Object Storage

HIPAA compliant cloud storage made easy.

Storj provides fast, affordable, and secure cloud object storage for healthcare organizations that must comply with Health Insurance Portability and Accountability Act (HIPAA) regulations. Whether you are looking for HIPAA cloud storage or HIPAA compliant cloud backup, Storj provides the highest level of data privacy protection the cloud can offer.
Get started

Why Storj

Simple configuration for GDPR cloud storage.

Secure network design.

Our network architecture has been designed with security in mind, including firewalls and access controls to limit unauthorized access to protected health information (ePHI).
outline of key

End-to-end encryption.

All data is encrypted at rest using AES256-GCM authenticated encryption, while data in transit is encrypted using TLS 1.2+ to ensure strong data encryption and integrity protection.
shield outline

Redundancy without replication.

Storj stores data in a highly redundant manner by using Reed Solomon erasure encoding, reducing the risk of data loss in the event of a hardware failure.
outline of thumbprint

Private storage by default.

The distributed architecture protects files and metadata, access requires explicit permission. Encryption is fully user-controlled, with optional keys that even Storj can’t access.

Engineered for trust

Protecting sensitive healthcare data.

Storj is committed to HIPAA compliance and takes extensive measures to protect sensitive information. Storj's HIPAA compliant cloud storage is designed to ensure that customers’ sensitive ePHI is secure, available, and protected. Storj Object Storage can also be used as HIPAA compliant cloud backup. Learn how Storj security and privacy  are designed and how it achieves the highest levels of availability and durability at the links below.

Customer story

Compliant and flexible storage.

Customers trust Storj for HIPAA compliant cloud storage that is flexible, fast and secure.
"The more than 300 hospitals that we work with across six countries are focused on protecting patients. Our role is to protect their patient data from cyberattacks and ensure their systems run with the performance and reliability they need. Storj Select's uniquely customizable compliance features, speed and security fit well with our cloud strategy."
matt donahue
Matt Donahue
CEO at Cloudwave

FAQ

Common question on HIPAA compliant cloud storage.

Are there added costs for HIPAA compliant storage?

keyboard_arrow_down

No, there are no additional costs beyond Storj Select fees for the robust security features in Storj’s HIPAA compliant cloud storage solutions. Unlike other cloud service providers, Storj does not require separate products or fees for HIPAA compliant security. Storj’s secure cloud storage is designed with advanced security measures out-of-the-box, including encryption, distributed storage, and data access management, ensuring healthcare providers and data storage providers alike meet HIPAA rules without hidden costs.

Will Storj sign a Business Associate Agreement (BAA)?

keyboard_arrow_down

Yes, Storj will sign a Business Associate Agreement (BAA) for customers storing electronic protected health information (ePHI). The BAA outlines how Storj helps safeguard ePHI and ensures compliance with HIPAA standards and the HITECH Act. This agreement underscores Storj’s shared responsibility approach to helping healthcare providers maintain compliance with the Privacy Rule, Security Rule, and Breach Notification Rule.

Does Storj also support HITECH regulations?

keyboard_arrow_down

Yes, Storj supports customers who need to comply with HITECH regulations in addition to HIPAA standards. HITECH, which supplements HIPAA rules, focuses on improving the digital security and privacy of healthcare information. Storj provides a secure cloud storage foundation that aligns with these regulations, protecting the confidentiality of sensitive health data while ensuring its availability for authorized use.

How does Storj ensure encryption and authorization are managed securely?

keyboard_arrow_down

Storj’s approach to data access management separates encryption and authorization, creating a zero-trust layer between customer data and the storage infrastructure. This separation ensures that authentication controls are robust and that encryption keys remain protected at all times. Storj further enhances security by implementing data encryption at rest and in transit, adhering to industry-leading practices for secure cloud computing.

How does Storj's distributed storage support HIPAA requirements?

keyboard_arrow_down

Storj’s distributed network model addresses HIPAA compliance by securely storing ePHI across a global network of storage nodes. All objects are divided into segments, which are encrypted and erasure-encoded. These encrypted segments are then dispersed across the network, ensuring data availability and durability even if individual nodes are compromised or experience hardware failures.

