HIPAA
SerenDB offers HIPAA compliance as a self-serve feature available to customers on the Scale plan.
HIPAA support is currently available at no additional cost. Once billing is finalized, HIPAA support will add a 15% surcharge to your monthly invoice. We’ll notify you in advance before this change takes effect.
We take the security and privacy of health information seriously. This guide explains how SerenDB supports HIPAA compliance and what it means for you as a customer. HIPAA features are available to customers who have accepted our Business Associate Agreement (BAA) through the self-serve enablement process. The BAA outlines our responsibilities for protecting Protected Health Information (PHI) and ensuring HIPAA compliance.
What is HIPAA?
HIPAA is a federal law that sets national standards for the protection of health information. It requires businesses handling PHI to implement safeguards to ensure privacy and security.
Enable HIPAA
HIPAA compliance is available as a self-serve feature on supported plans. To enable HIPAA support, follow these steps:
Enable HIPAA for your Organization: First, you must enable HIPAA compliance at the organization level and accept the Business Associate Agreement (BAA).
Enable HIPAA for your projects: After HIPAA is enabled for your organization, you can create HIPAA-compliant projects or enable HIPAA for existing projects.
Step 1: Enable HIPAA for your Organization
To enable HIPAA compliance for your organization:
In the SerenDB Console, navigate to your Organization settings.
Locate the HIPAA support section.
Enable HIPAA compliance for your organization.
Read and accept the Business Associate Agreement (BAA).
Once HIPAA is enabled for your organization, you can proceed to enable HIPAA compliance for your projects.
Step 2: Enable HIPAA for your projects
Once HIPAA compliance is enabled on a project, it cannot be disabled. Enabling HIPAA will also restart all computes, temporarily interrupting database connections. HIPAA is not yet supported for Postgres 18. You cannot create a Postgres 18 project in a HIPAA-enabled SerenDB organization.
<Tabs labels={["New project", "Existing project", "API", "CLI"]}>
For SerenDB project creation steps, see Create a project.
When you create a project, select the Enable HIPAA compliance for this project checkbox on the Create Project form. This option is available after HIPAA has been enabled for your organization.

To enable HIPAA compliance for an existing SerenDB project:
In the SerenDB Console, navigate to your project's Settings page.
Locate the HIPAA support section.
Click Enable.
To create a new HIPAA-compliant SerenDB project via the SerenDB API, set audit_log_level to hipaa in the project settings object, as shown below.
curl --request POST \
--url https://console.serendb.com/api/v2/projects \
--header 'accept: application/json' \
--header 'authorization: Bearer $NEON_API_KEY' \
--header 'content-type: application/json' \
--data '
{
"project": {
"settings": {
"hipaa": true
},
"pg_version": 17
}
}
'To enable HIPAA for an existing project, set hippa to true in the project settings object using the Update project API:
curl --request PATCH \
--url https://console.serendb.com/api/v2/projects/YOUR_PROJECT_ID \
--header 'accept: application/json' \
--header 'authorization: Bearer $NEON_API_KEY' \
--header 'content-type: application/json' \
--data '
{
"project": {
"settings": {
"hipaa": true
}
}
}
'Enabling HIPAA on an existing project will force a restart of all computes to apply the new setting. This will temporarily interrupt database connections.
To create a new HIPAA-compliant SerenDB project via the SerenDB CLI, use the --hipaa option with the neon projects create command, as shown below.
neon projects create --hipaaTo enable HIPAA for an existing project, use the --hipaa option with the neon projects update command, as shown below:
neon projects update my-project --hipaaEnabling HIPAA on an existing project will force a restart of all computes to apply the new setting. This will temporarily interrupt database connections.
If you have trouble enabling HIPAA, contact hipaa@serendb.com.
For information about disabling HIPAA compliance, see [Disabling HIPAA](#disabling-hipaa).
Key HIPAA terms
Protected Health Information (PHI): Any identifiable health-related data.
Covered Entity: Healthcare providers, plans, or clearinghouses that handle PHI.
