Healthcare organizations that suffer major breaches are rarely non-compliant. Most have completed HIPAA risk assessments, signed Business Associate Agreements, implemented access controls, and adopted cloud platforms with security certifications. The breaches happen anyway and they happen at scale; they are rarely limited in their scale.
Compliance provides essential organizational discipline. But compliance was designed to answer one question: have the required safeguards been implemented? Security must answer a different question: can sensitive data be accessed, copied, or misused during real workflows, even when systems are compromised?
2.1 What HIPAA Requires and What It Does Not
HIPAA's Security Rule requires covered entities and business associates to implement reasonable safeguards for electronic PHI. The rule is intentionally flexible, allowing organizations to choose measures appropriate to their size and risk profile. That flexibility creates gaps (HHS, 45 CFR Part 164):
- HIPAA does not mandate end-to-end encryption. Encryption is classified as an “addressable” specification, meaning organizations can satisfy it by documenting why they chose not to encrypt and implementing an alternative measure.
- HIPAA allows broad administrative and service-account access to PHI. There is no requirement that access be cryptographically enforced or that decryption keys be separated from infrastructure credentials.
- HIPAA does not restrict decryption inside applications. Once data reaches an authorized system, it can exist in plaintext across memory, logs, caches, and temporary storage.
- HIPAA does not protect PHI after sharing beyond requiring a Business Associate Agreement, which is a contractual control, not a technical one. A BAA cannot prevent a third party from storing or mishandling plaintext data.
- HIPAA does not require tamper-evident, cryptographic audit trails. Organizations may rely on system logs that can be altered, deleted, or incomplete.
The result: an organization can pass a HIPAA audit and still have PHI sitting in plaintext across dozens of systems, vendor environments, and shared workflows. This is not a theoretical risk. It is how every major breach described in Section 1 occurred.
2.2 The Expanding Attack Surface
A modern healthcare organization may share PHI with EHR vendors, billing and coding platforms, clearinghouses, insurance payers, telehealth systems, analytics tools, AI platforms, cloud providers, Health Information Exchanges, and numerous consultants, auditors, and service providers. Each connection is a point where PHI may be decrypted, cached, logged, or exposed. The average hospital works with more than 1,300 vendors (Ponemon Institute).
HIPAA's framework of BAAs and organizational policies was not designed to enforce technical protections across this kind of sprawl. And it does not.
Cloud platforms like AWS, Azure, and Google Cloud provide strong infrastructure security: physical data centers, hardware isolation, availability, and baseline compliance certifications. But cloud security operates under a shared responsibility model. The provider secures the infrastructure. The customer is responsible for securing the data, applications, and access controls running on that infrastructure (AWS Shared Responsibility Model; Azure Shared Responsibility).
This distinction is frequently misunderstood. Migrating to AWS does not mean PHI is encrypted end-to-end, that administrators cannot access plaintext data, or that policies travel with data after sharing. Cloud encryption at rest and in transit protect data while stored on disk and while moving over a network. Both protections end the moment an application processes the data. At that point, PHI is plaintext.
Healthcare breaches most often result from credential compromise, misconfiguration, third-party attacks, insider threats, and ransomware (Verizon DBIR, 2024). In every one of these scenarios, the cloud infrastructure performs exactly as designed. The breach occurs because PHI exists in plaintext at the application layer, accessible to anyone with sufficient credentials or access.
Encryption at rest protects data on disk but is transparent to applications. Data is automatically decrypted when accessed by any authorized service or user. It does not prevent a compromised administrator from querying the database and reading every record in plaintext. It protects against one threat: physical theft of storage media, a risk largely mitigated by cloud data center security.
Encryption in transit (TLS/SSL) protects the communication channel. Data is decrypted at each endpoint, including every server, load balancer, API gateway, and application that processes it. TLS protects the pipe. It does not protect what flows through it.
Consumer end-to-end encryption, the model used by Signal and WhatsApp, protects messages between sender and recipient. But healthcare requires multi-party access across physicians, specialists, billing teams, payers, and labs. Access requirements change over time and must be revocable. Consumer E2EE does not support revocation after delivery, centralized audit trails, or policy-based access controls for time, device, role, or geography.
Healthcare needs an encryption model that provides genuine end-to-end protection while supporting the complex, multi-party, policy-driven workflows the industry requires.
Traditional security asks: “Is this system secure?” Data-layer security asks: “Is this data secure, regardless of what system it is on?”
Data-layer security is a fundamentally different architecture. Instead of building walls around data (perimeter security) or locking the rooms where data is stored (encryption at rest), data-layer security locks the data itself. The protection travels with the data. It does not matter if the system is compromised, the administrator is malicious, or the vendor is breached. Without correct cryptographic authorization, the data is unreadable.
