Skip to content

HIPAA Controls → Gatez Feature Mapping

Overview

This document maps HIPAA Security Rule requirements to Gatez gateway platform features. Gatez provides the technical controls; organizational policies and BAA agreements are the customer's responsibility.

Administrative Safeguards (§164.308)

HIPAA ControlRequirementGatez FeatureStatus
§164.308(a)(1)Security management processAudit trail in ClickHouse (all actions logged)✅ Implemented
§164.308(a)(3)Workforce securityKeycloak RBAC (platform-admin, tenant-admin, analyst roles)✅ Implemented
§164.308(a)(4)Information access managementPer-tenant isolation (Redis keyspace, ClickHouse row-level)✅ Implemented
§164.308(a)(5)Security awareness trainingN/A (organizational, not platform)Customer responsibility
§164.308(a)(6)Security incident proceduresAudit log + notification system for anomaly detection✅ Implemented

Technical Safeguards (§164.312)

HIPAA ControlRequirementGatez FeatureStatus
§164.312(a)(1)Access controlJWT auth (L1), master key auth (L2/L3), SCIM provisioning✅ Implemented
§164.312(a)(2)(i)Unique user identificationKeycloak user management, tenant_id in JWT claims✅ Implemented
§164.312(a)(2)(iii)Automatic logoffSession TTL in L3 (configurable, default 3600s)✅ Implemented
§164.312(b)Audit controlsClickHouse audit trail: every API call, tool call, A2A hop, session event✅ Implemented
§164.312(c)(1)Integrity controlsTool poisoning detection (server fingerprinting, naming collision)✅ Implemented
§164.312(d)Person/entity authenticationKeycloak SSO (OIDC, SAML), MFA pass-through, SCIM 2.0✅ Implemented
§164.312(e)(1)Transmission securityTLS termination at APISIX (cert-manager), Redis auth✅ Partial (TLS in K8s, not Docker dev)

Physical Safeguards (§164.310)

HIPAA ControlRequirementGatez FeatureStatus
§164.310(a)(1)Facility access controlsSelf-hosted / on-prem deployment (customer controls physical security)✅ Architecture supports
§164.310(d)(1)Device and media controlsNo PII stored in gateway (PII redacted before LLM forwarding)✅ Implemented

Data Protection

ConcernGatez FeatureDetails
PII in LLM promptsPII redaction (regex-based)SSN, email, credit card, phone, IP detected and redacted before forwarding
PHI in audit logsOnly pii_detected=true flag loggedActual content never written to ClickHouse
Data residencySelf-hosted / on-premNo data leaves customer infrastructure
Data retentionConfigurable TTL per table90 days (request logs), 365 days (AI/audit logs)
Encryption at restClickHouse native encryption, Redis persistence disabledCustomer configures volume encryption
Encryption in transitTLS via APISIX + cert-manager (K8s)mTLS between services (production)

Agent-Specific Controls

ConcernGatez FeatureDetails
Agent blast radiusPer-session tool allowlist (deny by default)Agent can only access approved tools
Agent data accessTenant-scoped MCP tool federationAgent sees only its tenant's tools
Human oversightHITL gate on high-risk tool callsConfigurable per-tenant approval workflow
Agent-to-agent delegationA2A loop detection + delegation policiesCross-tenant delegation blocked by default
Agent auditClickHouse agent_audit_logEvery tool call, A2A hop, session event with tenant_id

Gaps / Future Work

GapMitigationTimeline
TLS not enforced in Docker Compose devDev cert generation script added (EL-2). Use K8s with cert-manager for production.✅ Resolved
No encryption at rest for RedisDisable Redis persistence (done) or use encrypted volumesCustomer config
No BAA templateSee docs/compliance/baa-template.md for outline✅ Template created
L2 trusts L1 blindlyJWKS-based JWT signature validation added (EL-3)✅ Resolved
Auth headers in logsVerified clean across all 3 layers (EL-4). Only auth_type metadata logged.✅ Resolved

Evidence Mapping

For HIPAA auditors, here are the specific code files implementing each control:

ControlEvidence FileWhat to Verify
Access control (§164.312(a)(1))layers/ai-gateway/src/auth.rs, layers/agent-gateway/src/routes.rsJWT validation on every request
Audit trail (§164.312(b))infra/clickhouse/init.sqlAll tables have tenant_id + timestamp
PII protectionlayers/ai-gateway/src/pii.rsRegex redaction before LLM call
Tool access controllayers/agent-gateway/src/security.rsCEL rules + allowlist/denylist
HITL gateslayers/agent-gateway/src/routes.rs (hitl_approve/deny)Human approval workflow
Session TTLlayers/agent-gateway/src/sessions.rsConfigurable max_session_duration_secs
Transmission securityinfra/helm/gatez/templates/certificate.yamlcert-manager Certificate + ClusterIssuer

Enterprise API + AI + Agent Gateway