Skip to main content
HIPAA covers protected health information (PHI) for any company that’s a Covered Entity (most healthcare providers, insurers, clearinghouses) or a Business Associate (SaaS vendors processing PHI on behalf of a Covered Entity). If your customers are healthcare orgs and your product touches PHI, you’re a Business Associate and HIPAA applies.

Two main rule sets

RuleWhat it coversAuto-evidence opportunity
Security RuleAdministrative, physical, and technical safeguards for ePHIHigh — ~70% auto-evidenced (mirrors SOC 2 / ISO 27001 controls)
Privacy RuleUse and disclosure of PHI, patient rights, authorizationsLower — mostly process + record-keeping
Breach Notification RuleWhat to do when PHI is exposedProcess + ticketing-system records
Most SaaS Business Associates focus on Security Rule compliance. Privacy Rule responsibilities typically flow back to the Covered Entity (your customer).

Security Rule mapping

The Security Rule has 18 standards across 3 categories. Codex maps each to live evidence:

Administrative safeguards (§ 164.308)

StandardCodex evidence
§ 164.308(a)(1) Security management processRisk assessment cadence + remediation tracking from your ticketing system
§ 164.308(a)(3) Workforce securityIdP user lifecycle (provisioning + termination logs)
§ 164.308(a)(4) Information access managementPer-app role assignments + access reviews
§ 164.308(a)(5) Security awareness trainingLMS completion records
§ 164.308(a)(6) Security incident proceduresIncident tickets with timestamps, severity, resolution
§ 164.308(a)(7) Contingency planBackup schedules + restore-test results
§ 164.308(a)(8) EvaluationCodex itself is your evaluation tool — exports prove ongoing review

Physical safeguards (§ 164.310)

StandardEvidence
§ 164.310(a) Facility access controlsBadge system logs (if integrated); office walk-through checklist for SaaS-only
§ 164.310(b) Workstation useMDM device inventory with PHI-handling devices flagged
§ 164.310(c) Workstation securityMDM screen-lock + auto-lock policy enforcement
§ 164.310(d) Device and media controlsMDM-reported disk encryption + secure-wipe logs on offboarded devices

Technical safeguards (§ 164.312)

StandardEvidence
§ 164.312(a) Access controlIdP MFA enforcement, role-based access from SaaS connectors
§ 164.312(b) Audit controlsSIEM event log retention + activity-log integrity
§ 164.312(c) IntegrityFile-integrity monitoring on PHI stores (cloud connector reports)
§ 164.312(d) Person or entity authenticationIdP MFA reports
§ 164.312(e) Transmission securityTLS coverage scan across all PHI-handling endpoints

Business Associate Agreements (BAAs)

Every vendor that touches PHI on your behalf needs a signed BAA. Codex tracks BAA status alongside vendor metadata:
  • BAA signed: ✓ with date, version, expiration
  • BAA pending: ✓ with vendor, requester, target sign-by date
  • BAA not required: ✓ with justification (vendor never sees PHI)
When your customer asks for your BAA inventory, Reports → BAA report outputs a current snapshot.

What HIPAA doesn’t have (vs SOC 2 / ISO)

  • No formal certification — you can’t get “HIPAA certified” by an external auditor; you self-attest. This makes Codex evidence even more important: it’s the only artifact proving you actually do what you claim.
  • No prescribed audit cadence — but you should run an annual internal review and publish a SOC 2 + HITRUST or ISO 27001 + HIPAA mapping for serious healthcare buyers.
If you’re selling into healthcare:
  1. Year 1: SOC 2 Type II + HIPAA Security Rule attestation. Most healthcare buyers accept this combo.
  2. Year 2: Add HITRUST CSF certification (a healthcare-specific compliance framework that maps to HIPAA + ISO + SOC 2 + state laws). Codex’s existing evidence mostly carries over.
  3. Year 3: ISO 27001 if you sell internationally.
Codex tracks all three in parallel without duplicate work — controls that satisfy multiple frameworks are tagged once and counted across each report.

When you’re ready

Reports → HIPAA security rule attestation outputs:
  • Per-standard implementation evidence
  • BAA inventory
  • Risk assessment + risk register
  • Incident response history
  • Workforce training completion
This is what your customer’s procurement/security team will ask for during their vendor risk review.