Cloud Security for Connected Medical Device Backends

Reference architecture, shared responsibility, and security controls for building cloud backends that satisfy FDA, HIPAA, and SOC 2 requirements simultaneously

Overview

Purpose

Connected medical devices increasingly rely on cloud backends for data storage, analytics, firmware updates, and remote monitoring. This guide provides a security reference architecture for medical device cloud backends across AWS, Azure, and GCP โ€” covering VPC design, network segmentation, IAM, encryption, logging, container security, and disaster recovery. Every control is mapped to the specific FDA, HIPAA, or SOC 2 requirement it satisfies, enabling a unified compliance approach.

Target Audience

Cloud architects, backend engineers, DevOps/SRE engineers, and infrastructure teams at medical device companies building cloud-connected platforms.

Prerequisites

  • Cloud provider account with production workloads (AWS, Azure, or GCP)
  • Understanding of your device's cloud integration architecture
  • BAA executed with your cloud provider (see /regulations/hipaa-baa)
  • Familiarity with IaC tools (Terraform, CloudFormation, ARM Templates)

Estimated Implementation Time: Initial architecture hardening: 4โ€“8 weeks; ongoing security operations and monitoring

1

Phase 1: Understand the Shared Responsibility Model

The single most important concept in cloud security: your cloud provider secures the infrastructure, you secure everything you build on it. Every cloud security failure in healthcare traces back to a misunderstanding of where provider responsibility ends and yours begins.

1

Map Provider vs. Customer Responsibilities

AWS, Azure, and GCP all publish shared responsibility models. For IaaS (EC2, VMs): the provider handles physical security, hypervisor, and network infrastructure; you handle OS patching, application security, data encryption, access controls, and network configuration. For PaaS (RDS, App Service, Cloud Run): the provider additionally handles OS patching and platform maintenance; you handle application code, data, access, and configuration. For SaaS (S3, Blob Storage, Cloud Storage): the provider handles almost everything except data classification, access policies, and encryption key management. Document which services you use and the corresponding responsibility split.

Deliverables:

  • Shared responsibility mapping per cloud service used
  • Customer responsibility checklist for each service

๐Ÿ’ก Tips:

  • The shared responsibility model shifts as you move from IaaS โ†’ PaaS โ†’ SaaS โ€” prefer managed services (PaaS/SaaS) to reduce your security surface area
  • FDA and HIPAA hold the device manufacturer responsible for the entire stack โ€” "it's the cloud provider's fault" is not a valid defense in an enforcement action
  • Document the shared responsibility mapping as part of your HIPAA risk analysis and FDA threat model โ€” auditors and reviewers expect this
2

Select HIPAA-Eligible Services

Not all cloud services from a provider are HIPAA-eligible โ€” even with a signed BAA. Each provider maintains a list of services that may be used with ePHI: AWS HIPAA Eligible Services (updated monthly), Azure HIPAA/HITRUST eligible services, and GCP Healthcare-specific services. Any service not on the list should not process, store, or transmit ePHI. Common mistakes: using a non-eligible logging service for ePHI audit trails, routing ePHI through a non-eligible message queue, or caching ePHI in a non-eligible CDN.

Deliverables:

  • Approved services list (HIPAA-eligible services used in your architecture)
  • Architecture diagram annotated with eligible/non-eligible services

๐Ÿ’ก Tips:

  • AWS: Check the AWS HIPAA Eligible Services list in the AWS Artifact portal. Services are added regularly.
  • Azure: Check the Microsoft compliance offerings documentation. Azure Government may have additional certifications.
  • GCP: Healthcare-specific API (Cloud Healthcare API) is the primary HIPAA-eligible health data service; check the GCP compliance page for the full list
2

Phase 2: Network Security Architecture

Network segmentation and perimeter defense form the first layer of cloud security. A properly segmented network limits blast radius, enforces least-privilege communication, and creates the defense-in-depth that FDA and HIPAA both require.