Effective data-layer security for healthcare must:
- Encrypt data at the source before it touches any network or third-party system
- Maintain encryption across storage, transit, processing, and sharing
- Prevent intermediary access to plaintext without explicit cryptographic authorization
- Enforce access policies that travel with the data across organizations
- Support revocable, dynamic access control even after sharing
- Provide tamper-evident audit trails with cryptographic integrity
- Integrate into existing workflows without requiring operational changes
- Scale across providers, vendors, payers, and analytics platforms
Seald Healthcare provides an encrypted data layer purpose-built for healthcare. PHI is encrypted at the source and protection is maintained across every system, vendor, and workflow the data touches. Here is what that looks like in practice.
6.1 End-to-End Encryption for Healthcare
PHI is encrypted at the source and only decrypted by authorized recipients. No intermediary, including Seald Healthcare itself, can access plaintext data. This is not the transparent encryption of cloud storage or the channel encryption of TLS. This is persistent, data-layer encryption where the cryptographic keys are independent of the infrastructure.
Unlike consumer end-to-end encryption, Seald Healthcare's model was designed from the ground up for healthcare's multi-party access requirements. A single patient record can be accessible to the treating physician, consulting specialists, the billing team, and the insurance payer, each with different permission levels, all enforced cryptographically.
6.2 Persistent Access Policies
Access policies travel with the data itself. Healthcare organizations can define exactly who can access data, from which devices, during which time windows, under which conditions (geographic, network, or MFA requirements), and for how long.
The key difference from traditional access controls: these policies are cryptographically enforced at the point of decryption, not at the network perimeter. And they can be modified or revoked at any time, even after data has been shared. When a vendor's contract expires, access is revoked. When a staff member changes roles, permissions update automatically. When a security incident is detected, access can be suspended across the entire ecosystem in real time.
6.3 AI-Powered Policy Management
Seald Healthcare's AI Studio allows administrators to define access policies in plain English. Instead of configuring complex rule engines or writing security policies in technical syntax, an administrator can write:
“Only allow our clinical staff to decrypt patient records during office hours from managed devices.”
The AI Studio translates natural language into enforceable cryptographic policies. This dramatically reduces the complexity of policy management while eliminating the misconfiguration risk that causes so many breaches in the first place.
6.4 Tamper-Evident Audit Trails
Every access event, whether it is a successful decryption, a denied access attempt, a policy change, a key rotation, or a permission modification, is logged with cryptographic integrity. These logs cannot be altered without detection. They record who accessed data, when, from where, and from which device. They provide evidence-grade records for compliance audits, breach investigations, regulatory inquiries, and legal proceedings. And they are maintained independently of the systems storing or processing PHI.
6.5 SDK-First Integration
Seald Healthcare integrates into existing healthcare workflows through an SDK-first approach. The Seald Healthcare SDK can be embedded into EHR systems, patient portals, telehealth platforms, secure messaging applications, file-sharing systems, and custom internal tools. Integration does not require changes to existing clinical or administrative workflows. Staff continue to use the same systems they use today. The encryption and policy enforcement happen transparently at the data layer, complementing existing cloud environments including AWS, Google Cloud, and Azure.
6.6 Automatic Key Management
Managing encryption keys is one of the most complex challenges in applied cryptography. Seald Healthcare handles it automatically. Keys are issued, rotated, rewrapped, and revoked without manual intervention. Key management is separated from infrastructure access, meaning cloud administrators cannot access decryption keys. No cryptography expertise is required from the healthcare organization's IT team. The key lifecycle follows NIST best practices and is designed for quantum-safe cryptographic migration as post-quantum standards (FIPS 203/204/205) are adopted across the industry (NIST, 2024).
6.7 Group and Role-Based Access
Healthcare is organized around teams, departments, and roles, not individual users. Seald Healthcare supports this structure natively. Permissions can be assigned to care teams, departments, or roles rather than individuals. Access updates automatically as group membership changes. When a physician joins a department, they gain access to that department's encrypted data without manual provisioning. When a nurse transfers to another unit, permissions adjust accordingly. The system supports the complex access patterns healthcare demands: primary care teams, consulting specialists, and administrative staff can each hold different permission levels on the same data.
Abstract security concepts become concrete when you consider the scenarios healthcare organizations actually face.
7.1 Vendor Breach
Without Seald Healthcare: A revenue cycle management vendor is breached. The vendor has access to plaintext PHI for millions of patients across dozens of healthcare clients. All patient data is exposed. The healthcare organization learns of the breach weeks later and has no ability to limit the damage. This is exactly what happened with Change Healthcare.