Business Associate: A service provider (like SerenDB) that handles PHI on behalf of a Covered Entity.
Breach: Unauthorized access, use, or disclosure of PHI.
Security Rule: Safeguards to protect electronic PHI.
Privacy Rule: Rules governing how PHI is used and disclosed.
How SerenDB protects your data
Use and disclosure of PHI
We only use PHI to provide our agreed-upon services and to meet legal obligations.
PHI is disclosed only as required by law or with proper authorization.
Safeguards
Administrative: Policies and training to ensure compliance.
Physical: Secure access controls to data storage areas.
Technical: Encryption and access controls for electronic PHI.
Incident reporting
We promptly report any unauthorized use or disclosure of PHI.
Breach notifications are provided within 30 days as per HIPAA requirements.
Subcontractors and agents
Any third parties we work with are required to adhere to the same data protection standards.
We provide transparency by listing our subcontractors at https://serendb.com/hipaa-contractors and notifying customers of any changes if you sign up to notifications here.
Customer responsibilities
Customers must ensure that PHI is only stored in data rows as intended for sensitive data and should never be included in metadata, column names, table names, schema descriptions, or system-generated logs such as audit trails, query logs, or error logs.
Customers have the responsibility to configure a session timeout.
Customers need to avoid including PHI in support tickets or metadata fields.
PHI access and amendments
Customers can request access to audit logs by contacting
hipaa@serendb.com.Any updates or corrections to PHI need to be carried out by the customer.
Your rights and what to expect
Transparency: You can request details about how your PHI is being used.
Security: Our technical safeguards are designed to prevent unauthorized access.
Data Control: You retain ownership of your data; we are custodians ensuring its protection.
Availability of audit events
Audit events may not be logged if database endpoints experience exceptionally heavy load, as we prioritize database availability over capturing log events.
Logged events
SerenDB maintains a comprehensive audit trail to support HIPAA compliance. This includes the following categories of logged events:
SerenDB Console and API audit logs: Captures user actions in the SerenDB Console and via the SerenDB API.
Postgres audit logs: Logged using the pgAudit extension (
pgaudit) for Postgres.
Self-serve access to HIPAA audit logs is currently not supported. Access to audit logs can be requested by contacting
hipaa@serendb.com.
SerenDB console and API audit logs
SerenDB logs operations performed via the SerenDB Console interface and the SerenDB API. Examples of logged operations may include these, among other operations:
Project management: creating, deleting, listing projects
Branch management: creating, deleting, listing branches
Compute management: starting and stopping of compute instances
Database and role management: creating or deleting databases and roles
To protect sensitive information, SerenDB filters data in audit logs using the following approach:
Sensitive fields (such as
connection_uriandpassword) are excluded from logs whereever possible.GETrequests: Only query parameters are logged; response payloads are not recorded.Mutation requests (
PATCH,PUT,POST,DELETE): Request and response bodies are logged with sensitive fields redacted.
SerenDB console and API audit log example
The following example shows how a List project branches operation is captured in SerenDB’s audit logs. The table provides a description of the log record's parts.
