The Salesforce HIPAA Audit Checklist your team is probably missing
Salesforce signed your BAA. Your team thinks compliance is handled. It is not.
The BAA covers what Salesforce does on its infrastructure. It does not cover how your team configured the org, who has access to what, or whether your automations are sending PHI where they should not go. That gap between platform compliance and org compliance is where penalties come from.
HHS does not fine organizations for dramatic breaches most of the time. They're fine for quiet misconfigurations that persist for months or years without anyone noticing. A permission set that gives a marketing user access to patient records. A Flow that emails case details to an unencrypted inbox. A report that exports PHI into a CSV sitting in someone's downloads folder.
Each of those counts as a separate violation. At $100 to $50,000 per instance, the math gets ugly fast.
This checklist covers what to audit inside your Salesforce org right now. Not the theory. The actual settings, objects, and configurations that regulators look at.
1. BAA scope and service coverage
Your BAA with Salesforce does not cover everything in your org. It covers specific services deployed on Salesforce infrastructure. If you are running a managed package, a third-party integration, or anything deployed in your own environment, the BAA likely does not apply to that component.
Pull your BAA. Read the addenda. Map every service in your org against the covered services list. If something touches PHI and is not on that list, you have a compliance gap.
This is the first thing auditors check. It should be the first thing you check.
2. Field-level security and permission sets
The most common violation pattern we see is permission creep. A user changes roles. Their old permissions stay. Over time, people accumulate access they no longer need to do their job.
Run a report on every profile and permission set that grants access to objects or fields containing PHI. Compare that list against the current job functions of the people assigned to those profiles. If someone in marketing can see a medical record number field, that is a violation waiting to be flagged.
Salesforce Health Cloud orgs are especially prone to this. The default configurations are broader than most compliance teams realize.
3. Encryption at rest and in transit
Salesforce provides encryption through Shield Platform Encryption. But Shield is not enabled by default. If you have not purchased and configured it, your PHI fields are stored in plaintext on Salesforce servers.
Check whether Shield is active. Verify that every field containing PHI has encryption enabled. Confirm that your encryption key management follows your organization's retention policies.
For data in transit, Salesforce enforces HTTPS. That covers the connection between the user's browser and Salesforce servers. But it does not cover outbound emails, API calls to external systems, or file exports. If a Flow sends a case summary containing PHI via email, the content of that email is not encrypted by Salesforce. That is your responsibility.
4. Audit trail and event monitoring
HIPAA requires the ability to track who accessed PHI, when, and what they did with it. Salesforce provides basic field history tracking and login history. That is not enough for a HIPAA audit.
Event Monitoring captures API calls, report exports, and login forensics. But the standard version only retains 30 days of data. HIPAA requires documentation retention for six years.
If you are relying on default Salesforce audit capabilities, you are storing less than 2% of the retention window regulators expect. You need either an extended event monitoring license or an external archival system to close that gap.
5. Integration and data flow mapping
Every integration that touches PHI needs a documented data flow. Where does the data come from? Where does it go? Who can access it at each point? Is it encrypted in transit between systems?
We audit Salesforce orgs where five or six integrations move patient data between Salesforce, an EHR, a billing platform, and a marketing tool. In most cases, nobody has a map of the full data flow. Nobody can tell you exactly which fields are transmitted, how they are secured, or whether the receiving system is covered by its own BAA.
If you cannot produce a data flow diagram for every integration that touches PHI, you have an audit gap. Regulators will ask for this. Have it ready before they do.
6. Automation and Flow review
Flows, Process Builder automations, and Apex triggers can move data silently across your org. An automation that worked fine when it was built can become a compliance risk when someone adds a PHI field to the object it references.
Review every active Flow and automation that touches objects containing PHI. Check where the data goes. Does it create a task visible to users without PHI access? Does it send a notification that includes field values? Does it update a record in an object that is not covered by your access controls?
One healthcare client we worked with had a renewal reminder Flow that included a patient condition field in the email body. The Flow had been running for 14 months. Nobody reviewed it after the initial build.
7. Report and dashboard access
Reports are one of the easiest ways PHI leaks out of a controlled environment. A user with report-building access can pull PHI fields into a report, export it to CSV, and download it to an unmanaged device. Salesforce does not prevent this by default.
Restrict report export permissions. Limit which fields are available in the report builder for users who do not need PHI access. Use report-level security to control visibility. And monitor report exports through Event Monitoring to detect unusual download patterns.
If your compliance team cannot tell you who exported PHI reports in the last 90 days, that is a finding waiting to happen.
8. AI tools: Einstein, Copilot, and Agentforce
AI in Salesforce uses your data to generate predictions, summaries, and recommendations. If your data includes PHI, your AI outputs may contain PHI. That means every AI-generated field, recommendation, and automated action needs to be evaluated under the same access control and encryption standards as the source data.
Einstein prediction fields inherit the access level of the object they sit on. But the insight summaries generated by Copilot and Agentforce may be visible to users who should not have access to the underlying records. This is a new compliance surface that did not exist two years ago.
Before enabling any AI feature on objects containing PHI, map the output. Who sees it? Where does it display? Can it be exported? If you cannot answer those questions, do not activate it.