With Seald Healthcare: The same vendor is breached, but all PHI passing through or stored by the vendor is encrypted with Seald Healthcare. The attacker obtains ciphertext, which is unreadable without cryptographic authorization they do not have. The healthcare organization revokes the vendor's decryption permissions in real time. The audit trail shows exactly what data the vendor accessed before the revocation. Patient data remains secure.
7.2 Insider Threat
Without Seald Healthcare: A database administrator with broad system access exfiltrates patient records. Traditional access controls cannot prevent someone with legitimate administrative credentials from querying the database. The organization discovers the theft months later through an unrelated investigation. In 2024, a former employee at Nuance Communications (a Geisinger contractor) accessed records of 1,276,026 patients two days after being terminated because credentials were not revoked (HIPAA Journal).
With Seald Healthcare: The administrator can access the database but cannot decrypt PHI because decryption keys are managed independently of infrastructure credentials. The data in the database is ciphertext. Access attempts are logged in the tamper-evident audit trail, triggering real-time alerts.
7.3 Ransomware Attack
Without Seald Healthcare: Attackers exfiltrate PHI before deploying ransomware. Even if the organization recovers from the ransomware, the exfiltrated data is permanently compromised. The organization faces regulatory penalties, class-action lawsuits, and reputational damage. UnitedHealth Group spent $3.1 billion responding to a single ransomware incident.
With Seald Healthcare: Attackers exfiltrate encrypted data. Without Seald Healthcare's decryption keys, the data is useless. The organization can demonstrate to regulators and patients that PHI was never exposed in plaintext. Under HIPAA's encryption safe harbor provision, the breach notification obligation may be eliminated entirely, because encrypted data that is breached is not considered “unsecured PHI” under the Breach Notification Rule.
7.4 Tracking Technology Exposure
Without Seald Healthcare: Website tracking pixels from Google, Meta, or other advertising platforms inadvertently capture and transmit patient data to third parties. Kaiser Foundation Health Plan exposed 13.4 million member records this way in 2024. The data was sent to advertising companies in plaintext (HIPAA Journal).
With Seald Healthcare: Even if tracking technologies capture data fields, the underlying PHI is encrypted. What gets transmitted is ciphertext. The advertising platform cannot read it. The exposure is neutralized.
Several forces are converging that make data-layer security not just advisable but unavoidable for healthcare organizations. The urgency for healthcare organizations to adopt data-layer security is accelerating. It is no longer a matter of best practice, but an existential requirement driven by the convergence of several major, intensifying forces. These pressures — from rapidly escalating vendor-related compromises and a massive expansion of the attack surface due to AI adoption, to tightening regulatory enforcement and the hard demands of the cyber insurance market — are rendering traditional, perimeter-focused security models obsolete. Furthermore, the industry must now begin planning for a fundamental shift in cryptographic standards with the advent of post-quantum computing. For these reasons, data-layer security has become not just advisable, but an unavoidable imperative.
8.1 Third-Party Risk Is Accelerating
The Change Healthcare and MOVEit breaches demonstrated that vendor compromises cascade across entire industries. The average hospital works with more than 1,300 vendors (Ponemon Institute). In 2024, business associate breaches accounted for a disproportionate share of compromised records (HIPAA Journal). This trend will intensify as healthcare continues to outsource functions to specialized technology providers.
8.2 AI Adoption Is Expanding the Attack Surface
Clinical decision support, population health analytics, predictive modeling, and administrative automation all require access to patient data. Every AI model, every analytics pipeline, and every data-sharing arrangement expands the attack surface. Without data-layer encryption, AI adoption in healthcare means PHI exposure at scale.
8.3 Regulatory Enforcement Is Tightening
In December 2024, HHS published a proposed update to the HIPAA Security Rule that would, if enacted, require healthcare organizations to implement multifactor authentication, encryption for data at rest and in transit, network segmentation, cybersecurity testing, and other measures currently treated as optional (HIPAA Journal; HHS NPRM, 2024). OCR's new risk analysis enforcement initiative has already resulted in multiple penalties in 2025, with the year on track to set a record for HIPAA enforcement actions (HIPAA Journal). State attorneys general are also increasing enforcement.
8.4 Cyber Insurance Is Demanding More
Cyber insurers are shifting from compliance checklists to demonstrated technical controls as conditions of coverage. Organizations that cannot show data-layer protections will face higher premiums, narrower coverage, and exclusions that leave them exposed when breaches occur.
