Windows Azure Hipaa Implementation Guidance
Windows Azure Hipaa Implementation Guidance
April 2014
April 2014
Scope
The following Azure features are in scope for the HIPAA BAA: Cloud Services (web and worker
roles), Virtual Machines (including with SQL Server), Storage (Blobs, Tables, Queues), Virtual
Network, Traffic Manager, Web Sites, BizTalk Services, Media Services, Mobile Services, Service
Bus, Multi-Factor Authentication, Active Directory, SQL Database, and any other features
identified as included on the Azure Trust Center.
Special Considerations
Microsoft strongly recommends that you train your personnel to store PHI only in the objects
and data structures designated to for this type of data. For SQL Database this means:
Login names
User Names
Database names
Schema names
Schema Object Names, such as Table Names, View Names, Function Names, or Procedure
Names
Column Names
April 2014
Risk and Security Management: Microsoft does not monitor the applications and data that
customers choose to run in Azure. Thus, to minimize risks to information, you should
continuously monitor and log operations in/by guest VMs, Azure Portal, SMAPI, and Azure
Storage. This includes monitoring log-in attempts to VMs, RDP access to VMs, applications
hosted on Microsoft Azure, and access to storage accounts through various means such as
the REST API.
When using Azure SQL Database, the customer is responsible for identifying, responding
to, or mitigating suspected or known incidents that affect or compromise their application
with the intent to cause harm to the SQL Database service.
Applications and Data: Critical functionality such as end user access to customer data
(including PHI) will be controlled by the design, implementation, and operation of
customers applications. In general, Azure customers are responsible for ensuring the
integrity of the information that's written to storage by their applications. For example,
customers are responsible for monitoring all application/client level access to their
databases to prevent unauthorized access including malicious/accidental changes or
deletion of data. Customers should also monitor for security breaches, security incidents, or
3
April 2014
impermissible uses and disclosures of PHI that occur within or through your applications or
virtual machines.
When using Azure SQL Database, customers are responsible for securing their own
applications and clients that access SQL databases in order to prevent unauthorized access.
This includes monitoring T-SQL statements executed against their databases through
application programs or client-level interfaces for unusual or improper activities (as would
be accomplished through application auditing). Customers are also responsible for regular,
timely reviews of the audit records they collect as well as any reports and/or alerts they are
producing based on those.
Resources on building secure applications are available in the security section of the Azure
Trust Center.
Access Controls: Ensuring proper access controls is key to protecting the integrity and
privacy of company and patient data. Azure customers are responsible for managing
access to VMs, Storage accounts, SQL Databases, the Azure Portal or any other cloud
services and resources they use. This includes provisioning and managing Login and User
principals for access to their servers and databases respectively (as well as objects within
the databases). Logins must be assigned passwords and the customer is responsible for
ensuring that their users are aware of their password complexity standards and that they
rotate them in a timely manner. Customers must also safeguard their own user identities
and credentials (names, passwords, and certificates), other authentication information, and
workstations that can be used to gain access to PHI hosted in their service. If a customer
believes their access credentials or certificates have been compromised, they should
immediately change them and contact Azure Customer Support. Customers are strongly
advised to identify and document the roles and responsibilities of their administrators and
users who have access to PHI and to institute formal security processes.
April 2014
machine. Customer should review business continuity options for Azure, located at
http://msdn.microsoft.com/en-us/library/windowsazure/hh873027.aspx.
Data Center Location: Customers can configure Azure to use data centers in particular
regions and deploy data and applications across multiple data centers for added
redundancy. For additional details on the available data centers and data transfer
practices, please see the Privacy section of the Azure Trust Center.
Encryption-at-Rest: Microsoft Azure does not automatically encrypt customer data at rest.
Customers may implement encryption at rest using .NET cryptographic services.
For customers using Virtual Machines, additional options are available, including the
Encrypting File System in Windows Server 2008 R2 (and above), Azure Rights Management
Services, as well as Transparent Data Encryption (TDE) in SQL Server 2008 R2 (and above).
When using Azure SQL Database, externally encrypted records cannot be queried using TSQL (other than retrieve all) and may require a schema change such as the introduction of
surrogate keys to enable retrieval of specific records or ranges of records.
Personnel: Customers are responsible for their own employees training and conduct as it
applies to PHI stored in Azure. This may include screening and establishing proper clearance
to access certain cloud services, and ensuring authorized personnel's information is kept up
to date in Azure.
The above list is not exhaustive and represents just some of the issues to consider in building a
HIPAA-compliant solution in Azure. Customers should obtain their own security and legal
guidance to ensure their particular use of Azure meets all applicable HIPAA and HITECH
requirements.
Customers with specific technical questions may consult Azure Customer Support. Additional
technical resources are available at the Azure Developer Center.
5
April 2014
Additional Resources
The following resources are not HIPAA-specific but may assist you in understanding security,
privacy, and technical architecture of the service, which can help in planning your HIPAA
compliance strategy.
April 2014
Disclaimer
This guide is not intended to constitute legal advice. Customers should consult with their own
legal counsel regarding compliance with HIPAA, HITECH Act, and other laws and regulations
applicable to their particular industry and intended use of Microsoft Azure and other Microsoft
products and services. Microsoft makes no warranties, express, implied, or statutory, as to the
information in this document.