Neon offers HIPAA compliance as part of our Business and Enterprise plans, available upon request.
We take the security and privacy of health information seriously. This guide explains how Neon supports HIPAA compliance and what it means for you as a customer. HIPAA features are only available to customers who have signed a Business Associate Agreement (BAA) with Neon. The BAA outlines our responsibilities for protecting Protected Health Information (PHI) and ensuring HIPAA compliance.
To request HIPAA support and receive a draft BAA, contact Neon Sales or email hipaa@neon.tech
. After the BAA is signed, HIPAA will be enabled for your account, and you can proceed with enabling HIPAA for your Neon projects.
What is HIPAA?
HIPAA is a federal law that sets national standards for the protection of health information. It requires businesses handling PHI to implement safeguards to ensure privacy and security.
Key HIPAA terms
- Protected Health Information (PHI): Any identifiable health-related data.
- Covered Entity: Healthcare providers, plans, or clearinghouses that handle PHI.
- Business Associate: A service provider (like Neon) that handles PHI on behalf of a Covered Entity.
- Breach: Unauthorized access, use, or disclosure of PHI.
- Security Rule: Safeguards to protect electronic PHI.
- Privacy Rule: Rules governing how PHI is used and disclosed.
How Neon protects your data
-
Use and disclosure of PHI
- We only use PHI to provide our agreed-upon services and to meet legal obligations.
- PHI is disclosed only as required by law or with proper authorization.
-
Safeguards
- Administrative: Policies and training to ensure compliance.
- Physical: Secure access controls to data storage areas.
- Technical: Encryption and access controls for electronic PHI.
-
Incident reporting
- We promptly report any unauthorized use or disclosure of PHI.
- Breach notifications are provided within 30 days as per HIPAA requirements.
-
Subcontractors and agents
- Any third parties we work with are required to adhere to the same data protection standards.
- We provide transparency by listing our subcontractors at https://neon.com/hipaa-contractors and notifying customers of any changes if you sign up to notifications here.
-
Customer responsibilities
- Customers must ensure that PHI is only stored in data rows as intended for sensitive data and should never be included in metadata, column names, table names, schema descriptions, or system-generated logs such as audit trails, query logs, or error logs.
- Customers have the responsibility to configure a session timeout.
- Customers need to avoid including PHI in support tickets or metadata fields.
-
PHI access and amendments
- Customers can request access to audit logs by contacting
hipaa@neon.tech
. - Any updates or corrections to PHI need to be carried out by the customer.
- Customers can request access to audit logs by contacting
Your rights and what to expect
- Transparency: You can request details about how your PHI is being used.
- Security: Our technical safeguards are designed to prevent unauthorized access.
- Data Control: You retain ownership of your data; we are custodians ensuring its protection.
Availability of audit events
Audit events may not be logged if database endpoints experience exceptionally heavy load, as we prioritize database availability over capturing log events.
Logged events
Neon maintains a comprehensive audit trail to support HIPAA compliance. This includes the following categories of logged events:
- Neon Console and API audit logs: Captures user actions in the Neon Console and via the Neon API.
- Postgres audit logs: Logged using the pgAudit extension (
pgaudit
) for Postgres.
Self-serve access to HIPAA audit logs is currently not supported. Access to audit logs can be requested by contacting
hipaa@neon.tech
.
Neon console and API audit logs
Neon logs operations performed via the Neon Console interface and the Neon API. Examples of logged operations may include these, among other operations:
- Project management: creating, deleting, listing projects
- Branch management: creating, deleting, listing branches
- Compute management: starting and stopping of compute instances
- Database and role management: creating or deleting databases and roles
To protect sensitive information, Neon filters data in audit logs using the following approach:
- Sensitive fields (such as
connection_uri
andpassword
) are excluded from logs whereever possible. GET
requests: Only query parameters are logged; response payloads are not recorded.- Mutation requests (
PATCH
,PUT
,POST
,DELETE
): Request and response bodies are logged with sensitive fields redacted.
Neon console and API audit log example
The following example shows how a List project branches
operation is captured in Neon’s audit logs. The table provides a description of the log record's parts.
Audit log record:
fb7c2e2f-cb09-4405-b543-dbe1b88614b6 2025-05-25 10:18:45.340 +0000 `{ "changes": [], "sync_id": 57949 }` e640c32c-0387-4fc2-8ca5-f823f7ebc4b6 GET `{}` /projects/misty-breeze-49601234/branches a92b3088-7f92-4871-bf91-0aac64edc4b6 b8c58a4b-0a33-4d54-987e-4155e95a64b6 2025-05-24 15:42:39.088 +0000 misty-breeze-49601234 keycloak 200 `{}` ListProjectBranches 0
Field descriptions:
Field position | Example value | Description |
---|---|---|
1 | fb7c2e2f-cb09-4405-b543-dbe1b88614b6 | Unique ID for the raw log event |
2 | 2025-05-25 10:18:45.340 +0000 | Timestamp when Airbyte extracted the record |
3 | { "changes": [], "sync_id": 57949 } | Metadata from the ingestion tool |
4 | e640c32c-0387-4fc2-8ca5-f823f7ebc4b6 | Unique identifier for the API event |
5 | GET | HTTP method used in the request |
6 | {} | Request body payload (if present) |
7 | Reserved for future metadata fields (empty in this case) | |
8 | /projects/misty-breeze-49601234/branches | URL path of the API call |
9 | a92b3088-7f92-4871-bf91-0aac64edc4b6 | Internal ID for the response object |
10 | b8c58a4b-0a33-4d54-987e-4155e95a64b6 | Internal ID representing the auth/session context |
11 | 2025-05-24 15:42:39.088 +0000 | Actual time when the API call was made |
12 | misty-breeze-49601234 | Project identifier targeted by the API call |
13 | keycloak | Authentication mechanism used |
14 | 200 | HTTP status code of the response |
15 | {} | Resource identifiers returned (if any) |
16 | ListProjectBranches | Operation name associated with the endpoint |
17 | 0 | Internal sync batch identifier |
Postgres audit logs (pgAudit)
When HIPAA audit logging is enabled for a Neon project, Neon configures pgAudit with the following settings by default:
Setting | Value | Description |
---|---|---|
pgaudit.log | all, -misc | Logs all classes of SQL statements except low-risk miscellaneous commands. |
pgaudit.log_parameter | off | Parameters passed to SQL statements are not logged to avoid capturing sensitive values. |
pgaudit.log_catalog | off | Queries on system catalog tables (e.g., pg_catalog ) are excluded from logs to reduce noise. |
pgaudit.log_statement | on | The full SQL statement text is included in the log. |
pgaudit.log_relation | off | Only a single log entry is generated per statement, not per table or view. |
pgaudit.log_statement_once | off | SQL statements are logged with every entry, not just once per session. |
What does pgaudit.log = 'all, -misc'
include?
This configuration enables logging for all major classes of SQL activity while excluding less relevant statements in the misc
category. Specifically, it includes:
- READ:
SELECT
statements andCOPY
commands that read from tables or views. - WRITE:
INSERT
,UPDATE
,DELETE
,TRUNCATE
, andCOPY
commands that write to tables. - FUNCTION: Function calls and
DO
blocks. - ROLE: Role and permission changes, including
GRANT
,REVOKE
,CREATE ROLE
,ALTER ROLE
, andDROP ROLE
. - DDL: Schema and object changes like
CREATE TABLE
,ALTER INDEX
,DROP VIEW
— all DDL operations not included in theROLE
class. - MISC_SET: Miscellaneous
SET
commands, e.g.SET ROLE
.
Excluded:
- MISC: Low-impact commands such as
DISCARD
,FETCH
,CHECKPOINT
,VACUUM
, andSET
.
note
In some cases, audit logs may include SQL statements that contain plain-text passwords—for example, in a CREATE ROLE ... LOGIN PASSWORD
command. This is due to limitations in the Postgres pgaudit
extension, which may log full statements without redacting sensitive values.
This behavior is a known issue. We recommend avoiding the inclusion of raw credentials in SQL statements where possible.
For more details, see the pgAudit documentation.
Audit log storage and forwarding
- Logs are written using the standard PostgreSQL logging facility.
- Logs are sent to a dedicated Neon audit collector endpoint and securely stored.
- Each log entry includes metadata such as the timestamp of the activity, the Neon compute ID (
endpoint_id
), Neon project ID (project_id
), the Postgres role, the database accessed, and the method of access (e.g.,neon-internal-sql-editor
), etc. See the following log record example and field descriptions:
Postgres audit log example
The following example shows how a simple SQL command—CREATE SCHEMA IF NOT EXISTS healthcare
—is captured in Neon’s audit logs. The table provides a description of the log record's parts.
