Use this skill when designing HIPAA-compliant workflow requirements for Health Cloud: minimum necessary access design, audit trail requirements mapping, access control patterns, and BAA dependency identification. NOT for security implementation (Shield Platform Encryption configuration, event monitoring setup) — this skill covers workflow requirements design, not technical security build steps.
Use this skill when designing HIPAA-compliant workflow requirements for Health Cloud: defining minimum necessary access patterns, identifying audit trail requirements, designing access controls for PHI, and mapping HIPAA Security Rule provisions to Salesforce platform controls. This skill focuses on requirements design and mapping. It does NOT cover the technical implementation of security controls (Shield Platform Encryption field configuration, Event Monitoring stream setup, field-level security configuration) — those are implementation-layer skills.
Gather this context before working on anything in this domain:
Salesforce is responsible for infrastructure security (data center, network, platform availability). The customer is responsible for application-level controls: who can access PHI, encryption configuration, audit trail setup, consent workflows, and policies/procedures. The BAA documents this shared responsibility. A signed BAA does not make the org HIPAA-compliant — the customer must implement all required technical safeguards.
| HIPAA Requirement | Salesforce Control |
|---|---|
| Access Control (§164.312(a)(1)) | OWD = Private + sharing rules + permission sets + care team role-scoped access |
| Audit Controls (§164.312(b)) | Shield Field Audit Trail (10-year retention); Event Monitoring for system access logs |
| Integrity (§164.312(c)(1)) | Shield Platform Encryption for PHI at rest; TLS for data in transit |
| Transmission Security (§164.312(e)(1)) | TLS enforced; no PHI in HTTP headers or query strings |
| Minimum Necessary (§164.514(d)) | OWD-Private + care team role scoping |
HIPAA requires audit log retention for 6 years from the date of creation or last effective date. Standard Field History Tracking retains only 18 months. Shield Field Audit Trail provides up to 10 years of field-level change history. Using standard Field History Tracking for PHI fields will fail a HIPAA audit — this is one of the most consequential architectural mistakes in Health Cloud implementations.
Event Monitoring logs in Salesforce are retained for only 30 days by default. HIPAA requires 6-year retention for access audit logs. Event Monitoring logs must be streamed to an external SIEM (Security Information and Event Management) system within 30 days. Salesforce does not provide long-term storage — this is an ongoing operational requirement, not a one-time configuration.
When to use: Designing the permission model for a Health Cloud org with multiple user roles and varying PHI access needs.
How it works:
Why not the alternative: Public OWD or over-broad permission sets violate the minimum necessary standard by exposing all PHI to all users regardless of care role.
When to use: Specifying audit trail controls for a production Health Cloud org.
How it works:
| Situation | Recommended Approach | Reason |
|---|---|---|
| PHI field change history | Shield Field Audit Trail | 10-year retention; standard Field History = 18 months |
| System access log retention | Event Monitoring + SIEM streaming | Logs expire in 30 days without external streaming |
| PHI at-rest encryption | Shield Platform Encryption | Required HIPAA technical safeguard |
| Patient record access control | OWD-Private + care team sharing | Minimum necessary access enforcement |
| BAA not yet signed | Do not store PHI | Hard regulatory prerequisite |
| AppExchange product used with PHI | Verify BAA coverage for that product | Not all AppExchange products are BAA-eligible |
Standard Field History Tracking does not meet HIPAA 6-year retention — 18-month standard retention fails the audit log requirement. Shield Field Audit Trail (10 years) is required. This is the #1 HIPAA architectural mistake in Health Cloud implementations.
Event Monitoring logs expire in 30 days — without streaming to a SIEM, all access audit logs are permanently lost. This is an ongoing operational requirement, not a one-time setup step.
BAA coverage is product-specific — using PHI with an uncovered Salesforce product or AppExchange package breaks HIPAA coverage even with Shield enabled. Verify BAA coverage for every product and service that touches PHI.
| Artifact | Description |
|---|---|
| PHI field inventory | Complete catalog of PHI fields across all org objects |
| HIPAA controls specification | HIPAA Security Rule safeguard to Salesforce control mapping |
| Access control matrix | Role-by-role PHI access requirements for OWD and permission set configuration |
| Event Monitoring streaming requirements | SIEM target, log types, 6-year retention policy |