Audit log record:
fb7c2e2f-cb09-4405-b543-dbe1b88614b6 2025-05-25 10:18:45.340 +0000 `{ "changes": [], "sync_id": 57949 }` e640c32c-0387-4fc2-8ca5-f823f7ebc4b6 GET `{}` /projects/misty-breeze-49601234/branches a92b3088-7f92-4871-bf91-0aac64edc4b6 b8c58a4b-0a33-4d54-987e-4155e95a64b6 2025-05-24 15:42:39.088 +0000 misty-breeze-49601234 keycloak 200 `{}` ListProjectBranches 0Field descriptions:
Field position
Example value
Description
1
fb7c2e2f-cb09-4405-b543-dbe1b88614b6
Unique ID for the raw log event
2
2025-05-25 10:18:45.340 +0000
Timestamp when Airbyte extracted the record
3
{ "changes": [], "sync_id": 57949 }
Metadata from the ingestion tool
4
e640c32c-0387-4fc2-8ca5-f823f7ebc4b6
Unique identifier for the API event
5
GET
HTTP method used in the request
6
{}
Request body payload (if present)
7
Reserved for future metadata fields (empty in this case)
8
/projects/misty-breeze-49601234/branches
URL path of the API call
9
a92b3088-7f92-4871-bf91-0aac64edc4b6
Internal ID for the response object
10
b8c58a4b-0a33-4d54-987e-4155e95a64b6
Internal ID representing the auth/session context
11
2025-05-24 15:42:39.088 +0000
Actual time when the API call was made
12
misty-breeze-49601234
Project identifier targeted by the API call
13
keycloak
Authentication mechanism used
14
200
HTTP status code of the response
15
{}
Resource identifiers returned (if any)
16
ListProjectBranches
Operation name associated with the endpoint
17
0
Internal sync batch identifier
Postgres audit logs (pgAudit)
When HIPAA audit logging is enabled for a SerenDB project, SerenDB configures pgAudit with the following settings by default:
pgaudit.log
all, -misc
Logs all classes of SQL statements except low-risk miscellaneous commands.
pgaudit.log_parameter
off
Parameters passed to SQL statements are not logged to avoid capturing sensitive values.
pgaudit.log_catalog
off
Queries on system catalog tables (e.g., pg_catalog) are excluded from logs to reduce noise.
pgaudit.log_statement
on
The full SQL statement text is included in the log.
pgaudit.log_relation
off
Only a single log entry is generated per statement, not per table or view.
pgaudit.log_statement_once
off
SQL statements are logged with every entry, not just once per session.
What does pgaudit.log = 'all, -misc' include?
This configuration enables logging for all major classes of SQL activity while excluding less relevant statements in the misc category. Specifically, it includes:
READ:
SELECTstatements andCOPYcommands that read from tables or views.WRITE:
INSERT,UPDATE,DELETE,TRUNCATE, andCOPYcommands that write to tables.FUNCTION: Function calls and
DOblocks.ROLE: Role and permission changes, including
GRANT,REVOKE,CREATE ROLE,ALTER ROLE, andDROP ROLE.DDL: Schema and object changes like
CREATE TABLE,ALTER INDEX,DROP VIEW— all DDL operations not included in theROLEclass.MISC_SET: Miscellaneous
SETcommands, e.g.SET ROLE.
Excluded:
MISC: Low-impact commands such as
DISCARD,FETCH,CHECKPOINT,VACUUM, andSET.
In some cases, audit logs may include SQL statements that contain plain-text passwords—for example, in a `CREATE ROLE ... LOGIN PASSWORD` command. This is due to limitations in the Postgres `pgaudit` extension, which may log full statements without redacting sensitive values.
This behavior is a known issue. We recommend avoiding the inclusion of raw credentials in SQL statements where possible.
For more details, see the pgAudit documentation.
Audit log storage and forwarding
Logs are written using the standard PostgreSQL logging facility.
Logs are sent to a dedicated SerenDB audit collector endpoint and securely stored.
Each log entry includes metadata such as the timestamp of the activity, the SerenDB compute ID (
endpoint_id), SerenDB project ID (project_id), the Postgres role, the database accessed, and the method of access (e.g.,neon-internal-sql-editor), etc. See the following log record example and field descriptions:
Postgres audit log example
The following example shows how a simple SQL command—CREATE SCHEMA IF NOT EXISTS healthcare—is captured in SerenDB’s audit logs. The table provides a description of the log record's parts.
