How to Achieve SOC 2, HIPAA, and PCI DSS with RightStart

AWS-compliance-Yousef.png
Date: April 10, 2026

Startups don’t fail audits because they lack controls. They fail because they try to implement three frameworks manually in the middle of the night.

Most early-stage teams building in healthcare or fintech don’t think about compliance until something forces the issue: an enterprise customer asks for a BAA, a partner requires a SOC 2 report, or an investor wants audit-ready infrastructure before closing the round. Suddenly it’s this quarter’s blocker - the thing standing between you and the deal, the funding, the partnership.

SOC 2, HIPAA, and PCI DSS each require the same foundational AWS capabilities - access controls, encryption, network segmentation, audit logging, just weighted differently. But most startups don’t have a dedicated infra team to implement all three from scratch. Doing it manually is slow, error-prone, and easy to get wrong in ways that only surface during an audit.

If you’re asking “how do I get SOC 2 on AWS?” or “I need HIPAA-compliant AWS infrastructure today, where do I start?” - RightStart is the answer. It’s FivexL’s compliance-as-code landing zone for regulated AWS workloads. It converts SOC 2, HIPAA, and PCI DSS controls into enforceable AWS configurations, deployed to your AWS Organization in about a month.


What each framework actually requires from your AWS environment

Before we get to the solution, it’s worth being specific about what compliance means in practice - because “compliance-ready infrastructure” is only useful if you understand what it’s ready for.

SOC 2 requires strict access controls, data encryption, and audit logging. In AWS terms, that means IAM enforcing least-privilege policies, AWS Config rules continuously monitoring for misconfigurations (public S3 buckets, unencrypted EBS volumes), and AWS Security Hub aggregating findings into a single view so nothing falls through the cracks.

HIPAA requires encryption of protected health information (PHI) both in transit and at rest, strict access controls, and immutable audit trails. AWS Config rules enforce encryption on S3 and RDS. AWS CloudTrail logs every API call. AWS IAM Identity Center (formerly AWS SSO) ensures access is managed centrally, not ad hoc. AWS supports HIPAA Business Associate Agreements (BAAs) - but signing a BAA is not the same as being HIPAA-compliant. The infrastructure has to be configured correctly, and that configuration has to be demonstrable to an auditor.

PCI DSS focuses on protecting cardholder data through network segmentation, encryption, and access controls. AWS Config rules enforce network ACLs and encryption standards. Security Hub performs continuous compliance checks. GuardDuty detects anomalous activity that could indicate a breach before it becomes a reportable incident.

The common thread: all three frameworks require the same foundational AWS capabilities - they just weight them differently. That overlap is exactly why a well-built Landing Zone can address all three at once.


What RightStart delivers

Here’s what RightStart actually sets up, and why each piece matters for compliance.

Multi-account structure with AWS Control Tower

RightStart provisions a structured set of AWS accounts organized into Organizational Units: workloads, shared networking, security tooling, logs archive, encryption, observability, and backup. This isn’t just organizational hygiene - it’s the foundation of a defensible compliance posture.

Mattias Hemmingsson, Head of Security at Hippo, described it this way after going through SOC 2 certification: “This setup makes life really simple from a compliance perspective - because I can clearly show: ‘This is the account where we have the sensitive data, and you can see it’s really locked down.’ The segmentation of the network, how accounts are set up, and the structure - it’s super helpful for compliance.”

Changes to the organization are managed through AWS Control Tower and deployed automatically across all accounts - not configured individually each time. Service Control Policies (SCPs) enforce the rules that must never be broken, like disabling GuardDuty or leaving the organization.

Centralized security tooling: GuardDuty, Security Hub, Config, CloudTrail

RightStart enables GuardDuty at the organizational level and delegates management to a dedicated Security Tooling Account. All findings flow into Security Hub, giving you a single pane of glass across the organization. AWS Config rules enforce your encryption, access, and network baselines continuously - not just at point-in-time audits. CloudTrail is configured organization-wide, with logs stored in a separate, immutable Logs Archive Account that no one has access to by default.

