Technology Services and Compliance Frameworks: HIPAA, SOC 2, PCI DSS
Three compliance frameworks — HIPAA, SOC 2, and PCI DSS — govern how technology service providers handle sensitive data across healthcare, general enterprise, and payment card environments respectively. Each framework imposes distinct technical controls, audit obligations, and contractual requirements on IT vendors, managed service providers, and internal support teams. Understanding the boundaries, mechanics, and tensions among these frameworks is essential for organizations selecting or evaluating technology services compliance frameworks and the providers who operate within them.
- Definition and scope
- Core mechanics or structure
- Causal relationships or drivers
- Classification boundaries
- Tradeoffs and tensions
- Common misconceptions
- Checklist or steps (non-advisory)
- Reference table or matrix
Definition and scope
HIPAA — the Health Insurance Portability and Accountability Act of 1996 (Public Law 104-191) — establishes federal minimum standards for protecting individually identifiable health information, defined as Protected Health Information (PHI). The U.S. Department of Health and Human Services (HHS) administers HIPAA through the Office for Civil Rights (OCR). Covered entities include health plans, healthcare clearinghouses, and healthcare providers; Business Associates (BAs) — including most IT service providers with PHI access — are also subject to HIPAA's Security Rule requirements (45 CFR Part 164).
SOC 2 — System and Organization Controls 2 — is an audit framework developed by the American Institute of Certified Public Accountants (AICPA). It applies to service organizations that store, process, or transmit customer data. SOC 2 is defined by the AICPA's Trust Services Criteria (TSC), which cover five categories: Security, Availability, Processing Integrity, Confidentiality, and Privacy. Unlike HIPAA, SOC 2 is not a government regulation — compliance is voluntary but increasingly demanded contractually by enterprise clients.
PCI DSS — the Payment Card Industry Data Security Standard — is issued and maintained by the PCI Security Standards Council (PCI SSC), a consortium founded by American Express, Discover, JCB, Mastercard, and Visa. PCI DSS version 4.0, released in March 2022 and effective for full compliance by March 2025, governs any entity that stores, processes, or transmits cardholder data (CHD). The standard contains 12 top-level requirements organized across 6 control objectives.
The scope of each framework is determined by data type: PHI triggers HIPAA, cardholder data triggers PCI DSS, and any sensitive customer data held by a service organization can trigger SOC 2 audit expectations. Organizations in healthcare payment processing may fall under all three simultaneously.
Core mechanics or structure
HIPAA operates through three rules under 45 CFR Part 164. The Privacy Rule (§164.500–§164.534) governs permitted uses and disclosures of PHI. The Security Rule (§164.302–§164.318) mandates administrative, physical, and technical safeguards for electronic PHI (ePHI). The Breach Notification Rule (§164.400–§164.414) requires covered entities to notify HHS and affected individuals within 60 calendar days of discovering a breach affecting 500 or more individuals.
SOC 2 produces two report types. A SOC 2 Type I report assesses whether controls are designed appropriately at a single point in time. A SOC 2 Type II report evaluates whether those controls operated effectively over a defined period — typically 6 to 12 months — and is considered more rigorous by enterprise buyers. Independent CPA firms licensed under AICPA standards conduct these audits. The Security criterion (Common Criteria) is mandatory; the remaining four TSC categories are selected based on organizational commitments.
PCI DSS v4.0 structures its 12 requirements into six goals: build and maintain a secure network; protect account data; maintain a vulnerability management program; implement strong access control; regularly monitor and test networks; and maintain an information security policy. Organizations are classified into four merchant levels based on annual transaction volume, with Level 1 merchants (more than 6 million Visa transactions per year) required to undergo an annual on-site assessment by a Qualified Security Assessor (QSA). Lower-level merchants may self-assess using a Self-Assessment Questionnaire (SAQ).
For managed IT services providers, the most operationally significant controls span access management, encryption standards, audit logging, and incident response — all of which appear in some form across all three frameworks.
