PricingDemo
Log InGet API Key

HATS / HIPAA Crosswalk

Document: H33-XWALK-HIPAA-001
Version: 1.0
Date: 2026-05-22
Framework: HIPAA Security Rule (45 CFR Part 164, Subpart C)
Editor: Eric Beans, H33.ai, Inc.

1. Scope

This crosswalk maps HATS capabilities to the HIPAA Security Rule technical safeguards (45 CFR 164.312), administrative safeguards (45 CFR 164.308), and selected organizational requirements. The Security Rule establishes national standards for the protection of electronic protected health information (ePHI).

HATS capabilities are particularly relevant to HIPAA compliance when ePHI is processed under fully homomorphic encryption (FHE), where data remains encrypted during computation. This directly addresses the Security Rule's encryption and access control requirements.

This crosswalk is a technical mapping. It does not constitute a HIPAA compliance certification or replace the risk analysis required by 45 CFR 164.308(a)(1)(ii)(A).

2. Technical Safeguards (164.312)

164.312(a) -- Access Control

RequirementHATS CapabilityEvidence TypeVerification Method
164.312(a)(1) Unique user identification (R)Continuous AttestationPer-access attestation receipts binding unique user identity to each ePHI access eventVerify each access receipt contains a unique, authenticated identity; confirm no shared credentials in receipt stream
164.312(a)(2)(i) Emergency access procedure (R)Governance ReplayEmergency access decision attestation receipts with governance bindingReplay emergency access decisions; verify they followed documented emergency procedures
164.312(a)(2)(ii) Automatic logoff (A)Continuous AttestationSession termination attestation receipts with timestampVerify session termination receipts occur within configured timeout; confirm no orphaned sessions
164.312(a)(2)(iv) Encryption and decryption (A)Encrypted ComputationFHE computation attestation receipts demonstrating ePHI processed without decryptionVerify computation_type field indicates FHE operation; confirm ePHI never appears in plaintext in any receipt

164.312(b) -- Audit Controls

RequirementHATS CapabilityEvidence TypeVerification Method
164.312(b) Record and examine activity in systems containing ePHI (R)Continuous Attestation + Evidence ChainsTamper-evident attestation receipt chain recording all ePHI system activityTraverse evidence chain to verify complete activity record; verify chain integrity via predecessor hashes; confirm three PQ signatures on each receipt

164.312(c) -- Integrity

RequirementHATS CapabilityEvidence TypeVerification Method
164.312(c)(1) Protect ePHI from improper alteration or destruction (R)Evidence ChainsCryptographically linked evidence chain with SHA3-256 predecessor hashesVerify chain integrity; any modification, insertion, or deletion of receipts breaks the hash chain
164.312(c)(2) Authentication of ePHI (A)Continuous AttestationePHI integrity attestation receipts recording hash of protected data at access timeCompare ePHI hashes across successive attestation receipts to detect unauthorized modification

164.312(d) -- Person or Entity Authentication

RequirementHATS CapabilityEvidence TypeVerification Method
164.312(d) Verify identity of person or entity seeking access to ePHI (R)Agent Attestation + Continuous AttestationAuthentication event attestation receipts binding verified identity to each ePHI accessVerify authentication receipts precede every ePHI access receipt; confirm identity verification method is attested

164.312(e) -- Transmission Security

RequirementHATS CapabilityEvidence TypeVerification Method
164.312(e)(1) Guard against unauthorized access during transmission (R)Encrypted ComputationTransmission encryption attestation receipts; ML-KEM-1024 key establishment receiptsVerify key establishment receipts use post-quantum key encapsulation; confirm all transmission events are attested
164.312(e)(2)(ii) Encryption (A)Encrypted ComputationPer-transmission encryption attestation receiptsVerify encryption attestation exists for each ePHI transmission; confirm PQ key encapsulation was used

3. Administrative Safeguards (164.308)

RequirementHATS CapabilityEvidence TypeVerification Method
164.308(a)(1)(ii)(D) Information system activity review (R)Evidence Chains + Governance ReplayActivity review decision attestation receipts with governance bindingReplay activity review decisions; verify reviews covered the complete evidence chain for the review period
164.308(a)(3)(ii)(A) Authorization and/or supervision (A)Agent AttestationWorkforce authorization attestation receiptsVerify authorization receipts precede workforce ePHI access; confirm supervisor identity is attested
164.308(a)(4) Information access management (R)Continuous Attestation + Governance ReplayAccess management decision attestation receiptsReplay access management decisions; verify each access change was governed and attested
164.308(a)(5)(ii)(C) Log-in monitoring (A)Continuous AttestationAuthentication attempt attestation receipts including failuresVerify all authentication attempts (success and failure) are attested; analyze failure patterns in evidence chain
164.308(a)(6) Security incident procedures (R)Evidence Chains + Governance ReplayIncident response evidence chain with governance decision attestationTraverse incident response chain; replay response decisions; verify response followed documented procedures

4. FHE and ePHI Processing

When ePHI is processed under FHE, the data remains encrypted during computation. The computation output is attested in its encrypted form. At no point in the processing pipeline does ePHI exist in plaintext outside the client's decryption boundary. This architecture directly satisfies the encryption requirements of 164.312(a)(2)(iv) and 164.312(e)(2)(ii).

HATS attestation receipts for FHE computations record the computation_type as FHE_COMPUTE (0x05) in the H33-74 primitive. The receipt does not contain ePHI. It contains a cryptographic commitment (SHA3-256 digest) that binds the computation result to the attestation without revealing the data.

This separation between the attestation layer and the data layer ensures that the evidence chain itself does not constitute ePHI, which simplifies the compliance posture of the attestation infrastructure.

5. Coverage Notes

HATS addresses all four technical safeguard categories (Access Control, Audit Controls, Integrity, Transmission Security) and the person/entity authentication standard. Administrative safeguard coverage is partial; HATS provides technical evidence to support administrative controls but does not replace organizational policies, workforce training, or physical safeguards.

The following HIPAA requirements are outside the scope of HATS: physical safeguards (164.310), Business Associate Agreement terms (164.314), policies and procedures documentation (164.316), and breach notification (164.400-164.414). R = Required, A = Addressable.