
HIPAA-compliant cloud hosting in 2026: what changed and what you need
March 27, 2026
Aron Wagner
CEO & Co-Founder
The 2026 HIPAA Security Rule update is the most significant overhaul of healthcare data security requirements in over a decade. The old framework gave covered entities wiggle room with "addressable" implementation specifications, meaning you could document why you chose not to implement a control and call it compliant. That loophole is gone.
Every security specification is now required. Encryption is mandatory, not optional. Multi-factor authentication is mandatory, not recommended. And your cloud provider's compliance posture matters more than ever because the new rules tighten the shared responsibility model and require annual verification of your entire security program.
If you host healthcare data in the cloud, or if your customers do, here is what you need to know.
What the 2026 update actually changed
The updated rule makes several changes that directly impact cloud hosting decisions:
- All implementation specifications are now required. The "addressable vs. required" distinction is eliminated. If the rule says encryption at rest, you encrypt at rest. If it says audit logging, you implement audit logging. No more "equivalent alternative measures" as a compliance shortcut.
- Encryption is explicitly mandated. Data at rest and data in transit must be encrypted. Previously, organizations could argue that other controls made encryption unnecessary. That argument no longer works.
- Multi-factor authentication is required for all systems accessing electronic protected health information (ePHI). Single-factor authentication, even with strong passwords, is no longer sufficient.
- Annual security audits are now mandatory. Organizations must conduct a comprehensive audit of their security program every 12 months, including verification that all business associates (including cloud providers) maintain compliance.
- Incident response timelines are tighter. The notification window for breaches has been shortened, and documentation requirements for security incidents are more prescriptive.
- Business Associate Agreements (BAAs) require annual verification. You cannot sign a BAA once and forget about it. Annual confirmation that your cloud provider maintains the required controls is now part of the compliance lifecycle.
Technical requirements for your cloud infrastructure
Meeting the 2026 HIPAA requirements means your cloud hosting environment must provide:
Encryption everywhere. AES-256 encryption at rest for all storage volumes, databases, and backups containing ePHI. TLS 1.2 or higher for all data in transit. Encryption keys must be managed with proper access controls and rotation policies.
Multi-factor authentication. Every user and service account accessing ePHI systems must authenticate with at least two factors. This applies to your application, database connections, SSH access, and cloud management console.
Comprehensive audit logging. Every ePHI access must be logged with who, when, where, and what. Logs must be tamper-resistant and retained for at least six years.
Access controls and least privilege. RBAC with minimum necessary permissions. Regular access reviews. Automatic deprovisioning when employees leave. No shared accounts.
Network segmentation. Systems containing ePHI must be isolated from non-compliant systems. Firewalls, security groups, and VPC configurations must enforce boundaries. Your cloud provider should support network-level isolation.
Backup and disaster recovery. Encrypted backups with tested recovery procedures. Your DR plan must include ePHI systems and meet documented RTO and RPO targets.
The BAA: what it is and why it matters
A Business Associate Agreement is a legal contract between a covered entity and any vendor that handles ePHI, including your cloud provider. Without a signed BAA, storing ePHI on a cloud provider is a HIPAA violation regardless of how secure the environment is.
Not all providers will sign a BAA. Some offer HIPAA-eligible services only for specific products. On AWS, only certain services are covered. Use a non-eligible service for ePHI and you are out of compliance even though AWS signed the agreement.
The 2026 update adds an annual verification requirement: confirm each year that your provider still meets required security standards.
Common compliance mistakes
Using non-eligible services. On hyperscalers, not every service is covered under the BAA. Using a non-eligible storage bucket or messaging queue for ePHI breaks compliance even if the rest of your infrastructure is compliant.
Assuming the provider handles everything. Your provider secures the infrastructure. You secure everything on top of it. A HIPAA-compliant cloud provider does not make your application HIPAA-compliant.
Neglecting audit logs. The new rules require comprehensive, tamper-resistant logging. Teams that enabled basic logging and never reviewed the configuration are likely missing required log events.
Skipping the annual audit. The 2026 update makes annual audits explicitly mandatory. Skipping or delaying them is a clear violation.
Storing ePHI in unclear jurisdictions. If your cloud provider replicates data across regions, you may not know where ePHI resides. HIPAA requires you to account for all locations where ePHI is stored or processed. This ties directly into why your cloud provider's location matters more than ever.
Choosing a HIPAA-compliant cloud provider
Key questions: Will they sign a BAA covering all services you use? Do they support encryption everywhere and enforceable MFA? Can you control exactly where your data resides? Do they own their infrastructure, or are they reselling hyperscaler capacity?
American Cloud: HIPAA hosting on infrastructure you control
American Cloud provides US-based, independently owned infrastructure with the security controls healthcare organizations need. Encryption at rest and in transit. Multi-factor authentication. Comprehensive audit logging. Network segmentation and firewall management. And a straightforward BAA process that covers the services you use.
Because American Cloud owns its data centers and infrastructure, there is no ambiguity about where your data lives or whose compliance obligations govern it. Your ePHI stays on US soil, on hardware that is not shared with a hyperscaler's global platform.
No juggling lists of "eligible" and "non-eligible" services. No worrying about data replication to unknown regions. Transparent pricing that does not penalize you with egress fees when you need to move data for backups, audits, or DR testing.
Healthcare data demands infrastructure you can trust and verify. Build your HIPAA-compliant environment on American Cloud, with US-based infrastructure, transparent controls, and zero egress fees.