The Challenge
You need infrastructure that meets HIPAA requirements for handling protected health information. Healthcare applications face strict regulatory obligations around data encryption, access controls, audit trails, and breach detection. Building compliant infrastructure from scratch requires deep knowledge of both AWS security services and HIPAA technical safeguards, and getting it wrong exposes your organization to regulatory penalties and data breaches.
What You'll Build
- → Network architecture with private-only subnets and VPN access
- → Encryption at rest and in transit for all data stores
- → Tamper-proof audit logging with long-term retention
- → Automated threat detection and security monitoring
- → Least-privilege IAM policies with documented security controls
Try This Prompt in Pulumi Neo
Run this prompt in Neo to deploy your infrastructure, or edit it to customize.
Best For
Architecture Overview
This architecture implements the technical safeguards required by HIPAA through a defense-in-depth approach. Every layer, from networking to application to data, enforces controls that protect the confidentiality, integrity, and availability of protected health information. The design prioritizes auditability: every access, change, and potential threat is logged and retained for the periods HIPAA mandates.
The network design uses private subnets exclusively, with no resources directly accessible from the internet. Administrative access flows through a VPN or bastion host with multi-factor authentication. This eliminates the largest attack surface for healthcare data breaches and simplifies the compliance boundary by reducing the number of controls needed at the network edge.
Encryption is applied universally rather than selectively. All storage volumes, database instances, and data transfers use encryption with keys managed through KMS. This approach is simpler to audit than selective encryption because compliance reviewers can verify a single policy rather than checking each resource individually.
Network Isolation
A VPC with private subnets only ensures that compute instances, databases, and application services are never directly reachable from the internet. NAT gateways allow outbound internet access for software updates and API calls, but no inbound path exists. VPN or AWS PrivateLink provides secure access for administrators and authorized external systems.
Data Encryption
KMS-managed encryption keys protect data at rest across EBS volumes, RDS databases, and S3 buckets. TLS terminates at load balancers and is enforced for all internal service communication. Key rotation is automated, and key policies restrict which IAM principals can use each key, providing a cryptographic access control layer independent of IAM permissions.
Audit Logging
CloudTrail captures all API activity with log file integrity validation, ensuring that audit logs cannot be modified after creation. Logs are stored in a dedicated S3 bucket with object lock to prevent deletion. Retention periods align with HIPAA’s requirement to maintain documentation for at least six years. AWS Config continuously evaluates resource configurations against compliance rules and records changes over time.
Threat Detection
GuardDuty monitors for malicious activity and unauthorized behavior across your AWS accounts. Macie discovers and monitors sensitive data in S3 buckets, flagging unintended exposure of PHI. Security Hub aggregates findings from both services into a centralized dashboard with compliance scoring against HIPAA benchmarks.
Common Customizations
- Add WAF for web applications: Request a Web Application Firewall in front of any public-facing API or web portal to protect against OWASP Top 10 vulnerabilities and bot traffic.
- Implement break-glass access: Ask for an emergency access procedure that grants elevated permissions through a time-limited, audited workflow for incident response scenarios.
- Enable automated compliance remediation: Request Lambda-based auto-remediation that automatically fixes non-compliant configurations (such as unencrypted volumes) when AWS Config detects them.
- Add data classification tagging: Ask for automated tagging of resources that contain PHI, making it easier to apply and audit security controls based on data sensitivity.
Related Prompts
Build a Security and Compliance Stack
You need infrastructure that meets security and compliance requirements from day one. Rather than retrofitting security …
Implement Security Best Practices
You need to bring existing infrastructure up to security standards before going to production or passing a security …
Deploy PCI-DSS Compliant Payment Infrastructure on Azure
You need infrastructure that meets PCI-DSS requirements for processing, storing, or transmitting payment card data. Any …