Healthcare Cloud Considerations

This article explains IT compliance and security in a specific industry or context. It is not professional compliance advice. Consult with professionals for guidance specific to your situation.


Moving patient data to the cloud promises operational efficiency, scalability, and reduced capital expense. It also distributes your data across infrastructure you don't control, operated by vendors you have limited visibility into, in geographic locations you might not know. Your compliance obligations don't shrink when data moves to the cloud — they expand. You remain responsible for ensuring that patient data is protected, that access is controlled, that HIPAA requirements are met. The cloud vendor is responsible for specific elements, but the overall accountability remains with your organization. Understanding where that boundary lies and how to verify that the vendor is actually meeting their obligations is essential.

Cloud vendors understand healthcare compliance requirements, but they also understand that most healthcare organizations don't deeply audit their compliance. The result is a spectrum of cloud vendors from those with robust healthcare practices to those with minimal security controls who simply claim to be HIPAA-compliant. Because you depend on the vendor's security, vendor selection and ongoing oversight matter more in healthcare cloud scenarios than in typical enterprise IT.

Covered Entity Obligations in Cloud

Moving to cloud doesn't eliminate your organization's compliance obligations under HIPAA. You remain the covered entity responsible for ensuring that patient data is protected. The cloud vendor becomes a business associate, subject to specific obligations outlined in a Business Associate Agreement. The division of responsibility is critical to understand: your organization remains responsible for the overall security program, risk assessment, incident response, workforce access controls, and training. The cloud vendor is responsible for implementing the technical and administrative controls you've required in the BAA.

This shared responsibility model means that a breach caused by the cloud vendor's negligence is your responsibility to report. You're legally liable for the breach. You must notify affected patients. You must notify HHS. You can sue the vendor for damages, but you can't escape the primary liability. This is why the BAA isn't a paperwork exercise — it's your contractual mechanism for requiring the vendor to implement appropriate controls and for holding them accountable if they fail.

Your risk assessment must include an assessment of cloud security. Where is patient data stored? What controls does the vendor implement around access, encryption, audit logging, backup, and incident response? What's the vendor's uptime and disaster recovery capability? Your risk assessment should document that the cloud vendor's controls are appropriate for the sensitivity of the data being stored and the threats your organization faces.

The compliance program that moves to cloud must explicitly address cloud-specific risks. How do you verify that the vendor is actually encrypting data at rest? How do you detect if the vendor has been compromised? How do you respond if the vendor experiences a breach? What's your backup and recovery strategy if the vendor becomes unavailable? What happens to patient data if the vendor goes out of business or cancels the service? These questions should be part of your documented compliance program.

Business Associate Agreements for Cloud Vendors

The Business Associate Agreement is the legal contract that specifies the cloud vendor's obligations and your rights. A standard BAA should require encryption of data at rest and in transit, audit logging of access, regular security testing, incident response capabilities, backup and recovery, compliance with HIPAA security rule requirements, and assistance with breach notification if required.

The BAA should specify the vendor's responsibilities for different categories of controls. Technical controls like encryption and access logging are typically vendor-provided. Administrative controls like training and access reviews might be shared — the vendor might provide the capability but your organization maintains the responsibility. Physical controls are entirely vendor-provided since you don't control their data centers.

Subcontractors are a critical BAA consideration. If the cloud vendor uses other vendors to provide services — a backup vendor, a security monitoring vendor, a data analytics vendor — those subcontractors are subject to HIPAA's business associate rules. The BAA should require the cloud vendor to ensure that all subcontractors have appropriate agreements in place. You want visibility into which subcontractors are handling your data and what controls they have.

The BAA should specify data location. Where is your data physically stored? Can the vendor move your data to different locations without your consent? If data must remain within the United States for compliance reasons, the BAA should require that. If certain data must remain within a specific state, that should be specified. Data sovereignty is often overlooked but it has legal implications.

The BAA should include audit rights. You should have the right to audit the vendor's controls, to request documentation of security practices, to conduct penetration testing, and to review audit reports. The practical reality is that most healthcare organizations don't exercise audit rights fully, but the rights should exist. Vendors should be willing to provide SOC 2 reports or other third-party audit documentation demonstrating their security controls.

Liability and indemnification provisions matter. What's the vendor's liability if they're breached and patient data is exposed? Is there a cap on liability? Does the vendor agree to indemnify you against liability arising from their negligence? The negotiated liability terms should be significant enough to incentivize the vendor to actually implement controls rather than treating security as optional.

Data Residency and Jurisdiction

Patient data is subject to laws where it's located. If your patient data is stored in a cloud vendor's data center in another state, the laws of that state apply to the data. If patient data is stored outside the United States, that creates additional regulatory complexity. Some healthcare organizations have requirements or preferences about where patient data is stored.