Causal relationships or drivers
Each framework emerged from a distinct regulatory or market failure. HIPAA arose from congressional concern about healthcare data portability and the proliferation of unprotected electronic medical records in the mid-1990s. OCR enforcement actions have resulted in settlements exceeding $1 million in cases such as the 2016 University of Mississippi Medical Center resolution (HHS OCR Resolution Agreements), establishing the concrete financial risk of non-compliance.
SOC 2 emerged as a market-driven response to enterprise demand for standardized assurance about third-party data handlers after the limitations of SAS 70 audits became apparent following high-profile cloud vendor failures in the early 2010s. Because SOC 2 carries no statutory penalty, its adoption is driven by procurement requirements: enterprise contracts — particularly in financial services and SaaS — increasingly require a current SOC 2 Type II report before vendor onboarding.
PCI DSS enforcement operates through card brand rules and acquiring bank contracts rather than government statute. Non-compliant merchants face fines from acquiring banks, which can range from $5,000 to $100,000 per month depending on the card brand and violation severity (PCI SSC, Understanding the SAQ). Actual card brand fine schedules are contractually determined and not published in a single public document, so the amounts above represent published industry reference ranges rather than official PCI SSC figures.
Cybersecurity support services providers frequently position themselves around these enforcement drivers, as penalties and contract-loss risk are the primary motivators organizations cite for compliance investment.
Classification boundaries
The three frameworks do not map neatly onto each other, and their scopes can overlap or conflict:
- HIPAA applies when an entity qualifies as a covered entity or business associate handling PHI. A cloud provider storing encrypted medical records is a business associate even if it cannot read the data in transit, unless the covered entity holds the sole encryption key (HHS, Guidance on HIPAA and Cloud Computing).
- SOC 2 applies when a service organization makes commitments to customers about data handling. It is sector-agnostic — a payroll processor and a healthcare IT vendor can both be SOC 2 audited.
- PCI DSS applies when cardholder data (the primary account number, or PAN, and associated data elements) passes through or is stored in an environment. Tokenization or outsourcing to a PCI-compliant payment processor can reduce scope but does not eliminate it entirely.
A healthcare SaaS company that processes insurance copayments occupies the intersection of all three frameworks. Technology services for healthcare organizations must map their data flows explicitly before determining which frameworks apply to which system components.
Tradeoffs and tensions
Specificity vs. flexibility: HIPAA's Security Rule is deliberately non-prescriptive — it identifies required and addressable implementation specifications without mandating specific technologies, which allows flexibility but generates ambiguity in audit contexts. PCI DSS v4.0 introduced a "customized approach" option that allows large organizations to design their own controls to meet security objectives, departing from the prescriptive "defined approach" — a deliberate tradeoff between standardization and adaptability.
Audit frequency vs. operational burden: SOC 2 Type II audits require continuous evidence collection throughout the audit period. Organizations that have not implemented automated log management and control monitoring frequently discover that a 12-month audit period requires months of remediation effort before the audit window even opens.
Scope reduction vs. control loss: PCI DSS scope reduction strategies — including network segmentation, tokenization, and point-to-point encryption (P2PE) — reduce audit surface area but introduce their own validation requirements. A P2PE solution must itself be listed on the PCI SSC's validated P2PE solutions registry to confer scope reduction benefits.
Overlapping controls vs. duplicate effort: Organizations pursuing simultaneous HIPAA, SOC 2, and PCI DSS compliance can reduce duplication by mapping common controls — encryption, access logging, incident response — to all three frameworks, a practice formalized in mapping documents published by NIST (NIST SP 800-66 Rev. 2 maps HIPAA to the NIST Cybersecurity Framework).
IT service management frameworks such as ITIL provide process scaffolding that supports compliance operations across all three standards without being specific to any one.
Common misconceptions
"HIPAA certification" exists as a formal credential. HHS does not issue HIPAA certifications for organizations or products. No government body certifies HIPAA compliance; the designation is self-assessed or assessed by third-party auditors without an official imprimatur (HHS FAQ on HIPAA Certification).
SOC 2 compliance is a one-time achievement. SOC 2 reports cover a defined period and expire. A Type II report covering a 12-month period ending in June does not reflect the organization's posture in December of the following year. Enterprise procurement teams specify report currency windows, typically requiring reports no older than 12 months.