This innovative approach ensures that sensitive healthcare data remains secure and accessible, adhering to HIPAA standards for data storage and breach prevention. Additionally, this architecture provides flexibility, as customers can store data on SOC2 certified facilities, restrict storage to specific regions, or even operate nodes within their infrastructure.

How is metadata handled in Storj's HIPAA compliant cloud storage solutions?

keyboard_arrow_down

Metadata is encrypted using AES256-GCM authenticated encryption by default and stored in SOC2 Type 2 compliant data centers. This ensures that even metadata, including object path or user-supplied details, remains secure. Storj employs a distributed database to store metadata, designed for high availability and strong concurrency, enabling optimal performance while supporting the requirements of HIPAA compliance.

How does Storj handle data transfer securely?

keyboard_arrow_down

Storj offers two secure models for data transfer via its cloud services, a client software approach named Uplink and a hosted HTTP endpoint model called Edge Services.

Edge Services: Includes a hosted S3-compatible Gateway and the Auth Service, operated in SOC2-certified facilities. All transfers to and from Edge Services utilize HTTPS with TLS 1.2+ encryption, maintaining confidentiality and data integrity during transit.\

(Optional) Uplink Client: Features end-to-end encryption, where all data is encrypted on the client side before leaving. This data remains encrypted during transfer and storage, ensuring robust protection against vulnerabilities.

These secure data transfer methods align with HIPAA rules and give healthcare providers and other users confidence in the security of their sensitive information.

Does Storj conduct regular security assessments?

keyboard_arrow_down

Yes, Storj is committed to maintaining robust security measures through regular security assessments. These assessments help identify potential vulnerabilities while ensuring compliance with HIPAA’s Security Rule. Storj also continuously refines its practices to meet evolving requirements and standards for secure cloud storage, providing peace of mind for healthcare providers and other organizations storing ePHI.

How does Storj assist with breach notification requirements?

keyboard_arrow_down

Storj’s advanced architecture minimizes the risk of data breaches by encrypting data and distributing it across an independent storage network. However, in the unlikely event of a breach, Storj ensures customers can fulfill their Breach Notification Rule obligations by providing transparent processes and documentation. This capability supports HIPAA compliant data recovery procedures and compliance with the HHS reporting requirements.

Can healthcare providers control where their data is stored?

keyboard_arrow_down

Yes, healthcare providers using Storj’s HIPAA compliant cloud storage have full control over their data’s storage locations. Customers can restrict data to specific geographic regions, SOC2 Type 2 certified facilities, or a private infrastructure under their control. This flexibility allows organizations to meet regional compliance requirements while maintaining the availability and integrity of stored data.

How does Storj support data recovery?

keyboard_arrow_down

Storj’s use of Reed-Solomon erasure encoding ensures data remains highly redundant and recoverable. Even with hardware failures or the loss of a storage node, the distributed nature of Storj’s secure cloud storage guarantees data availability. This resilience aligns with HIPAA standards for ensuring data integrity and availability, making Storj an ideal partner for HIPAA compliant cloud backup solutions.

How does Storj demonstrate compliance with HIPAA's Security Rule?

keyboard_arrow_down

Storj’s design reflects the requirements of HIPAA’s Security Rule, incorporating encryption, zero-trust access control, and multi-factor authentication to restrict unauthorized data access. By safeguarding data in motion and at rest with AES 256 and TLS 1.2+ encryption, adhering to rigorous network design principles, and employing SOC2 compliant operations, Storj delivers a reliable, secure storage service tailored to the needs of the healthcare sector.

What makes Storj a forward-thinking choice for HIPAA compliant cloud storage?

keyboard_arrow_down

Storj sets itself apart through its cutting-edge use of distributed cloud computing and zero-trust principles. By implementing highly advanced encryption, enabling customizable storage options, and minimizing vulnerabilities, Storj provides healthcare providers with innovative solutions for secure ePHI management. Paired with support for HIPAA rules, HITECH regulations, and a transparent shared responsibility approach, Storj is the modern choice for ensuring compliance and safeguarding healthcare data.