HIPAA doesn't specify data location requirements, but some states have their own healthcare privacy laws with location requirements. California's CPRA has specific requirements about data storage. New York's SHIELD Act has data security requirements. Understanding applicable state laws is important. Some healthcare organizations have contractual requirements from customers or insurers about where data must be stored.

Data residency becomes even more critical if patient data might be transmitted to the cloud vendor's offices in other countries. A German healthcare provider's patient data shouldn't be transmitted to offices in countries with weaker data privacy protections. The BAA should specify that patient data won't be accessed from or transmitted to locations outside the explicitly approved data centers.

Jurisdictional considerations include understanding what legal process a government could use to compel the cloud vendor to disclose patient data. The CLOUD Act created a mechanism for U.S. law enforcement to compel cloud vendors to disclose data even if it's stored outside the United States. Some healthcare organizations have concerns about this and may prefer vendors with European data centers subject to GDPR protections instead.

The practical reality is that healthcare organizations often don't have complete control over data location. Many cloud vendors operate a limited number of data centers and will locate your data in their nearest facility. Smaller healthcare organizations might accept the vendor's default location. Larger organizations with more negotiating power can specify requirements.

Encryption Key Management and Control

Encryption is a critical control for cloud data, but the effectiveness depends entirely on who controls the encryption keys. If the cloud vendor controls the encryption keys, they can decrypt your data whenever they want. If you control the encryption keys, the vendor can encrypt and store your data but can't decrypt it without your keys. This is a massive difference in security posture.

Customer-managed keys, also called bring-your-own-key or BYOK, give you control over encryption keys. You manage the keys, the vendor uses them to encrypt and decrypt your data, but the vendor never has access to the unencrypted keys. This is more secure but also more operationally complex. If you lose the encryption key, your data is unrecoverable. If you don't properly back up the key, you might lose it when your key management system fails.

Vendor-managed keys are easier operationally but shift control to the vendor. The vendor promises that keys are stored securely and accessed only by authorized systems, but you're trusting the vendor's security practices. The vendor could potentially decrypt your data without your knowledge, though contractual restrictions and audit controls theoretically prevent that.

Most healthcare organizations use a hybrid approach: the cloud vendor encrypts data at rest using encryption keys that are stored in a key management system. The healthcare organization controls access to the key management system and has visibility into which systems access the keys. This provides reasonable security without the operational complexity of fully customer-managed keys.

The encryption protocol matters. Advanced Encryption Standard (AES) with 256-bit keys is the standard for healthcare. Older encryption algorithms or shorter key lengths provide less protection. The cloud vendor should be able to document what encryption algorithm and key length they use.

Key rotation is another important aspect of key management. Encryption keys should be rotated periodically — every 90 days to annually depending on your organization's policy. Key rotation ensures that if a key is compromised, the exposure is limited to data encrypted with that specific key. The cloud vendor should support automatic key rotation or provide clear processes for manual key rotation.

Compliance with Cloud Provider Controls

Cloud vendors implement their own security controls — access controls, logging, monitoring, patch management, vulnerability management — and those controls need to be appropriate for healthcare data. You should understand what controls the vendor has and verify that they're sufficient.

Shared responsibility models vary by cloud service type. Infrastructure-as-a-service (IaaS) vendors provide the underlying infrastructure but you're responsible for patching operating systems, securing applications, and managing configuration. Platform-as-a-service (PaaS) vendors handle more of the infrastructure and you focus on application security. Software-as-a-service (SaaS) vendors handle the entire technology stack and you focus on user access and configuration.

For healthcare, SaaS solutions for EHRs, practice management, and billing are common. You're trusting the vendor to handle all the technical security. The vendor should provide documentation of their controls and should have third-party audits verifying those controls. SaaS vendors serving healthcare should have SOC 2 Type II reports covering their security controls.

Access control within the cloud environment matters. You should understand how the cloud vendor restricts which of their employees can access your data. Ideally, no vendor employees have direct access to patient data — access should require explicit authorization and should be logged. You should have visibility into vendor access logs showing who accessed your data, when, and what they did.

Vulnerability management is another critical control. Does the cloud vendor have processes for identifying security vulnerabilities in their systems? How quickly do they patch vulnerabilities? Are vulnerability assessments and penetration testing conducted regularly? The vendor should be able to document their vulnerability management practices.

Incident Response in Cloud Environments

Despite all preventive controls, incidents happen. Your organization needs to know how to detect, respond to, and communicate about incidents affecting cloud-stored data. The detection part depends on the cloud vendor's monitoring. Does the vendor have security monitoring in place? Do they monitor for unauthorized access attempts, unusual data access patterns, or suspicious activity? They should notify you immediately if they detect suspicious activity.