9. Training and documentation
Regulators do not just ask what controls you have. They ask whether your team knows they exist. HIPAA requires documented training for every workforce member who interacts with PHI.
In Salesforce terms, that means every user who has access to PHI objects or fields should have documented training on what they can and cannot do. Training should cover access limits, export restrictions, reporting rules, and what to do if they suspect a breach.
Keep training records for six years. If an auditor asks to see proof that a specific user was trained before they accessed a PHI record, you need to produce it.
10. Incident response plan
If a breach happens, you have 60 days to report it to HHS if it affects 500 or more individuals. You also need to notify affected patients and, in most cases, local media.
The organizations that handle this well are the ones that practiced before it happened. Build a response plan that names specific people, specific steps, and specific timelines. Test it quarterly. Document the tests.
The first hour after a potential breach determines the trajectory of everything that follows. If your team has to figure out who to call and what to do in real time, you are already behind.
What to do next
Print this list. Walk through each item with your Salesforce admin and your compliance officer in the same room. Not separately. Together. Most of the gaps we find exist because the compliance team does not understand how Salesforce is configured, and the Salesforce team does not understand what HIPAA actually requires.
That single conversation usually uncovers two or three issues that have been sitting in the org undetected.
If you want a structured review with someone who has done this across dozens of healthcare Salesforce orgs, Equals11 runs org audits that include HIPAA compliance as part of the scope. Permissions, encryption, data flows, automations, AI tools. We review the full environment and give you a prioritized punch list of what to fix first.
20 minutes to scope it. Get clarity on where your org stands.
FAQs: Salesforce HIPAA Compliance
Is Salesforce HIPAA compliant out of the box?
No. Salesforce can support HIPAA compliance, but it requires configuration. You need a signed BAA, Shield Platform Encryption enabled, proper permission sets, event monitoring, and documented access controls. The platform provides the tools. Your team is responsible for setting them up correctly and maintaining them.
Does signing a BAA with Salesforce make my org compliant?
The BAA only covers specific Salesforce services deployed on their infrastructure. It does not cover how your team configured the org, which users have access to PHI, how your automations handle data, or what third-party integrations do with patient records. The BAA is step one. Compliance is everything after that.
What Salesforce products are covered by the BAA?
Salesforce does not publish a standard list. The covered services are defined in the addendums of your specific BAA. They typically include core platform services deployed on Hyperforce. Managed packages, third-party apps, and anything deployed in your own environment are usually excluded. Contact your Salesforce account team for the exact scope.
How much can HIPAA fines cost in 2026?
Civil penalties range from $141 to $71,162 per violation, depending on the level of negligence. Annual caps reach $2,134,831 per violation category. A single misconfigured permission that exposes PHI across multiple records can be counted as multiple violations. Seven-figure penalties do not require a dramatic breach. They come from quiet, persistent misconfigurations.
Can individual employees be fined for HIPAA violations?
Civil penalties are assessed against the organization. But the Department of Justice can pursue criminal charges against individuals who knowingly access or disclose PHI without authorization. Penalties include fines up to $250,000 and up to 10 years in prison.
What is Salesforce Shield, and do I need it for HIPAA compliance?
Salesforce Shield provides platform encryption, event monitoring, and field audit tracking. Without it, PHI fields are stored unencrypted. The standard event monitoring only retains 30 days of data. HIPAA requires six years of documentation. If your org handles PHI, Shield or an equivalent archival solution is a practical requirement.
Are Salesforce AI tools like Einstein and Agentforce HIPAA compliant?
That depends on your configuration. AI tools use your data to generate predictions and recommendations. If the source data includes PHI, the AI outputs may also contain PHI. Those outputs need the same access controls and encryption as the source records. Copilot and Agentforce summaries can surface to users who lack access to the underlying data. Map every AI output before you enable it on PHI objects.
How often should I audit my Salesforce org for HIPAA compliance?
At a minimum, quarterly. Permission sets drift as people change roles. Automations get updated without a compliance review. New integrations get added without data flow documentation. A quarterly audit catches issues before they compound into findings. Annual audits are not frequent enough for orgs where multiple people make configuration changes.
What is the biggest HIPAA risk in Salesforce that teams miss?
Permission creep and report exports. Users accumulate access over time. Nobody removes old permissions when someone changes roles. And users with report builder access can pull PHI into a CSV and download it to an unmanaged laptop. Both are quiet risks that persist for months or years before anyone catches them.
Does HIPAA apply to nonprofit organizations using Salesforce?
If your nonprofit handles PHI in any capacity, yes. Healthcare nonprofits, community health organizations, and any nonprofit that stores or transmits patient information are covered entities under HIPAA. The rules are the same regardless of organization size or tax status. Free Salesforce licenses through the Power of Us program do not exempt nonprofits from compliance requirements.
What should I do if I think my Salesforce org is not HIPAA compliant?
Start with an internal audit using the checklist above. Get your Salesforce admin and your compliance officer in the same room. Map your BAA coverage, review permissions, check encryption, and document your data flows. If you need external support, Equals11 runs Salesforce org audits that include HIPAA compliance review. We assess your full environment and deliver a prioritized list of what to fix. Schedule a discovery call.