Executive Summary
Executive Summary: Tessara Continuous Conformance Monitoring
For Chief Compliance Officers, CISOs, and Procurement Leads
The Regulatory Forcing Function
The CMS-0057-F Interoperability and Prior Authorization Final Rule, together with its predecessor CMS-9115-F (Interoperability and Patient Access Final Rule), requires 5,000+ US healthcare payers to implement and maintain five standardized FHIR APIs — four under CMS-0057-F (Patient Access expanded, Provider Access, Payer-to-Payer, Prior Authorization) plus CMS-9115-F’s Provider Directory. Passing initial certification is only the first step; maintaining continuous specification conformance in production is a critical regulatory requirement.
The Problem: Silent Non-Conformance
Standard API monitoring (Datadog, Splunk) tracks uptime and latency but is blind to structural drift. A routine code deployment or backend schema change can silently break FHIR Implementation Guide (IG) requirements — such as a mandatory field becoming null or a data type changing — without triggering traditional alerts. This results in:
- Regulatory Liability: Failure to meet CMS-0057-F mandates.
- Data Integrity Risk: Downstream systems and apps receiving non-conformant data.
- Audit Failure: Inability to provide evidence of continuous compliance.
The Tessara Solution
Tessara is purpose-built for continuous structural conformance monitoring of regulatory APIs. It bridges the gap between point-in-time testing (Inferno) and transport-layer monitoring.
Key Capabilities:
- Specification-Aware Monitoring: Automatically parses FHIR Implementation Guides (CARIN Blue Button, Da Vinci PDex, etc.) to establish a precise structural baseline using Merkle hash trees.
- Metadata-Only Architecture: Tessara reads only your API’s public
/metadataendpoint (CapabilityStatement). No patient data, no PHI, no payload content is ever accessed, stored, or transmitted. Structural hashes and signed verdicts are persisted locally; no payloads. - Cryptographic Integrity: All conformance verdicts are backed by an immutable chain of Ed25519-signed evidence and SHA-256 hash-linked records, providing a tamper-proof audit trail.
- 6-Category Drift Taxonomy: Instantly classifies structural changes into regulatory severity levels, from informational (structural extensions) to critical (mandatory element removal).
Deployment Model
Tessara is a single Go binary with no external dependencies. It runs on your infrastructure (Linux, macOS, or Windows), stores evidence in a local SQLite database, and requires no cloud services, containers, or database servers.
Procurement Advantages
- Fast-Track Security Review: Zero PHI access and minimal external dependencies (2 Go libraries, both permissive-licensed) dramatically reduce the security review surface.
- Local-First Deployment: Runs entirely within your environment with no data egress beyond standard HTTP probes to your FHIR API’s metadata endpoint.
- Compliance ROI: Replaces manual, error-prone compliance audits with continuous, automated verification, significantly reducing the total cost of compliance.
Contact hello@tessara.us to schedule a technical deep dive.
DRAFT — counsel review pending. This document is provided for procurement discussion. Final legal terms subject to attorney review and counterparty redlines.