How We Build for HIPAA: The Controls and Processes Behind Sidebench’s Healthcare Applications

Kevin Yamazaki, CEO

Kevin Yamazaki

CEO & Partner

How We Build for HIPAA

We’ve shipped 50+ healthcare applications over the past decade, and every one of them runs on the same HIPAA compliance foundation — 47 controls across five Security Rule categories, built into the application layer from day one. This isn’t a marketing page about how seriously we take security. It’s a walkthrough of what we actually do, the specific controls we implement, and why application-layer compliance is where most development teams fall short.

50+
Healthcare Implementations
47
Application-Layer Controls
89%
Manual Work Reduction (PCIHIPAA)
10+
Years Building for HIPAA

Last updated: February 2026
By: Kevin Yamazaki, Partner, CEO at Sidebench

In this article:


Why 47 Controls? The Gap Between Hosting Compliance and Application Compliance

HIPAA compliance at the application layer requires implementing 47 distinct technical controls across five Security Rule categories defined in 45 CFR 164.312. Most development teams stop at 5-10 controls — usually the ones their cloud provider’s Business Associate Agreement (BAA) already covers. That leaves the other 37+ controls unaddressed, and those are the ones OCR investigates after a breach.

Here’s the misconception we run into constantly: teams assume that deploying on AWS with a BAA means they’re HIPAA compliant. They’re not. The cloud provider handles infrastructure-level controls — physical security, network isolation, storage encryption at rest. Your application is responsible for everything else. Access controls, audit logging, data integrity, transmission security, authentication — all of that lives in your code.

We wrote a full breakdown of this distinction in our pillar article on HIPAA application-layer compliance. What follows here is the specific implementation — what we build, how we build it, and why.


How We Handle Access Controls (45 CFR 164.312(a))

Access controls determine who can see, modify, or delete Protected Health Information (PHI) within an application. Under 45 CFR 164.312(a), covered entities must implement technical policies and procedures that restrict access to electronic PHI (ePHI) to authorized persons and software programs. We implement 12 controls in this category.

What that looks like in practice for us:

The mistake we see most often? Teams implement RBAC at the UI level but not at the API level. A user can’t click a button they shouldn’t see, but a curl command to the API returns everything. We enforce access controls at every layer — UI, API, database query, and background job.


How We Handle Audit Controls (45 CFR 164.312(b))

Audit controls require mechanisms to record and examine activity in systems containing ePHI. Under 45 CFR 164.312(b), you need hardware, software, and procedural mechanisms that record and examine access. We implement 8 controls here, and they’re the controls that matter most during an OCR investigation.

Our audit implementation:


How We Handle Integrity Controls (45 CFR 164.312(c))

Integrity controls protect ePHI from improper alteration or destruction. Under 45 CFR 164.312(c), you need policies and procedures to protect electronic health information from unauthorized changes. We implement 7 controls in this category, focused on making sure data stays accurate from creation to archival.

Key implementations:


How We Handle Transmission Security (45 CFR 164.312(e))

Transmission security protects ePHI during electronic transmission over networks. Under 45 CFR 164.312(e), you need technical security measures to guard against unauthorized access to ePHI being transmitted. We implement 10 controls here — this is the area where we see the most gaps in teams we’ve audited.

The gap we see most frequently: teams encrypt the connection between browser and server but send ePHI in plaintext between internal services. If an attacker gets inside your network perimeter, that plaintext data is exposed. We treat every network boundary as untrusted.


How We Handle Authentication (45 CFR 164.312(d))

Person or entity authentication requires verifying that a person or entity seeking access to ePHI is who they claim to be. Under 45 CFR 164.312(d), you need procedures to verify identity before granting access. We implement 10 controls, and this category has changed the most in recent years with the rise of passwordless and biometric authentication.


Implementation Priority: What to Build First

Not all 47 controls carry equal weight. When we start a new HIPAA project, we prioritize based on breach risk and regulatory exposure. Here’s how we rank them.

