Back to blog

A hospital system wants to use your platform to manage patient scheduling. A digital health startup wants to embed your API in their care-coordination tool. A benefits provider wants your SaaS to process employee health data. In every case, the first thing their legal team asks is: "Can you sign a BAA?"

If your answer is uncertain — or worse, if you don't know what a BAA is — you will not close that deal. Healthcare buyers have seen the consequences of HIPAA violations firsthand. They will not move forward without documented proof of compliance. This guide gives you what you need to get there without a six-figure consultant engagement.

Who this applies to: If your SaaS stores, processes, or transmits Protected Health Information (PHI) on behalf of a healthcare organization — even as a subprocessor — you are a Business Associate under HIPAA and this applies to you. "We're just the infrastructure" is not a defense.

Covered Entity vs. Business Associate: Know Which One You Are

HIPAA distinguishes between two types of regulated entities. Covered Entities are the healthcare providers, health plans, and clearinghouses that directly handle PHI as part of their core business — hospitals, insurers, doctor's offices. Business Associates (BAs) are the vendors, SaaS tools, and service providers that handle PHI on a covered entity's behalf.

As a B2B SaaS company selling into healthcare, you are almost certainly a Business Associate. This means HIPAA's Security Rule, Breach Notification Rule, and portions of the Privacy Rule apply directly to you — not just to your customers.

It also means your vendors who touch PHI are your Business Associate subcontractors, and you are required to have BAAs with them too. If you use AWS to host PHI, you need AWS's BAA (they offer one). If you use a third-party logging service that ingests application logs containing PHI, you need a BAA with them — or you need to scrub PHI from logs before they're shipped.

The Business Associate Agreement (BAA): What It Must Cover

A BAA is a contractual agreement between a Covered Entity and a Business Associate (or between a BA and their subcontractors) that establishes the permissible uses and disclosures of PHI. Under 45 CFR §164.308(b), having a BAA in place is not optional — it is a required safeguard.

At minimum, a compliant BAA must:

Common mistake: Many SaaS companies sign the customer's BAA template without reading it carefully. Some healthcare customers add clauses requiring 24-hour breach notification (HIPAA gives you 60 days), unlimited liability for breaches, or audit rights you're not operationally prepared for. Read every BAA before signing.

The Three Safeguards: What HIPAA Actually Requires

HIPAA's Security Rule requires Business Associates to implement three categories of safeguards. These aren't vague principles — there are specific required and addressable implementation specifications under each.

1. Administrative Safeguards (§164.308)

These are the policies and procedures that govern how your organization manages PHI. The required specifications include:

2. Physical Safeguards (§164.310)

If you're fully cloud-hosted, this mostly means ensuring your cloud provider has appropriate physical security (AWS, Azure, and GCP all have this covered under their BAAs). You also need:

3. Technical Safeguards (§164.312)

This is where most engineering effort goes. Required specifications:

Cloud Infrastructure: Getting BAAs from Your Vendors

One of the most practical steps you can take today is executing BAAs with your cloud infrastructure providers. The major providers all offer them:

ProviderBAA AvailableHow to Get ItPHI-Eligible Services
AWSYesAccept in AWS console under Account Settings → AWS ArtifactEC2, RDS, S3, Lambda (most services)
Google CloudYesContact sales or via GCP Console for Google Workspace BAAGCE, GCS, BigQuery, Cloud SQL
AzureYesAutomatically included in Online Services Terms for most tiersMost Azure services
VercelEnterprise onlyMust be on Enterprise planDeployment infrastructure
SupabaseEnterprise onlyContact sales for HIPAA compliance packageDatabase, auth, storage

Check every SaaS tool in your stack that touches application data: logging (Datadog, LogDNA, etc.), error tracking (Sentry), analytics, and customer support tools. If any of them could receive PHI — even in error messages or support tickets — you need BAAs or data scrubbing in place.

The Minimum Necessary Rule

HIPAA's "minimum necessary" standard (§164.502(b)) requires that disclosures of PHI be limited to the minimum necessary to accomplish the intended purpose. For SaaS companies, this translates into concrete engineering decisions:

Breach Notification: The 60-Day Clock

If you discover a breach of unsecured PHI, HIPAA's Breach Notification Rule (45 CFR §§ 164.400-414) gives you up to 60 days from discovery to notify the affected Covered Entity. But your BAA may impose a shorter window — some contracts require notification within 24 to 72 hours. Know your contractual obligations before a breach happens.

A breach is any acquisition, access, use, or disclosure of PHI in a way not permitted by the Privacy Rule — unless you can demonstrate through a risk assessment that there is a low probability the PHI was compromised. This four-factor risk assessment (nature of PHI, who accessed it, whether it was actually acquired, and extent to which risk has been mitigated) is your defense against triggering full breach notification.

Practical advice: Document your incident response process before you need it. When you discover a potential breach at 2am, you don't want to be figuring out the 60-day clock, who to call, or what counts as PHI. Write the runbook now.

Your HIPAA Compliance Checklist

Do You Need a HIPAA Audit?

Unlike SOC 2, there is no official HIPAA certification or third-party attestation that a regulatory body recognizes. What exists are third-party HIPAA compliance assessments — auditors who review your policies, controls, and technical configuration against the Security Rule and issue a report. These typically cost $8,000–$25,000 and are increasingly requested by large health system buyers as part of vendor due diligence.

If you're closing deals under $50k ARR with mid-market healthcare buyers, a thorough self-assessment, a signed BAA, and documented controls are usually sufficient. Once you're going upmarket — academic medical centers, large payers, national health systems — a third-party assessment report becomes a competitive advantage that accelerates procurement.

The good news: if you've already done SOC 2, the overlap is substantial. SOC 2 CC6 (access controls), CC7 (system operations), and CC9 (risk management) map directly to HIPAA's technical and administrative safeguards. You're not starting from zero.