguard requirements that map to AWS resource configuration. Administrative and Physical Safeguards remain your organization's responsibility.
HIPAA Audit Evidence, Generated Automatically
Your auditor does not need to trust compliance.tf. Evidence comes from AWS-native tools they already accept.
Evidence your auditor already trusts
Every compliance.tf module enforces controls at deploy time. When AWS Config, Security Hub, or Audit Manager evaluates your resources, they report clean findings because the controls are built into the modules, not bolted on after the fact.
- AWS Config rules validate resource configuration continuously
- Security Hub aggregates findings across accounts and regions
- Audit Manager generates assessment reports mapped to HIPAA
- Downloadable control mapping matrices for your auditor
Prevention vs. Detection for HIPAA
compliance.tf prevents non-compliant deployments. Scanning tools detect them after the fact. Most mature programs use both.
| Dimension | IaC Scanning Checkov / Trivy / Prowler | compliance.tf |
|---|---|---|
| Prevents non-compliant configs before terraform apply | No (post-plan scan) | Yes |
| Maps controls to framework clause IDs | Partial | Yes |
| Produces auditor-accepted evidence (AWS-native) | Scan reports only | Yes |
| Exception management with audit trail | Suppression rules | Yes |
| Same interface as terraform-aws-modules | N/A | Yes |
| Keeps pace with upstream module updates | N/A | Yes |
| Catches runtime drift / console changes | Yes | No |
| Covers non-Terraform resources | Yes | No |
| Internal engineering time | Medium | Low |
We recommend keeping scanning tools active alongside compliance.tf for defense in depth. The scanner validates what compliance.tf already enforces.
HIPAA Compliance Questions
Does compliance.tf sign BAAs?
Which HIPAA safeguards does this cover?
Does this help with HITRUST certification?
How is this different from Checkov, Trivy, or Prowler?
Can I adopt this gradually, or is it all-or-nothing?
Will my auditor accept this as evidence?
What if I want to switch back or compliance.tf shuts down?
Start Deploying HIPAA-Compliant Infrastructure
$100/year for all 34 modules, all frameworks. 30-day free trial.
No credit card required. Switch back at any time.
Stay Informed About New Features
Join the mailing list for releases, new modules, and roadmap updates. No spam. Unsubscribe anytime.
Not convinced yet or dying for a feature we don't have? Send us an email — we really want to hear your feedback!