Query:
CREATE SCHEMA IF NOT EXISTS healthcare;
Audit log record:
2025-05-05 20:23:01.277 <134>May 6 00:23:01 vm-compute-shy-waterfall-w2cn1o3t-b6vmn young-recipe-29421150/ep-calm-da 2025-05-06 00:23:01.277 GMT,neondb_owner,neondb,1405,10.6.42.155:13702,68195665.57d,1,CREATE SCHEMA, 2025-05-06 00:23:01 GMT,16/2,767,00000,SESSION,1,1,DDL,CREATE SCHEMA,,,CREATE SCHEMA IF NOT EXISTS healthcare,<not logged>,,,,,,,,,neon-internal-sql-editor
Field descriptions:
Field position | Example value | Description |
---|---|---|
1 | 2025-05-05 20:23:01.277 | Timestamp when the log was received by the logging system. |
2 | <134> | Syslog priority code (facility + severity). |
3 | May 6 00:23:01 | Syslog timestamp (when the message was generated on the source host). |
4 | vm-compute-shy-waterfall-w2cn1o3t-b6vmn | Hostname or compute instance where the event occurred. |
5 | young-recipe-29421150/ep-calm-da | Project and endpoint name in the format <project>/<endpoint> . |
6 | 2025-05-06 00:23:01.277 GMT | Timestamp of the database event in UTC. |
7 | neondb_owner | Database role (user) that executed the statement. |
8 | neondb | Database name. |
9 | 1405 | Process ID (PID) of the PostgreSQL backend. |
10 | 10.6.42.155:13702 | Client IP address and port that issued the query. |
11 | 68195665.57d | PostgreSQL virtual transaction ID. |
12 | 1 | Backend process number. |
13 | CREATE SCHEMA | Command tag. |
14 | 2025-05-06 00:23:01 GMT | Statement start timestamp. |
15 | 16/2 | Log sequence number (LSN). |
16 | 767 | Statement duration in milliseconds. |
17 | 00000 | SQLSTATE error code (00000 = success). |
18 | SESSION | Log message level. |
19 | 1 | Session ID. |
20 | 1 | Subsession or transaction ID. |
21 | DDL | Statement type: Data Definition Language. |
22 | CREATE SCHEMA | Statement tag/type. |
23–26 | (empty) | Reserved/unused fields. |
27 | CREATE SCHEMA IF NOT EXISTS healthcare | Full SQL text of the statement. |
28 | <not logged> | Parameter values (redacted or disabled by settings like pgaudit.log_parameter ). |
29–35 | (empty) | Reserved/unused fields. |
36 | neon-internal-sql-editor | Application name or source of the query (e.g., SQL Editor in the Neon Console). |
Extension configuration
The pgaudit
extension is preloaded on HIPAA-enabled Neon projects. For extension version information, see Supported Postgres extensions.
Non-HIPAA-compliant features
The following features are not currently HIPAA-compliant and should not be used in projects containing HIPAA-protected data:
- Neon Auth – Uses an authentication provider that is not covered under Neon’s HIPAA compliance.
- Data API – Hosted outside Neon’s HIPAA-compliant infrastructure.
For updates on HIPAA support for these features, contact hipaa@neon.tech.
Enabling HIPAA for a Neon project
Once a Business Associate Agreement (BAA) has been signed and you have the HIPAA add-on enabled, you can create a HIPAA-compliant project or enable HIPAA for an existing project.
For Neon project creation steps, see Create a project.
When you create a project, select the Enable HIPAA compliance for this project checkbox on the Create Project form. This option only appears if HIPAA is enabled for your account.
If you have trouble enabling HIPAA, contact hipaa@neon.tech
.
Disabling HIPAA
Once HIPAA compliance is enabled for a Neon project, it cannot be disabled.
If you want to disable HIPAA for your Neon account entirely, you need to submit a support request. This can only be done after all HIPAA-enabled projects have been deleted.
To delete a HIPAA-compliant project, submit a support request. Before deleting a HIPAA project, make sure to export any audit logs or data you may need. Neon retains audit logs for the duration specified in your Business Associate Agreement (BAA).
Security incidents
If a security breach occurs, Neon will:
- Notify you within five business days of becoming aware of the incident.
- Provide detailed information about the breach.
- Take corrective actions to prevent future occurrences.
Frequently Asked Questions
Q: Can I request Neon to delete my PHI?
A: Yes, upon termination of services, we will securely delete or return your PHI.
Q: How does Neon ensure compliance with HIPAA?
A: We conduct regular internal audits and provide training to our employees to ensure adherence to HIPAA requirements.
Q: What should I do if I suspect a data breach?
A: Contact our security team immediately at security@neon.tech.
Contact information
For any questions regarding our HIPAA compliance or to report an issue, please reach out to hipaa@neon.tech
.
This guide provides a high-level overview of Neon's HIPAA compliance efforts. For more details, please refer to your Business Associate Agreement (BAA) or contact us directly via our support channels.