AuditKit maps cloud infrastructure checks to HIPAA Security Rule requirements across three providers:
| Cloud Provider |
HIPAA Mappings |
Key Services Checked |
| AWS |
106 |
IAM, S3, EC2, RDS, CloudTrail, KMS, VPC, Lambda, SageMaker, Redshift |
| Azure |
63 |
Entra ID, Storage, SQL, Key Vault, NSGs, Defender, Activity Logs |
| GCP |
46 |
IAM, Cloud Storage, Cloud SQL, KMS, Logging, Compute, VPC |
| Total |
215 |
|
| Section |
Requirement |
What AuditKit Checks |
| 164.312(a)(1) |
Access Control |
IAM policies, security groups, public access restrictions |
| 164.312(a)(2)(i) |
Unique User Identification |
MFA enforcement, root account security, individual accounts |
| 164.312(a)(2)(iv) |
Encryption |
Encryption at rest (S3, EBS, RDS, KMS) and in transit (TLS) |
| 164.312(b) |
Audit Controls |
CloudTrail, VPC flow logs, activity logging, metric filters |
| 164.312(c)(1) |
Integrity Controls |
Versioning, backup policies, log validation, PITR |
| 164.312(d) |
Authentication |
Password policies, credential rotation, MFA |
| 164.312(e)(1) |
Transmission Security |
TLS enforcement, network security, VPC configuration |
| Section |
Requirement |
What AuditKit Checks |
| 164.308(a)(1)(ii)(D) |
Security Assessment |
Security services enabled (GuardDuty, Defender, SCC) |
| 164.308(a)(3)(i) |
Workforce Access |
IAM user management, unused credentials, access keys |
| 164.308(a)(4)(ii) |
Credential Management |
Key rotation, unused credential detection |
| 164.308(a)(5)(ii)(B) |
Security Updates |
Auto-patching, managed instance compliance |
| 164.308(a)(5)(ii)(D) |
Password Management |
Password policies, minimum length, reuse prevention, expiry |
| 164.308(a)(6)(ii) |
Security Incidents |
GuardDuty/Defender/SCC alerting configuration |
| 164.308(a)(7)(ii)(A) |
Contingency Plan |
Backup configurations, multi-AZ, disaster recovery |
HIPAA compliance requires more than technical infrastructure checks. You still need: