SOC It to Me
When the FHIR
Starts to Burn
Encrypt It Like
It’s Hot
HIPAA or Hype?
The Regulatory
Rumble
100

Name any two of the five Trust Service Criteria used to evaluate SOC 2 compliance.

What are Security, Availability, Processing Integrity, Confidentiality, and Privacy?

100

In healthcare tech, the acronym FHIR is used for sharing electronic health data. What does FHIR stand for?

What is Fast Healthcare Interoperability Resources?

100

Because HITRUST aligns with NIST and emphasizes automated security monitoring, cloud platforms must implement this authentication method for all PHI access.

What is Multi-Factor Authentication (MFA)?

100

Enacted in 1996, HIPPA was designed to protect patient health information and improve the efficiency of the healthcare system through standardization. What does the acronym HIPAA stands for?

What is the Health Insurance Portability and Accountability Act?

200

This Trust Service Criterion ensures that healthcare systems remain operational and accessible when needed.

What is Availability?

200

This modern healthcare data standard, unlike its predecessor HL7 v2, uses an API-first design rather than batch-oriented messaging—making it more flexible, scalable, and better suited for cloud-based architectures.

What is FHIR (Fast Healthcare Interoperability Resources)?

200

This advanced technology is increasingly being used in healthcare to detect cyber threats, monitor unusual network activity, and protect patient data, all in real time—reducing breaches and ensuring HIPAA compliance.

What is Artificial Intelligence (AI)?

200

Under the updated HIPAA rules, covered entities must now notify affected individuals of a data breach within this number of calendar days, down from the previous 60.

What is 30 days?

200

This widely adopted framework combines HIPAA, NIST, ISO, and other standards into a single certifiable security and privacy program commonly used by healthcare organizations.

What is HITRUST CSF (Common Security Framework)?

300

As organizations face rising expectations for continuous security and transparency, there’s growing demand for this type of always-updated assurance report aligned with Trust Services Criteria.

What is real-time SOC 2 reporting?

300

Under TEFCA, these designated entities are responsible for facilitating data exchange across networks, acting as the backbone for a trusted nationwide interoperability framework.

What are QHINs (Qualified Health Information Networks)?

300

Launched by the ONC, this initiative aims to create a nationwide health data exchange framework by connecting Qualified Health Information Networks (QHINs).

What is TEFCA (Trusted Exchange Framework and Common Agreement)?

400

This type of SOC 2 report provides a detailed audit of a company’s controls over a defined period, offering deeper assurance to healthcare clients about operational effectiveness.

What is a SOC 2 Type II report?

400

This industry-standard authorization framework enables secure, token-based access to healthcare APIs, ensuring that only authorized users and applications can retrieve protected health data.

What is OAuth 2.0?

400

This access control model limits who can view or edit PHI by assigning permissions based on job responsibilities—and enforces the principle of “least privilege."

What is Role-Based Access Control (RBAC)?

400

Under the HIPAA Privacy Rule, this principle limits the use and disclosure of Protected Health Information (PHI) to only what’s needed for specific job duties—and requires Cloudticity customers to enforce role-based access, encryption, and access logging.

What is the Minimum Necessary Rule?

400

This 2016 law promotes interoperability and prohibits information blocking, giving patients more control over their electronic health information.

What is the 21st Century Cures Act?

500

This specification extends OAuth 2.0 by standardizing authentication and authorization workflows in healthcare, enabling secure, app-based access to electronic health records through FHIR APIs.

What is SMART on FHIR (Substitutable Medical Applications, Reusable Technologies)?

500

The new HIPAA rule updates increase penalties for delayed or insufficient breach reporting. The maximum fine per violation can now reach up to this amount.

What is $1.5 million?

500

In response to rising cybersecurity threats, HITRUST updated this foundational component to better align with NIST, ISO, and emerging risks.

What is the HITRUST CSF (Common Security Framework)?

M
e
n
u