Architecting HIPAA in Cloud Using AWS
Using the AWS platform, any organization can design secure, robust, reliable, and efficient HIPAA eligible solutions.
Join the DZone community and get the full member experience.
Join For FreeThe Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a law in the US published to protect the privacy of patient’s medical records and health-related information provided by/to patients, also known as PHI (Personal Health Information). HIPAA compliance aims to lower the administrative cost in healthcare by defining the standards in the electronic transmission of records. HIPAA is designed to help fight abuse, waste, and fraud in insurance and healthcare delivery. HIPAA applies to “covered entities” and “business associates” including doctors, hospitals, health-related providers, clearinghouses, and health insurance providers.
Cloud computing is altering the way medics, nurses, and hospitals deliver quality, cost-effective services to their patients. It has the capacity to revolutionize healthcare, rendering it more efficiently through a decentralized approach, and improving the patient-care services and experiences. There are many secured cloud platforms like AWS, Azure, Google, IBM, etc. enabling HIPAA compliant healthcare solutions, however, this blog will be focusing on AWS further. Managing HIPAA compliance in the cloud is more challenging but AWS services help to design and implement high-load systems to process vast amounts of ePHI with HIPAA.
Sign AWS Business Associate Agreement (BAA)
As per HIPAA compliance guidelines, each covered entity must follow the HIPAA security rules. AWS services are certified to ensure HIPAA compliance. AWS signs BAA agreement including legal responsibilities with customers, notifying them in case of any breach on physical infrastructure.
HIPAA Compliance Responsibility is on “Covered Entities” Not on AWS
AWS is responsible for breach of physical infrastructure which means application-level security is Covered Entities’ responsibility who are developing the application. AWS operates with shared responsibility, i.e. AWS is responsible for certain security and compliance for protecting infrastructure on AWS like Compute, Storage, Database, Network, Regions & Availability zones, Edge location. AWS customers are responsible for services they use to create solutions,e.g. Platforms, OS, Applications, Client-Server side encryption, IAM, Network traffic protection, Customer Data.
Encryption and Protection of ePHI
HIPAA security rule addresses the data protection and encryption of PHI in transmission (in transit) and in storage (at rest) in the cloud. AWS offers a set of features and services which provide key management and encryption of PHI.
Auditing, Back-Ups and Disaster Recovery
Auditing and monitoring are technical safeguards that must be addressed in cloud architecture. This means any storage, processing or transmission of ePHI information should be logged in the system to track the usage of data. The architecture should have notifications on any unauthorized access and a threat to ePHI.
The solution must have an emergency plan to protect ePHI information in case of disaster to avoid the loss of patient information. It should plan the backup of collected, stored and used ePHI information with recovery processes, that can enable the restoration of information in case any information is lost.
Authentication and Authorization
A HIPAA-eligible system must document the authentication and authorization mechanism in the System Security Plan with all roles and responsibilities, along with the configuration control process, approvals, and process for all change requests.
Following are a few points to be considered while architecting with AWS:
- IAM service to provide access to specific services
- Enable MFA to access AWS accounts
- Grant Least privileges
- Rotate credentials regularly
Architecture Strategies
One should not assume that all HIPAA eligible AWS services are secured by default, but it requires several settings to make solution HIPAA eligible. Following are a few strategies which should be applied with HIPAA applications:
- Decouple the infrastructure, database and applications which are accessing/processing protected PHI data which can be achieved through,
- Turn off all public access, avoid the use of access-secret keys, and use IAM with custom roles and policies and attach identity for accessing the services
- Enable the encryption for storage services
- Tracking the data flows and setup auto-monitoring and alerts
- Keep the boundaries between protected and general workflows. Segregate the network, create external VPC with multi-AZ architecture which separate subnets for different application layers and private subnets for backend application and database layers.
Sample Architecture of HIPAA
Above diagram is for 3-tier health care application which is a HIPAA eligible solution:
- Route53 is connected to WAF (Web Application Firewall) with Internal Load balancer, with this public networks are avoided, ACM (private security authority) is used to encrypt data in REST using HTTPS
- VPC (Virtual Private Cloud) is created with six private subnets in different availability zones for Web, Backend and database tier
- 2 internal ELB (Elastic Load Balancing – 1 for web and 1 for backend) with auto-scaling groups to handle & distribute traffic between multiple instances and instruct to launch new instance when a load is high
- MySQL and ElasticCache is launched in multiple availability zones with HSM (Hardware Security Module) to encrypt the data
- Cloudwatch is configured for a monitor, setup alerts and application logs
- CloudTrail, Config and Trusted Advisor are used to audit AWS resources. IAM is used to restrict access to AWS resources and Management console
- Inventory is used to get visibility of EC2 instances
Using the AWS platform, any organization can design secure, robust, reliable, and efficient HIPAA eligible solutions. It can help validate existing solutions to identify risks, security measures and loopholes in the system to meet HIPAA compliance requirements for any healthcare solution.
Opinions expressed by DZone contributors are their own.
Comments