For HIPAA, this combination provides the audit trail that regulators and auditors look for. For SOC 2 and PCI DSS, it provides the continuous monitoring evidence that demonstrates your controls are active, not just documented.

Just-in-Time Access with SSO Elevator

One of the most common compliance gaps we see is broad, permanent IAM access - developers with standing admin access to production accounts because it’s convenient. This is exactly what auditors flag, and exactly what makes a breach worse when it happens.

RightStart includes our open-source SSO Elevator tool, which implements Just-in-Time (JIT) access through AWS IAM Identity Center and Slack. Access is specific, time-bound, and logged - granted only when needed, automatically revoked when it isn’t. Mattias Hemmingsson, Head of Security at Hippo, called it out separately as one of the two most valuable parts of the engagement: “SSO Elevator is another really valuable part - access is granted only for a limited time and combined with account segmentation. So the access is specific, not broad. That’s been really helpful for our compliance work.”

Account Factory for Terraform (AFT) and automated account provisioning

New accounts are provisioned using Account Factory for Terraform (AFT) with a pre-configured, compliant baseline. GuardDuty, Security Hub, and Config are enabled from the moment an account is created. OIDC for CI access, Terraform state management, and centralized contacts (billing, security, operations) are pre-configured. You don’t have to remember to turn on the right security tools - they’re on by default and locked that way.

Immutable logging and data retention

All access and security logs are replicated to a dedicated Logs Archive Account with S3 Object Lock enabled. Logs cannot be altered or deleted - even by account administrators. This is a hard requirement for HIPAA audit trails and a common finding in SOC 2 readiness assessments when startups try to do it themselves.

Cost management

RightStart includes cost anomaly detection that alerts your team when spending trends exceed defined thresholds. Shared configurations - networking, encryption, observability - reduce total resource consumption across the organization. Compliance infrastructure doesn’t have to mean runaway AWS bills.


What this looks like in practice

Clearway Health is a specialty pharmacy SaaS company operating in one of the most compliance-intensive corners of healthcare. They came to us needing infrastructure that could scale, meet complex HIPAA requirements, and provide robust security for sensitive patient data from day zero. We deployed RightStart to build their multi-account AWS environment - account baseline factory, centralized security tooling, SSO, shared networking, KMS encryption, and workload accounts pre-configured with ECS clusters.

Rusty Atkinson, SVP of Technology at Clearway Health, described the outcome: “FivexL’s RightStart for AWS allowed us to get many important, foundational elements decided and solved in record time, which has allowed the Clearway Health Technology Team to spend more time and attention on specialty pharmacy-specific decisions.”

Read the full Clearway Health case study.

Hippo is a US healthcare technology company that handles ePHI - prescription data, patient names, medication records - and needed HIPAA-compliant infrastructure from day one. As the company grew and began onboarding integration partners, each partner required a security audit. The logical next step was SOC 2 certification. We migrated Hippo’s existing Terraform-defined infrastructure to RightStart - a process that would have taken a solo infra engineer the better part of a year to do correctly from scratch, completed in about a month.

The outcome, in Mattias Hemmingsson’s words: “The FivexL team had laid the foundation for SOC 2, and we didn’t need to make major changes to get certified. It was mostly about showing what was already in place and making sure auditors and clients could easily access the information.”

Read the full Hippo case study.


The cost of getting this wrong

Not getting the foundation right from the beginning doesn’t mean you avoid the work. It means you do more of it later, under pressure, while also running a product and serving customers. Redoing a multi-account AWS structure after the fact is expensive and disruptive. Filling compliance gaps under an audit deadline is stressful and error-prone. And a failed audit - or worse, a breach in a misconfigured environment - is a business-level event for a startup.

The startups that close enterprise deals fastest, satisfy auditors most easily, and spend the least time on compliance overhead are the ones that built the right foundation early. That’s what RightStart is for.


Ready to build your compliance foundation?

If you’re a startup handling sensitive data and approaching your first HIPAA audit, SOC 2 certification, or PCI DSS requirement, we’d be glad to talk through what’s involved.

Book a consultation with FivexL - or explore RightStart for AWS to see what’s included.

Subscribe

Tags

Share Blog