3

Design VPC/VNet Architecture with Segmentation

Create a multi-tier VPC architecture: Public subnet (internet-facing): API Gateway, Load Balancer, WAF โ€” never place databases or application servers here. Private subnet (application tier): compute instances, containers, serverless functions โ€” no direct internet access, uses NAT gateway for outbound. Data subnet (isolated): databases, data stores โ€” no internet access, accessible only from the private subnet. Management subnet: bastion hosts, CI/CD agents, monitoring โ€” isolated with strict access controls. Implement network ACLs and security groups following deny-by-default, allow-by-exception.

Deliverables:

  • VPC architecture diagram with subnet design
  • Security group and NACL rule specifications
  • Network segmentation rationale document

๐Ÿ’ก Tips:

  • Use separate VPCs for production, staging, and development โ€” never share a VPC across environments
  • VPC Flow Logs (AWS), NSG Flow Logs (Azure), or VPC Flow Logs (GCP) should be enabled on all subnets for security monitoring and forensics
  • Consider AWS PrivateLink, Azure Private Link, or GCP Private Service Connect for service-to-service communication without internet traversal
4

Implement API Gateway and WAF Protection

All device-to-cloud and client-to-cloud communication should pass through an API Gateway with a Web Application Firewall (WAF). Configure: rate limiting (prevent DDoS and brute-force attacks), request validation (schema enforcement, payload size limits), authentication at the gateway level (API keys, OAuth 2.0, mutual TLS), WAF rules for OWASP Top 10 (SQL injection, XSS, SSRF), and geo-blocking (if your device only operates in certain regions). API Gateway also provides centralized audit logging for all API calls.

Deliverables:

  • API Gateway configuration specification
  • WAF rule set documentation
  • Rate limiting and throttling policies

๐Ÿ’ก Tips:

  • Mutual TLS (mTLS) between device and API Gateway is the gold standard for device authentication โ€” every device gets a unique client certificate
  • WAF managed rule sets (AWS Managed Rules, Azure Managed Rules) provide baseline protection โ€” customize with application-specific rules
  • Log all API Gateway requests to your centralized logging platform โ€” this satisfies both HIPAA audit controls and FDA audit logging requirements
3

Phase 3: Identity, Access Management, and Encryption

IAM and encryption are the controls most heavily scrutinized by both HIPAA auditors and FDA reviewers. This phase establishes the access control and data protection framework.

5

Implement Least-Privilege IAM

Design IAM following the principle of least privilege: no human users have standing access to production โ€” use just-in-time (JIT) access or break-glass procedures. Service accounts have only the permissions required for their specific function. Use IAM roles (not long-lived credentials) for all service-to-service authentication. Implement MFA for all human access to cloud consoles and CLI. Conduct quarterly access reviews and revoke unused permissions. Separate IAM policies for ePHI-containing resources.

Deliverables:

  • IAM policy documentation
  • Service account inventory with permission scope
  • Access review procedure and schedule

๐Ÿ’ก Tips:

  • AWS: Use AWS Organizations with SCPs (Service Control Policies) to enforce guardrails across all accounts
  • Azure: Use Azure PIM (Privileged Identity Management) for JIT access to sensitive roles
  • GCP: Use IAM Conditions and VPC Service Controls to restrict access based on context
6

Implement End-to-End Encryption

Encryption at rest: all data stores containing ePHI encrypted using AES-256 with keys managed by the cloud KMS (AWS KMS, Azure Key Vault, GCP Cloud KMS). Use customer-managed keys (CMKs) rather than provider-managed keys for audit control. Encryption in transit: TLS 1.3 for all external communication, TLS 1.2 minimum for internal service-to-service. Certificate pinning for device-to-cloud channels. Consider application-level encryption for ultra-sensitive fields (patient identifiers, diagnostic results) in addition to storage-level encryption.

