Purview – HIPAA Compliant Security Policy
Step-by-Step Guide: Creating a HIPAA-Compliant Security Policy in Microsoft Purview
Step 1: Access Microsoft Purview
- Log in to your Microsoft 365 admin account.
- Navigate to the Microsoft Purview Compliance Portal: https://compliance.microsoft.com
- Ensure you have appropriate roles (Compliance Administrator or Global Admin).
Step 2: Enable Audit Logging
- In the left menu, go to Audit.
- Click Start recording user and admin activity (if not already enabled).
- Confirm logging is active (required for HIPAA auditing).
Step 3: Create Sensitivity Labels for PHI
- Go to Information Protection → Labels.
- Click + Create a label.
- Name it: Confidential – PHI.
- Configure:
- Encryption (restrict access to authorized users only)
- Marking (optional headers/footers like “Contains PHI”)
- Publish the label:
- Go to Label policies → Publish labels
- Select users/groups and make it mandatory if needed
Step 4: Configure Auto-Labeling for PHI
- Go to Information Protection → Auto-labeling.
- Click + Create auto-labeling policy.
- Choose Sensitive info types:
- U.S. Health Insurance Claim Number
- Medical Record Number
- Other PHI identifiers
- Set conditions (e.g., apply label when PHI is detected).
- Run in simulation mode first, then turn it on.
Step 5: Create Data Loss Prevention (DLP) Policy
- Navigate to Data Loss Prevention → Policies.
- Click + Create policy.
- Choose template: HIPAA or U.S. Health Information Act (HIPAA).
- Select locations:
- Exchange (email)
- SharePoint
- OneDrive
- Teams
- Configure rules:
- Detect PHI
- Block external sharing OR require encryption
- Show policy tips to users
- Turn on the policy.
Step 6: Configure Endpoint DLP (Optional but Recommended)
- Go to Data Loss Prevention → Endpoint DLP settings.
- Enable device monitoring.
- Create rules to prevent copying PHI to USB or printing sensitive data.
Step 7: Set Up Insider Risk Management
- Go to Insider Risk Management.
- Accept prerequisites (permissions, data sharing).
- Click + Create policy.
- Choose template:
- Data leaks
- Unauthorized access
- Define users/groups and risk indicators.
- Configure alerts and severity levels.
Step 8: Configure Retention Policies
- Go to Data Lifecycle Management → Retention policies.
- Click + Create policy.
- Name it (e.g., PHI Retention – 6 Years).
- Choose locations (Exchange, SharePoint, etc.).
- Set retention:
- Retain for 6 years (HIPAA standard)
- Then delete or retain forever based on policy
Step 9: Enable eDiscovery (for Legal/HIPAA Requests)
- Go to eDiscovery (Standard or Premium).
- Create a case.
- Add custodians (users with PHI).
- Place content on hold to preserve data.
Step 10: Configure Access Controls
- Go to Microsoft Entra ID (Azure AD).
- Enable:
- Multi-Factor Authentication (MFA)
- Conditional Access policies (restrict by device/location)
- Assign least-privilege roles.
Step 11: Configure Alerts and Monitoring
- Go to Alerts → Alert policies.
- Enable alerts for:
- DLP violations
- Unusual file access
- Insider risk events
- Set notification recipients (security team).
Step 12: Test the Policy
- Upload or send test files containing sample PHI.
- Confirm:
- Labels are applied
- DLP blocks or warns appropriately
- Alerts are triggered
Step 13: Train Users
- Inform users about:
- PHI handling rules
- Label usage
- DLP warnings
- Conduct periodic training sessions.
Step 14: Document and Review
- Document all configurations and policies.
- Schedule quarterly reviews.
- Adjust based on audit findings or regulation changes.