DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workkloads.

Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

Related

  • Reasons Why You Should Get a Cloud Computing Certification
  • Optimize AWS Solution Architecture for Performance Efficiency
  • Learn More About AWS DevOps Architecture and Tools
  • 12 Expert Tips for Secure Cloud Deployments

Trending

  • Scalable System Design: Core Concepts for Building Reliable Software
  • Enhancing Security With ZTNA in Hybrid and Multi-Cloud Deployments
  • Stateless vs Stateful Stream Processing With Kafka Streams and Apache Flink
  • Understanding and Mitigating IP Spoofing Attacks
  1. DZone
  2. Software Design and Architecture
  3. Cloud Architecture
  4. Architecting HIPAA in Cloud Using AWS

Architecting HIPAA in Cloud Using AWS

Using the AWS platform, any organization can design secure, robust, reliable, and efficient HIPAA eligible solutions.

By 
Chandani Patel Bhagat user avatar
Chandani Patel Bhagat
·
May. 20, 20 · Analysis
Likes (2)
Comment
Save
Tweet
Share
2.7K Views

Join the DZone community and get the full member experience.

Join For Free

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a law in the US published to protect the privacy of patient’s medical records and health-related information provided by/to patients, also known as PHI (Personal Health Information). HIPAA compliance aims to lower the administrative cost in healthcare by defining the standards in the electronic transmission of records. HIPAA is designed to help fight abuse, waste, and fraud in insurance and healthcare delivery. HIPAA applies to “covered entities” and “business associates” including doctors, hospitals, health-related providers, clearinghouses, and health insurance providers. 

Cloud computing is altering the way medics, nurses, and hospitals deliver quality, cost-effective services to their patients. It has the capacity to revolutionize healthcare, rendering it more efficiently through a decentralized approach, and improving the patient-care services and experiences. There are many secured cloud platforms like AWS, Azure, Google, IBM, etc. enabling HIPAA compliant healthcare solutions, however, this blog will be focusing on AWS further. Managing HIPAA compliance in the cloud is more challenging but AWS services help to design and implement high-load systems to process vast amounts of ePHI with HIPAA.

Sign AWS Business Associate Agreement (BAA)

As per HIPAA compliance guidelines, each covered entity must follow the HIPAA security rules. AWS services are certified to ensure HIPAA compliance. AWS signs BAA agreement including legal responsibilities with customers, notifying them in case of any breach on physical infrastructure.

HIPAA Compliance Responsibility is on “Covered Entities” Not on AWS

AWS is responsible for breach of physical infrastructure which means application-level security is Covered Entities’ responsibility who are developing the application. AWS operates with shared responsibility, i.e. AWS is responsible for certain security and compliance for protecting infrastructure on AWS like Compute, Storage, Database, Network, Regions & Availability zones, Edge location. AWS customers are responsible for services they use to create solutions,e.g. Platforms, OS, Applications, Client-Server side encryption, IAM, Network traffic protection, Customer Data.

Encryption and Protection of ePHI

HIPAA security rule addresses the data protection and encryption of PHI in transmission (in transit) and in storage (at rest) in the cloud. AWS offers a set of features and services which provide key management and encryption of PHI.

AWS Services for Encryption


Auditing, Back-Ups and Disaster Recovery

Auditing and monitoring are technical safeguards that must be addressed in cloud architecture. This means any storage, processing or transmission of ePHI information should be logged in the system to track the usage of data. The architecture should have notifications on any unauthorized access and a threat to ePHI. 

The solution must have an emergency plan to protect ePHI information in case of disaster to avoid the loss of patient information. It should plan the backup of collected, stored and used ePHI information with recovery processes, that can enable the restoration of information in case any information is lost.

AWS Services for HIPPA compliance

Authentication and Authorization

A HIPAA-eligible system must document the authentication and authorization mechanism in the System Security Plan with all roles and responsibilities, along with the configuration control process, approvals, and process for all change requests.

Following are a few points to be considered while architecting with AWS:

  • IAM service to provide access to specific services
  • Enable MFA to access AWS accounts
  • Grant Least privileges
  • Rotate credentials regularly

Architecture Strategies

One should not assume that all HIPAA eligible AWS services are secured by default, but it requires several settings to make solution HIPAA eligible. Following are a few strategies which should be applied with HIPAA applications:

  1. Decouple the infrastructure, database and applications which are accessing/processing protected PHI data which can be achieved through,
    1. Turn off all public access, avoid the use of access-secret keys, and use IAM with custom roles and policies and attach identity for accessing the services
    2. Enable the encryption for storage services
  2. Tracking the data flows and setup auto-monitoring and alerts
  3. Keep the boundaries between protected and general workflows. Segregate the network, create external VPC with multi-AZ architecture which separate subnets for different application layers and private subnets for backend application and database layers.

Sample Architecture of HIPAA

HIPPA-compliant 3-tier health application

Above diagram is for 3-tier health care application which is a HIPAA eligible solution:

  1. Route53 is connected to WAF (Web Application Firewall) with Internal Load balancer, with this public networks are avoided, ACM (private security authority) is used to encrypt data in REST using HTTPS
  2. VPC (Virtual Private Cloud) is created with six private subnets in different availability zones for Web, Backend and database tier
  3. 2 internal ELB (Elastic Load Balancing – 1 for web and 1 for backend) with auto-scaling groups to handle & distribute traffic between multiple instances and instruct to launch new instance when a load is high
  4. MySQL and ElasticCache is launched in multiple availability zones with HSM (Hardware Security Module) to encrypt the data
  5. Cloudwatch is configured for a monitor, setup alerts and application logs
  6. CloudTrail, Config and Trusted Advisor are used to audit AWS resources. IAM is used to restrict access to AWS resources and Management console
  7. Inventory is used to get visibility of EC2 instances

Using the AWS platform, any organization can design secure, robust, reliable, and efficient HIPAA eligible solutions. It can help validate existing solutions to identify risks, security measures and loopholes in the system to meet HIPAA compliance requirements for any healthcare solution.

AWS Cloud computing Architecture application Web Service Database security Data (computing)

Opinions expressed by DZone contributors are their own.

Related

  • Reasons Why You Should Get a Cloud Computing Certification
  • Optimize AWS Solution Architecture for Performance Efficiency
  • Learn More About AWS DevOps Architecture and Tools
  • 12 Expert Tips for Secure Cloud Deployments

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!