Priority Controls Why Timeline
Critical Access controls, encryption (rest + transit), MFA, audit logging OCR investigates these first after a breach. Missing any one is a finding. Sprint 1-2
High Integrity verification, session management, emergency access, backup validation Required by the Security Rule. Protects against data loss and unauthorized modification. Sprint 2-4
Important Monitoring dashboards, log retention, certificate management, automated testing Supports ongoing compliance and reduces long-term operational risk. Sprint 3-6
Best Practice Biometric auth, passwordless login, zero-trust internal networking, AI-powered anomaly detection Exceeds minimum requirements. Differentiates organizations that take security seriously. Sprint 4-8+

If you’re building a healthcare application that handles PHI, HIPAA compliance isn’t something you bolt on after launch. Companies come to us all the time asking to retrofit HIPAA compliance into products that weren’t designed for it — and it typically costs 3-5x more than building it in from day one. That’s before factoring in the risk: if you have a breach before you retrofit, the OCR doesn’t care about your product roadmap. It’s why we won’t ship an MVP without the Critical tier in place.


Case Study: PCIHIPAA’s 89% Reduction in Manual Work

PCIHIPAA (acquired by Rectangle Health) provides compliance management services for healthcare organizations. When they came to us, their compliance workflows were largely manual — staff spent hours on tasks that should’ve been automated. The application needed to handle sensitive compliance data (which falls under HIPAA) while dramatically improving operational efficiency.

We built a platform that automated the core compliance workflows, applying every control described in this article. The result? An 89% reduction in manual compliance work. But the part worth highlighting is that the security architecture didn’t slow down development. It accelerated it. Because when you build the controls into your framework from the beginning, every new feature inherits them automatically. You’re not negotiating compliance on every pull request.

Metric Before After
Manual compliance tasks Hours per workflow 89% reduction
HIPAA controls implemented Partial coverage Full 47-control framework
Audit readiness Multi-day preparation Always audit-ready with immutable logs
Security architecture Bolt-on, reactive Built-in, proactive

When Should You Bring in a Specialist?

Internal teams can handle HIPAA compliance for straightforward applications — basic patient portals, simple scheduling tools, low-complexity data flows. But there are clear signs you need a partner with deep healthcare experience.

You probably need a specialist if:

If you’re at the point of evaluating partners, we’ve published a 15-criteria evaluation framework for healthcare technology partners that covers compliance depth, domain expertise, team structure, and outcome evidence.


FAQ

What does HIPAA compliant app development actually require?

HIPAA compliant app development requires implementing technical safeguards defined in 45 CFR 164.312 across five categories: access controls, audit controls, integrity controls, transmission security, and person/entity authentication. At Sidebench, we implement 47 specific controls across these categories, built into the application layer from the first sprint.

How many HIPAA controls should an application have?

The Security Rule doesn’t specify an exact number — it defines categories and required standards. We’ve mapped those requirements to 47 specific application-layer controls. Most development teams implement 5-10 and assume their cloud provider covers the rest. That assumption is wrong and creates liability.

What’s the difference between cloud compliance and application compliance?

Cloud compliance (via your provider’s BAA) covers infrastructure: physical security, network isolation, storage encryption. Application compliance covers everything your code does with ePHI: access controls, audit logging, data integrity, authentication, and transmission security. We’ve written extensively about this gap.

How much does HIPAA compliant development cost compared to non-compliant?

Building HIPAA compliance in from the start adds roughly 15-25% to development costs. Retrofitting compliance into an existing application costs 3-5x more because you’re rearchitecting data flows, rewriting authentication, and adding audit logging to code that wasn’t designed for it. For context, the average healthcare data breach costs $9.77 million (IBM/Ponemon 2024).

Does Sidebench sign Business Associate Agreements?

Yes. We operate as a Business Associate under formal BAAs with all healthcare clients. This means we’re legally bound to the same HIPAA requirements as covered entities for any ePHI we access during development, testing, and support.

What EHR systems has Sidebench integrated with?

We’ve built integrations with Epic, Cerner, athenahealth, CentralReach, CharmEHR, and several specialty EHR platforms. Each has different data structures and technical constraints.

How do you handle PHI in development and testing environments?

We never use real PHI in development or testing. We use synthetic data that mimics production data patterns without containing actual patient information. When debugging production issues, we use de-identified data extracts with all PHI stripped. Our development environments run the same security controls as production — because security habits built in development carry through to production code.

What happens if there’s a breach in an application Sidebench built?