Your organization should have processes for being notified of vendor incidents. The BAA should specify that the vendor will notify you of any security incidents affecting your data within a specific timeframe — often 24 hours for potential breaches, immediately for confirmed breaches. The vendor should provide sufficient information for you to determine whether your data was actually compromised and what steps need to be taken.

The incident response process needs to account for your limited visibility into the cloud vendor's systems. You can't directly access their logs or investigate the incident yourself. You depend on the vendor's investigation and their willingness to provide you with details. The BAA should give you rights to conduct independent forensic investigations or to have a third-party forensic firm investigate on your behalf.

Forensic preservation is critical. If there's a suspected incident, evidence needs to be preserved immediately so that it can be analyzed. The cloud vendor should have processes for freezing systems, preserving logs, and maintaining a chain of custody for evidence. They should not delete logs or make changes that would destroy evidence while an investigation is ongoing.

Your backup and recovery strategy matters for incident response. If data in the cloud is corrupted or encrypted by ransomware, can you recover from backup? The backup should be separate from the cloud system so that a compromise of the cloud system doesn't delete the backup. You should be able to recover to a recent point in time without significant data loss.

Breach notification is a specific incident response requirement. If patient data in the cloud is compromised, you must notify affected patients, notify HHS, and potentially notify media depending on the scale. The notification timeline is 60 days. Your organization needs documented processes for determining whether a breach occurred, what data was affected, and how many patients were affected.

Backup and Recovery in Cloud

Assuming the cloud vendor has backups, those backups need to be separate from the primary system so that a compromise of the primary system doesn't destroy the backups. Ideally, backups are in a geographically separate location so that a physical disaster affecting the primary data center doesn't affect backups. The cloud vendor should have documented backup practices showing frequency, location, and recovery time objective.

Your organization should test the recovery process. Can you actually recover data from the cloud vendor's backups? How long does recovery take? Do you need the vendor's assistance or can you recover independently? Test recoveries should be performed periodically to verify that backup and recovery actually work.

Data retention policies need to account for compliance requirements. HIPAA requires maintaining records for at least six years after the last patient encounter. Cloud backup policies should align with those requirements. Data should be retained long enough to satisfy legal requirements but should be deleted when retention periods expire.

Backup testing is a compliance requirement that's frequently overlooked. HIPAA requires that you verify that backups can be restored. Many organizations have backup systems but have never actually tested restoration. Testing should involve recovering a sample of data and verifying that it's complete and uncorrupted.

The cloud vendor should provide you with information about backup frequency and recovery capability. Daily backups are standard. Recovery time objective (RTO) — the time required to recover from backup — should be appropriate for your organization's tolerance for downtime. Recovery point objective (RPO) — the amount of data loss acceptable if you need to recover from backup — should align with your organization's tolerance for data loss.

Shared Responsibility and Cloud Model

The shared responsibility model in healthcare cloud deployments requires clear documentation of who's responsible for what. The cloud vendor shouldn't bear sole responsibility for security and you shouldn't expect to be able to take a hands-off approach. Your organization remains responsible for ensuring that the overall security program is adequate and that the vendor's controls are functioning.

The documented responsibility model should address access control, encryption, audit logging, incident response, backup and recovery, vulnerability management, and compliance monitoring. For each element, clarity about whether it's vendor-provided, shared, or your responsibility prevents gaps and reduces risk.

Regular monitoring of the vendor's controls is your responsibility. You should request SOC 2 reports periodically, review audit logs showing vendor access to your data, conduct audits of the vendor's controls, and follow up on any findings from third-party assessments. The vendor should be willing to provide this information as part of the BAA.

Compliance with cloud-specific security standards should be part of your monitoring. If the vendor claims to comply with HIPAA, with SOC 2, with HITRUST, or with other standards, you should periodically verify that compliance. Ask for certificates, audit reports, assessment results. Don't assume compliance based on the vendor's claims.

Your organization's security program must explicitly address cloud-specific risks. Risk assessments should identify risks specific to cloud deployments. Incident response plans should address cloud-specific incidents. Workforce training should include cloud security practices. The compliance program that relies on cloud vendors needs to be comprehensive and vendor-independent — if you change vendors, your security program shouldn't collapse.

Documentation of the cloud relationship is essential. You should document the vendor selection process, the controls you required, the vendor's response to those requirements, the BAA terms, and periodic assessments of the vendor's compliance. This documentation demonstrates that you've made thoughtful decisions about security and that you're monitoring vendor compliance.


Fully Compliance provides educational content about IT compliance and cybersecurity. This article reflects general information about healthcare cloud security considerations as of its publication date. Regulations, cloud technologies, and security practices evolve — consult a qualified security professional for guidance specific to your organization and selected cloud vendor.