8.5 Post-Quantum Cryptography Is Coming
NIST has finalized its first post-quantum cryptographic standards (FIPS 203, 204, and 205). Organizations across industries are beginning migration planning. Healthcare organizations that have not modernized their cryptographic architecture will face expensive, disruptive upgrades. Seald Healthcare's architecture is designed for quantum-safe cryptographic migration, providing protection today and a clear path forward as standards evolve (NIST, 2024).
Adopting data-layer security does not require ripping out existing infrastructure. Seald Healthcare is designed to layer on top of current systems, complementing existing security investments while closing the gaps that perimeter-based approaches leave open.
There are three integration paths: SDK integration embeds the Seald Healthcare SDK directly into existing applications, handling encryption, decryption, key management, and policy enforcement transparently. Gateway deployment encrypts data as it enters or exits environments that cannot be modified at the application level. API-based integration enables custom workflows for specialized analytics pipelines, interoperability requirements, or novel use cases.
Seald Healthcare integrates in minutes, not months. Organizations can begin encrypting PHI in their highest-risk workflows immediately and expand coverage incrementally. There is no requirement to encrypt everything at once.
And data-layer security does not replace existing security infrastructure. Firewalls, identity providers, SIEM systems, and endpoint protection all remain in place. Seald Healthcare adds a layer of cryptographic protection that these systems cannot provide. Even if every perimeter control fails, data encrypted with Seald Healthcare remains unreadable without explicit cryptographic authorization.
Healthcare does not have a compliance problem. It has a data security problem.
The numbers are unambiguous. More than 846 million patient records compromised since 2009. Nearly 277 million in 2024 alone. A single breach affecting 192.7 million people. Average breach costs that have exceeded every other industry for 14 straight years. Record enforcement penalties. Mounting litigation. Accelerating third-party risk.
Compliance frameworks and cloud platforms remain necessary. They provide essential baseline protections, organizational discipline, and regulatory alignment. But they were never designed to protect PHI as it moves across the modern healthcare ecosystem, an ecosystem of hundreds of vendors, thousands of integration points, and millions of daily data transactions.
The gap is structural. Perimeter-based security protects systems. Data-layer security protects data. Healthcare needs both.
Seald Healthcare provides the encrypted data layer that compliance frameworks were never built to deliver. By encrypting PHI at the source, enforcing access policies cryptographically, maintaining tamper-evident audit trails, and integrating seamlessly into existing workflows, Seald Healthcare ensures that patient data remains secure and unreadable, even when systems are compromised, vendors are breached, and credentials are stolen.
Are you ready to be secure, not just compliant?
- HIPAA Journal, “Healthcare Data Breach Statistics,” updated February 4, 2026. Based on data from the HHS Office for Civil Rights breach portal through January 31, 2026.
- HIPAA Journal, “2024 Healthcare Data Breach Report,” January 2025.
- HIPAA Journal, “The Biggest Healthcare Data Breaches of 2024,” March 2025.
- HIPAA Journal, “Largest Healthcare Data Breaches of 2025,” December 2025.
- HIPAA Journal, “December 2025 Healthcare Data Breach Report,” February 2026.
- HIPAA Journal, “Average Cost of a Healthcare Data Breach Falls to $7.42 Million,” July 2025.
- IBM Security / Ponemon Institute, “Cost of a Data Breach Report 2024.” Healthcare industry average: $9.77 million. Global average: $4.88 million.
- IBM Security / Ponemon Institute, “Cost of a Data Breach Report 2025.” Healthcare industry average: $7.42 million. U.S. average: $10.22 million.
- HHS Office for Civil Rights, “Change Healthcare Cybersecurity Incident FAQs,” updated July 2025. Confirmed 192.7 million affected individuals.
- UnitedHealth Group, Change Healthcare consumer support page. Confirmed breach details, notification timeline, and affected data types.
- Cybersecurity Dive, “UnitedHealth hikes number of Change cyberattack breach victims to 190M,” January 2025. Reported $3.1 billion in response costs.
- U.S. Department of Health and Human Services, HIPAA Security Rule, 45 CFR Part 164.
- HHS Office for Civil Rights, HIPAA Security Rule Notice of Proposed Rulemaking (NPRM), December 2024.
- Amazon Web Services, “Shared Responsibility Model.”
- Microsoft Azure, “Shared Responsibility in the Cloud.”
- Verizon, “Data Breach Investigations Report (Healthcare Sector),” 2024.
- Ponemon Institute, “Third-Party Risk in Healthcare,” 2024.
- National Institute of Standards and Technology, Post-Quantum Cryptography Standardization Program, FIPS 203/204/205, 2024.
© 2026 Seald Healthcare, Inc. All rights reserved.