Deliverables:

  • Encryption configuration matrix (per service, per data type)
  • Key management procedure (rotation, access, backup)
  • Certificate management procedure (issuance, rotation, revocation)

๐Ÿ’ก Tips:

  • Customer-managed KMS keys give you audit trail control โ€” you can see every key access event in CloudTrail/Azure Monitor/Cloud Audit Logs
  • Automatic key rotation: AWS KMS supports annual automatic rotation; configure it and document it for HIPAA and SOC 2
  • For the deepest protection, implement envelope encryption: encrypt data with a data encryption key (DEK), encrypt the DEK with the KMS key (KEK)
4

Phase 4: Monitoring, Incident Response, and Disaster Recovery

Continuous monitoring and robust incident response are requirements across all three frameworks (FDA, HIPAA, SOC 2). This phase establishes the operational security capabilities.

7

Implement Centralized Security Monitoring

Deploy a centralized security monitoring platform: aggregate logs from all cloud services, applications, and devices. Enable cloud-native security services: AWS GuardDuty/Security Hub, Azure Sentinel/Defender for Cloud, or GCP Security Command Center. Configure alerts for: unauthorized access attempts, privilege escalation, ePHI access anomalies, configuration changes to security controls, and unusual data exfiltration patterns. Retain security logs for a minimum of six years (HIPAA requirement) with WORM protection.

Deliverables:

  • Security monitoring architecture document
  • Alert rules and escalation procedures
  • Log retention policy with WORM configuration

๐Ÿ’ก Tips:

  • SIEM (Security Information and Event Management) is expected for SOC 2 โ€” use your cloud-native SIEM or a third-party platform (Splunk, Elastic, Datadog Security)
  • Create dashboards for real-time security posture visibility โ€” auditors and reviewers appreciate visual evidence of active monitoring
  • Correlate device telemetry with cloud security events โ€” if a device behaves anomalously AND API authentication patterns change, this signals a compromised device
8

Design Disaster Recovery for Patient-Critical Systems

Define Recovery Time Objective (RTO) and Recovery Point Objective (RPO) for each system tier. Patient-critical systems (therapy management, vital monitoring): RTO โ‰ค 1 hour, RPO โ‰ค 15 minutes. Clinical support systems (analytics, reporting): RTO โ‰ค 4 hours, RPO โ‰ค 1 hour. Administrative systems: RTO โ‰ค 24 hours, RPO โ‰ค 24 hours. Implement: multi-AZ deployment for high availability, cross-region standby for disaster recovery, automated failover with health checks, regular DR testing (at least annually), and documented DR procedures.

Deliverables:

  • Business continuity and disaster recovery plan
  • RTO/RPO definitions per system tier
  • DR test results and lessons learned

๐Ÿ’ก Tips:

  • HIPAA ยง 164.308(a)(7) requires a contingency plan including data backup, disaster recovery, and emergency mode operations โ€” DR is not optional
  • SOC 2 Availability criteria require documented DR plans with regular testing โ€” annual tests are minimum; quarterly for critical systems
  • Multi-region redundancy and testing can be expensive โ€” balance cost against RTO/RPO requirements. For many device manufacturers, multi-AZ within a single region is sufficient

Implementation Checklists

Cloud Architecture Checklist

IAM & Encryption Checklist

Monitoring & DR Checklist

Common Pitfalls & Solutions

Using non-HIPAA-eligible cloud services for ePHI workloads

Not all services from AWS/Azure/GCP are covered under the BAA. Check the provider's HIPAA-eligible services list before deploying any new service that will touch ePHI. Using a non-eligible service (even accidentally) creates a HIPAA violation regardless of how well it is configured.

Security groups with 0.0.0.0/0 ingress rules on production resources

Never allow unrestricted inbound access to production resources. All access should flow through the API Gateway and WAF for external traffic, or through VPN/bastion for internal access. Audit security group rules regularly โ€” "temporary" permissive rules tend to become permanent.

No network segmentation between environments

Production, staging, and development should be in separate VPCs (or accounts/projects) with no direct network connectivity. A compromised development environment should not provide a path to production ePHI. Use separate cloud accounts (AWS Organizations) or projects (GCP) for hard isolation.

Disabled or unmonitored security logging

CloudTrail/Activity Log/Cloud Audit Logs must be enabled on all accounts with no gaps. Configure centralized log aggregation with automated alerting. A six-month gap in security logs is a critical finding in both HIPAA audits and SOC 2 reports.