Cloud architecture in a regulated environment changes the decision calculus in ways that are hard to appreciate until you’ve owned the compliance posture yourself.

In a typical enterprise environment, an architecture decision is evaluated on performance, cost, reliability, and operational complexity. In healthcare, every one of those dimensions has a compliance overlay. The question isn’t just “does this work?” — it’s “does this work and can we audit it and is it covered by our BAAs and can we explain it to a HIPAA compliance officer who doesn’t care about the technical elegance?”

I’ve spent six years making those decisions in a healthcare IT environment, and the patterns that held up consistently were the ones that treated compliance as a first-class architectural constraint — not something layered on afterward.


Start with Identity, Not Infrastructure

The most consequential architecture decision in a Microsoft-first healthcare environment is not what Azure services you use. It’s how you structure identity.

Entra ID (formerly Azure AD) is the foundation for everything. Access to M365, access to Azure resources, Conditional Access policy enforcement, device compliance through Intune — all of it runs through Entra ID. If your identity architecture is loose, your compliance posture is loose, regardless of how well everything else is configured.

In a healthcare environment, this means:

Conditional Access policies are non-negotiable, not optional. Every user accessing PHI-adjacent systems needs MFA. Compliant device requirements should be enforced wherever clinically feasible. Location-based policies add a meaningful layer of control for systems with access to sensitive data.

Privileged Identity Management (PIM) for administrative access. Standing admin privileges are a HIPAA risk. Just-in-time elevation with approval workflows and audit logging gives you the access control story auditors want to see.

Group-based licensing and access provisioning. In a 12-person IT organization, manual licensing and access management doesn’t scale and doesn’t produce the consistent audit trail you need. Dynamic groups based on HR attributes keep provisioning accurate without manual maintenance.

The identity architecture is where healthcare compliance either holds together or falls apart. Get this right before building anything else on top of it.


Cloud Analytics Infrastructure for Clinical Reporting

One of the more impactful projects I delivered at Premier Health was building the Azure infrastructure that enabled a clinical data analytics solution.

The business problem: clinical staff were waiting unacceptable amounts of time to generate reports that directly informed care decisions. The underlying cause was a combination of legacy on-premises infrastructure and data spread across systems that didn’t communicate efficiently.

My role was the infrastructure layer:

Designing the Azure environment that a cloud analytics solution could actually run on in a HIPAA-regulated context. That meant: storage architecture with the right access tiers, networking and private endpoints, Entra ID integration for role-based access control, encryption at rest and in transit, and the audit logging configuration that HIPAA requires. In healthcare, none of this is optional — it’s table stakes before you can run anything clinical on top of it.

The compliance architecture work is what makes the project possible. You can have the best analytics platform in the world; if the infrastructure underneath it can’t pass a HIPAA audit, it doesn’t get deployed.

The outcome: the clinical reporting solution went live on infrastructure that was compliant, auditable, and operationally maintainable by a small IT team. Clinical staff got faster access to the data they needed to make care decisions.

The lesson: in healthcare IT, the infrastructure and compliance layer isn’t the interesting part of the project — but it’s the part that determines whether the project happens at all.


Cold Storage and Data Tiering: Where the Savings Are

Healthcare organizations accumulate data at scale. Clinical records, imaging, diagnostic data — retention requirements are long, access patterns are predictable, and storage costs compound over time.

Most healthcare environments have significant data on the wrong storage tier: high-cost active storage for data that hasn’t been accessed in years, simply because migrating it requires effort and no one has owned the work.

Azure’s cold storage tiers exist for exactly this use case.

The architectural pattern is straightforward: classify data by access frequency and retention requirement, then implement lifecycle policies that automatically transition data to Archive or Cold access tiers as it ages. Build the policy once, and the cost reduction is ongoing.

In practice, implementing this across an environment with years of accumulated data that had never been tiered produced $1,500 per month in storage savings — $18,000 annually — from a one-time architecture effort. That’s not transformational, but it’s the kind of defensible, documented savings that build credibility with finance and fund larger initiatives.

The operational discipline required: data classification. You cannot implement effective tiering policies without knowing what data you have, how old it is, and what your retention obligations are. In a healthcare environment, that classification work is also required for HIPAA compliance — so the compliance work and the cost optimization work are the same work.


When to Eliminate Rather Than Optimize

Not every Azure cost problem has an optimization solution. Sometimes the right answer is elimination.

Azure Virtual Desktop is a useful service for specific use cases: providing secure remote access to desktop environments, supporting contractors or vendors who need access to internal systems, enabling BYOD scenarios in regulated environments.

It is not the right answer for every remote access requirement, and the costs add up quickly when it’s deployed beyond its appropriate use case.

After auditing our AVD environment against actual usage patterns, the finding was clear: the deployment was substantially oversized relative to actual utilization, and a significant portion of the use cases it was solving could be addressed through better Conditional Access policies and Intune-managed devices at a fraction of the cost.

Eliminating the over-deployed AVD environment and replacing the legitimate use cases with appropriate alternatives produced $79,000 in annual savings.

The principle: before optimizing an Azure service, ask whether the service is solving the right problem. Sometimes the most cost-effective architectural decision is the decommission.


The Compliance Audit as Architecture Review

The most useful feedback mechanism I’ve found for cloud architecture in healthcare is the compliance audit.

An auditor reviewing your HIPAA technical controls is, in effect, reviewing your architecture. They’re asking: where is PHI stored? Who can access it? How do you know who accessed it? What happens if someone’s credentials are compromised? How would you detect unauthorized access?

If your architecture has gaps, the audit finds them. If your architecture is solid, the audit is documentation.

The organizations I’ve seen struggle with HIPAA audits are usually the ones that built the technical controls first and tried to map them to compliance requirements afterward. The ones that pass audits cleanly built the compliance requirements into the architecture from the beginning.

The questions to design against:

  • Can you produce an access log for any PHI system, for any time range, for any user?
  • Can you demonstrate that terminated employees lost access within a defined window?
  • Can you show that encryption is enforced in transit and at rest?
  • Can you demonstrate that your vendors handling PHI have active, signed BAAs?

If you can answer those questions clearly, with evidence, your architecture is in good shape. If you can’t, the audit will tell you where the gaps are — ideally before the external auditor does.


Bottom Line

Healthcare cloud architecture is not fundamentally different from enterprise cloud architecture. The services are the same. The principles are the same.

What’s different is the weight of compliance requirements, the consequences of getting it wrong, and the need to translate technical decisions into outcomes that clinical and executive stakeholders understand.

The architects who thrive in regulated environments are the ones who see compliance not as a constraint on architecture but as a design requirement — one that, when taken seriously, produces systems that are more auditable, more secure, and easier to defend when it matters.


Building cloud infrastructure in a healthcare environment? The compliance requirements are real but navigable. I’m happy to talk through the specifics.

Darren Bell
Darren Bell
Senior Cloud Architect & IT Leader

Senior Cloud Architect with 10+ years leading technology operations across healthcare, managed services, and regulated industries. Specializing in Microsoft 365, Azure, identity architecture, and IT cost optimization. I write about what it actually takes to build resilient, compliant, and cost-efficient operations.