Query:
CREATE SCHEMA IF NOT EXISTS healthcare;
Audit log record:
2025-05-05 20:23:01.277 <134>May 6 00:23:01 vm-compute-shy-waterfall-w2cn1o3t-b6vmn young-recipe-29421150/ep-calm-da 2025-05-06 00:23:01.277 GMT,neondb_owner,neondb,1405,10.6.42.155:13702,68195665.57d,1,CREATE SCHEMA, 2025-05-06 00:23:01 GMT,16/2,767,00000,SESSION,1,1,DDL,CREATE SCHEMA,,,CREATE SCHEMA IF NOT EXISTS healthcare,<not logged>,,,,,,,,,neon-internal-sql-editorField descriptions:
Field position
Example value
Description
1
2025-05-05 20:23:01.277
Timestamp when the log was received by the logging system.
2
<134>
Syslog priority code (facility + severity).
3
May 6 00:23:01
Syslog timestamp (when the message was generated on the source host).
4
vm-compute-shy-waterfall-w2cn1o3t-b6vmn
Hostname or compute instance where the event occurred.
5
young-recipe-29421150/ep-calm-da
Project and endpoint name in the format <project>/<endpoint>.
6
2025-05-06 00:23:01.277 GMT
Timestamp of the database event in UTC.
7
neondb_owner
Database role (user) that executed the statement.
8
neondb
Database name.
9
1405
Process ID (PID) of the PostgreSQL backend.
10
10.6.42.155:13702
Client IP address and port that issued the query.
11
68195665.57d
PostgreSQL virtual transaction ID.
12
1
Backend process number.
13
CREATE SCHEMA
Command tag.
14
2025-05-06 00:23:01 GMT
Statement start timestamp.
15
16/2
Log sequence number (LSN).
16
767
Statement duration in milliseconds.
17
00000
SQLSTATE error code (00000 = success).
18
SESSION
Log message level.
19
1
Session ID.
20
1
Subsession or transaction ID.
21
DDL
Statement type: Data Definition Language.
22
CREATE SCHEMA
Statement tag/type.
23–26
(empty)
Reserved/unused fields.
27
CREATE SCHEMA IF NOT EXISTS healthcare
Full SQL text of the statement.
28
<not logged>
Parameter values (redacted or disabled by settings like pgaudit.log_parameter).
29–35
(empty)
Reserved/unused fields.
36
neon-internal-sql-editor
Application name or source of the query (e.g., SQL Editor in the SerenDB Console).
Extension configuration
The pgaudit extension is preloaded on HIPAA-enabled SerenDB projects. For extension version information, see Supported Postgres extensions.
Non-HIPAA-compliant features
The following features are not currently HIPAA-compliant and should not be used in projects containing HIPAA-protected data:
SerenDB Auth – Uses an authentication provider that is not covered under SerenDB’s HIPAA compliance.
Data API – Hosted outside SerenDB’s HIPAA-compliant infrastructure.
For updates on HIPAA support for these features, contact hipaa@serendb.com.
Security incidents
If a security breach occurs, SerenDB will:
Notify you within five business days of becoming aware of the incident.
Provide detailed information about the breach.
Take corrective actions to prevent future occurrences.
Disabling HIPAA
Once HIPAA compliance is enabled for a SerenDB project, it cannot be disabled.
If you want to disable HIPAA for your SerenDB organization entirely, you need to submit a support request. This can only be done after all HIPAA-enabled projects have been deleted.
To delete a HIPAA-compliant project, submit a support request. Before deleting a HIPAA project, make sure to export any audit logs or data you may need. SerenDB retains audit logs for the duration specified in your Business Associate Agreement (BAA).
Frequently Asked Questions
Q: Can I request SerenDB to delete my PHI? A: Yes, upon termination of services, we will securely delete or return your PHI.
Q: How does SerenDB ensure compliance with HIPAA? A: We conduct regular internal audits and provide training to our employees to ensure adherence to HIPAA requirements.
Q: What should I do if I suspect a data breach? A: Contact our security team immediately at security@serendb.com.
Contact information
For any questions regarding our HIPAA compliance or to report an issue, please reach out to hipaa@serendb.com.
This guide provides a high-level overview of SerenDB's HIPAA compliance efforts. For more details, please refer to your Business Associate Agreement (BAA) or contact us directly via our support channels.
Last updated