Our applications are built with breach detection and response as core capabilities. Immutable audit logs mean we can determine exactly what data was accessed, by whom, and when. We support clients through the 60-day HIPAA breach notification process and work with their legal and compliance teams on remediation. Our architecture minimizes blast radius — if one component is compromised, data isolation prevents lateral movement to other patient records.

How long does it take to build a HIPAA-compliant application?

A focused healthcare application typically takes 4-8 months from discovery to launch. The HIPAA controls are built in parallel with product features — they don’t add months to the timeline when they’re part of the architecture from day one. Complex multi-system integrations (EHR, claims, eligibility) can extend timelines to 8-12 months.

Do you handle 42 CFR Part 2 compliance for behavioral health?

Yes. Behavioral health applications require compliance with both HIPAA and 42 CFR Part 2, which governs substance use disorder treatment records with stricter consent requirements than standard HIPAA. We’ve built this into platforms for organizations like Cortica and NOCD.

What security testing do you perform?

We run automated security scanning in our CI/CD pipeline (SAST and DAST), conduct regular penetration testing through third-party firms, and perform manual code review for all ePHI-handling components. We also run dependency vulnerability scanning and maintain a documented remediation SLA for critical findings.

Can you audit our existing application for HIPAA gaps?

Yes. We perform application-layer HIPAA assessments that map your current implementation against the 47-control framework. The output is a gap analysis with prioritized remediation recommendations. This is often the first step for organizations that built their MVP without dedicated HIPAA expertise and now need to close gaps before a compliance audit or customer security review.


Sidebench Perspective

HIPAA compliance isn’t something we bolt onto projects. It’s baked into how we build software. After 50+ healthcare implementations, we’ve learned that the teams who treat compliance as a separate workstream always spend more, ship later, and carry more risk than the teams who build it into their development framework from sprint one. The 47 controls in this article aren’t a checklist we consult at the end of a project. They’re the foundation we start from. If you’re evaluating development partners and want to understand how our approach compares to what you’re hearing from other firms, start a conversation.

Need Help Building HIPAA-Compliant Applications?

Whether you’re starting a new healthcare application or closing compliance gaps in an existing one, we’ve done this 50+ times. Bring us the hard questions.

Schedule a Discovery Call →


Cited Data Sources

  1. HIPAA Security Rule (45 CFR 164.312)Technical Safeguards Requirements
  2. IBM/Ponemon Institute 2024Cost of a Data Breach Report 2024
  3. HHS Office for Civil RightsBreach Notification Rule
  4. ONC/ASTP 2024Hospital EHR Adoption Quick Stats

About the Author

Kevin Yamazaki is Partner and CEO at Sidebench, a Los Angeles-based digital transformation consultancy and product studio. He has led HIPAA-compliant healthcare technology implementations for organizations including Children’s Hospital Los Angeles, IEHP, Cortica, NOCD, and PCIHIPAA, spanning application-layer security architecture, EHR integrations, and compliance automation. Under his leadership, Sidebench has delivered 50+ healthcare implementations with a 47-control HIPAA framework built into every project. sidebench.com

Building the Business Case for Longevity Technology

Building the Business Case for Longevity Technology: A Board-Ready Framework for Health System Executives

Kevin Yamazaki | CEO & Partner

Read more...

Questions to ask healthcare app developer

15 Questions to Ask a Healthcare App Developer | Sidebench

Josh Koenig

Read more...

Evaluate-a-Healthcare-Technology-Partner

How to Evaluate a Healthcare Technology Partner: A Decision Framework

Kevin Yamazaki | CEO & Partner

Read more...

Behavioral health organization scaling from single clinic to interconnected multi-site network

The CTO’s Guide to Scaling Behavioral Health Technology: From 1 Clinic to 50

Kevin Yamazaki | CEO & Partner

Read more...

HIPAA compliance layers showing the gap between cloud infrastructure security and application-layer controls

Why HIPAA Compliance Starts at the Application Layer – Not the Cloud

Kevin Yamazaki | CEO & Partner

Read more...

Tackling Complex Scheduling Use Cases in Healthcare

Sidebench Health

Read more...

Double Honors: Celebrating Two Prestigious Awards for our Innovative Digital Solutions

Sidebench Team

Read more...

The Future of Digital Health and Medicare Advantage: A Hopeful Outlook

Kevin Yamazaki | CEO & Partner

Read more...