Healthcare & Interoperability
Secure health-data APIs with role-based access, audit logging, and data residency—built for interoperability and compliance.
Practical use cases
Concrete ways teams use Zerq for this scenario.
Let approved apps access patient data with clear audit
Clinics and apps (e.g. SMART on FHIR) request access to patient resources. The gateway validates tokens and scopes, logs every access by app and user, and sends logs to your SIEM so you can answer “who accessed what, when” for HIPAA and audits.
Run the gateway in your own data center
Health data never leaves your perimeter. You deploy the gateway and data store on-prem or in your approved cloud; no dependency on a third-party control plane. Ideal for strict data residency and air-gapped environments.
One entry point for multiple FHIR backends
Different services or vendors expose FHIR; you front them with one gateway. Consistent auth, rate limits, and logging across all of them. Add or change backends without redoing security and observability for each.
Outcomes
- HIPAA-aware audit and access control; interoperability with a clear audit trail.
- Data residency and no vendor lock-in; run in your DC or approved cloud.
- Single gateway for multiple FHIR backends with consistent policy and observability.
How Zerq helps
- Token validation against your IdP or custom issuers; SSO and enterprise auth for admin UI; dedicated audit role with read-only access to change history.
- Role-based access (view, edit, admin, audit) with separation of duties; per-partner access so each app/tenant only sees allowed FHIR resources or products.
- Workflow designer for custom logic: validate or transform requests before they hit the FHIR server; conditional routing by resource type, scope, or tenant.
- Full audit trail of configuration and API usage; structured JSON logs filterable by partner, product, and time; export to SIEM for HIPAA and compliance.
- Docker Compose and Kubernetes deployment; on-prem and air-gapped options so PHI stays in your infrastructure.
- Optional response caching and duplicate-request protection for read-heavy FHIR queries; health checks and readiness probes for orchestrators.
For architects & evaluators (technical context, requirements)
Technical context
Healthcare interoperability relies on FHIR APIs as a single entry point to EHRs and health data. Gateways must enforce RBAC and scope-based access, integrate with OpenID Connect–compliant identity providers and authorization servers (e.g. for SMART App Launch, UDAP), and provide detailed audit logs (who accessed what, when). Query filtering (allow/block specific FHIR searches), request/response transformation, and running in the organization’s environment for data residency are common requirements.
Technical requirements
- OAuth 2.0 / OIDC; SMART on FHIR and UDAP-style authentication workflows.
- RBAC and scope-based authorization; query filtering for FHIR search parameters.
- Audit logging: data access by user, resource, and timestamp; SIEM-ready format.
- Request/response transformation and routing to backend FHIR servers (e.g. HAPI, cloud FHIR).
- Data residency: run in your environment; no sensitive PHI in third-party SaaS control planes.