Passing PCI DSS assessment means a system cannot be breached. The PCI SSC explicitly states that compliance is a snapshot; the DSS reduces risk but does not guarantee immunity. Several organizations that experienced major cardholder data breaches were reported as PCI DSS compliant at the time of breach.
Business associates are not directly regulated under HIPAA. The Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 made business associates directly liable for Security Rule compliance. OCR has pursued enforcement directly against business associates, including the 2019 $2.175 million settlement with medical transcription vendor Inmediata Health Group (reported under OCR enforcement records at HHS).
Checklist or steps (non-advisory)
The following steps represent the standard sequence organizations follow when undertaking compliance assessment for one or more of these frameworks:
- Identify applicable frameworks — Determine which data types (PHI, CHD, customer data) the organization handles and map them to HIPAA, PCI DSS, and SOC 2 scope criteria respectively.
- Define the compliance boundary — Produce a data flow diagram identifying all systems, networks, and third parties that touch in-scope data.
- Conduct a gap assessment — Compare existing controls against applicable requirements (HIPAA Security Rule, PCI DSS v4.0 requirements, SOC 2 Trust Services Criteria).
- Prioritize remediation — Sequence remediation by risk level; HIPAA required specifications and PCI DSS Requirement 6 (vulnerability management) are commonly addressed first due to enforcement exposure.
- Implement and document controls — Deploy technical controls (encryption, MFA, logging) and administrative controls (policies, training records, vendor agreements).
- Engage qualified assessors — Retain a HIPAA-qualified third-party auditor, AICPA-licensed CPA firm for SOC 2, or PCI SSC-approved QSA as applicable.
- Execute the audit or assessment — Provide evidence packages; respond to assessor findings; complete formal assessment reports.
- Remediate findings — Address any deficiencies identified during assessment before report issuance or as part of a remediation plan accepted by the assessor.
- Maintain continuous compliance — Establish recurring control monitoring, policy review cycles, and evidence collection processes aligned to audit cadence.
- Renew assessments on schedule — PCI DSS requires annual reassessment (plus quarterly vulnerability scans); SOC 2 Type II periods are typically annual; HIPAA has no fixed audit schedule but periodic internal risk analyses are required under 45 CFR §164.308(a)(1).
Technology services certifications and credentials held by IT providers often correlate with competency in executing steps 3 through 7 on behalf of client organizations.
Reference table or matrix
| Framework | Governing Body | Regulatory Status | Applies To | Key Audit Mechanism | Penalty Mechanism | Current Version |
|---|---|---|---|---|---|---|
| HIPAA Security Rule | HHS / OCR | Federal statute (45 CFR Part 164) | Covered entities & business associates | Internal risk analysis; OCR investigations | Civil monetary penalties up to $1.9 million per violation category per year (HHS) | Permanent statute; HITECH amended 2009 |
| SOC 2 | AICPA | Voluntary / contractual | Service organizations | CPA-conducted audit; Type I or Type II report | No statutory penalty; contract loss/reputational | Trust Services Criteria 2017 (updated) |
| PCI DSS | PCI SSC | Contractual (card brand rules) | Any entity handling cardholder data | QSA assessment or SAQ | Acquiring bank fines; card brand fines | Version 4.0 (March 2022) |
| NIST CSF | NIST | Voluntary federal guidance | Critical infrastructure; broad applicability | Self-assessment or third-party | None (referenced by HIPAA mapping) | Version 2.0 (2024) |
References
- U.S. Department of Health and Human Services — HIPAA for Professionals
- HHS Office for Civil Rights — HIPAA Enforcement and Resolution Agreements
- Electronic Code of Federal Regulations — 45 CFR Part 164 (HIPAA Security and Privacy Rules)
- HHS — HIPAA Guidance on Cloud Computing
- AICPA — SOC Suite of Services
- PCI Security Standards Council — PCI DSS v4.0 Document Library
- NIST SP 800-66 Rev. 2 — Implementing the HIPAA Security Rule
- NIST Cybersecurity Framework Version 2.0
- HHS — FAQ on HIPAA Certification