Build vs Buy: How to Decide Your CMS-0057-F FHIR API Strategy

CMS-0057-F FHIR API Build vs Buy Decision Guide

Your January 1, 2027, deadline is real. And it’s closer than your roadmap thinks. CMS-0057-F doesn’t ask health plans to update a policy or file a report. It requires you to build, operate, and maintain five production-grade FHIR APIs, serving members, providers, and other payers, at enterprise scale, with 99.9% uptime, starting eight months from now.

Most engineering teams are still debating the approach. That debate is costing you time you don’t have.

The build vs. buy decision for your CMS-0057-F FHIR API strategy isn’t a philosophical question. It’s a financial and operational calculation, one with a clear answer for most health plans once you run the actual numbers. An enterprise-wide in-house build requires up to 16 FTEs and nearly $2.9 million in annual labor cost, before infrastructure, recruiting, and regulatory upkeep. And it takes 18–24 months for a team that already knows FHIR.

Most plans don’t have that team. Or that runway. This guide gives your CTO, Engineering VP, or IT Director the complete decision framework: what CMS-0057-F actually requires, what each architecture pattern costs, where implementations fail, and exactly how to spend your next 90 days.

What CMS-0057-F Actually Requires

CMS released the Interoperability and Prior Authorization Final Rule, formally designated CMS-0057-F, in January 2024. But here’s what most summaries miss:

This is not a policy update. It is an engineering mandate.

CMS is requiring impacted payers, Medicare Advantage organizations, Medicaid and CHIP managed care plans, and QHP issuers on the Federally Facilitated Exchanges, to build and operate production-grade, standards-based FHIR APIs. APIs that are publicly accessible, reliably available, and continuously maintained.

The operational provisions took effect January 1, 2026. Full API compliance is due January 1, 2027.

That window is now less than eight months away.

Related Guide: CMS-0057-F: Complete 2026-2027 Compliance Guide for US Health Plans

The Five APIs You Must Implement

CMS-0057-F mandates five FHIR-based APIs. Four are new requirements. One, the Patient Access API, extends a mandate from the 2020 CMS-9115-F rule.

Here’s exactly what each API does, who it serves, and when it goes live:

API Who It Serves Data Required Deadline
Patient Access API (enhanced) Members via third-party apps Claims, encounters, USCDI clinical data, prior auth status, and decisions Jan 1, 2027
Provider Access API In-network providers Claims, encounters, USCDI data, prior auth info, individually and in bulk Jan 1, 2027
Provider Directory API Providers and the public Contracted provider directory, updated within 30 days of changes Jan 1, 2027
Payer-to-Payer API Receiving payer when member switches plans Up to 5 years of claims, USCDI data, prior auth history, member opt-in required Jan 1, 2027
Prior Authorization API Providers submitting PA requests PA requirement checking, documentation surfacing, submission, and electronic decisions Jan 1, 2027

Process rules (faster PA decision timeframes: 7 calendar days standard, 72 hours expedited) took effect January 1, 2026. The first public prior authorization performance metrics were due March 31, 2026.

Translation: if your plan hasn’t already begun collecting PA metrics and reporting them, you are already past one compliance milestone.

The Technical Stack CMS Expects

All five APIs must be built on the same foundational layer:

  • HL7 FHIR R4 (v4.0.1), the base data standard.
  • SMART on FHIR / OAuth 2.0 + OpenID Connect is the authorization framework for consumer-facing and provider-facing access.
  • SMART Backend Services is the system-to-system authentication pattern for the Provider Access API’s bulk data flows.
  • HL7 FHIR Bulk Data Access IG v1.0.0 is required for bulk data retrieval in the Provider Access API
  • US Core / USCDI v1 and v3 required data element standards.

CMS has also strongly recommended (though not strictly mandated) a set of HL7 Da Vinci Project Implementation Guides. These are fast becoming the industry’s de facto compliance playbook:

Da Vinci IG API It Supports Purpose
CARIN Blue Button IG STU 2.0/2.1 Patient Access API Claims data structure for consumer apps
PDex (Payer Data Exchange) IG STU 2.0/2.1 Patient Access, Provider Access, Payer-to-Payer Payer-specific FHIR resource profiles
Plan-Net IG Provider Directory API Provider directory structure
CRD (Coverage Requirements Discovery) Prior Authorization API Real-time PA requirement checks at point-of-care
DTR (Documentation Templates & Rules) Prior Authorization API Surfacing documentation requirements
PAS (Prior Authorization Support) Prior Authorization API Electronic PA submission and decision return

Why align with Da Vinci? Because EHR vendors, Epic, Oracle Health, and Cerner, are building their integrations to these IGs. Aligning with them now dramatically reduces the custom development required to achieve real-world provider adoption, not just technical compliance.

The Real Complexity Health Plans Are Walking Into

Here’s the thing most vendor sales decks won’t tell you: CMS-0057-F compliance isn’t one project. It’s five interconnected projects, each with dependencies on the others, running against the same January 2027 clock. And the complexity compounds quickly.

Complexity Layer 1: Your Data Is Scattered Across Multiple Source Systems

FHIR APIs don’t generate data. They surface it.

But most health plan data lives across a fragmented ecosystem: a claims processing platform, a utilization management system, a provider relations database, a pharmacy benefits manager, and a clinical data warehouse — each with its own schema, refresh cadence, and access controls.

Before you can expose any of the five required APIs, you need to solve a data integration problem that most IT teams have been deferring for years.

The FHIR layer is the last mile. The data pipeline is the marathon before it.

Complexity Layer 2: Provider-Patient Attribution Is Harder Than It Looks

Both the Provider Access API and the Payer-to-Payer API depend on accurate member attribution.

For the Provider Access API, your FHIR endpoint must only return data to a provider who has a current treatment relationship with the member. That requires a real-time, accurate provider-patient matching process and a compliant opt-out mechanism for members who don’t want their data shared.

For the Payer-to-Payer API, you need member opt-in. You need to query a previous payer’s API on the member’s behalf. And you need to receive, validate, store, and surface up to five years of data from a system you have no control over.

These are not FHIR problems. They are operational, governance, and data quality problems that sit upstream of your API layer.

Complexity Layer 3: The Prior Authorization API Is the Most Complex Piece

The PA API is the centerpiece of CMS-0057-F and the most technically demanding.

Most payers today still run prior authorization through a combination of phone calls, fax, and X12 278 batch transactions. The PA API requires building a real-time FHIR interface that can:

  1. Tell a provider whether prior authorization is required for a given service (CRD workflow)
  2. Surface the documentation requirements for that PA request (DTR workflow)
  3. Accept an electronic PA submission (PAS workflow)
  4. Return an electronic decision, within 7 days standard, 72 hours expedited

CMS allows three architectural approaches: FHIR-only, X12-only, or a hybrid model. Most payers will expose a FHIR API externally and translate requests into their existing utilization management systems internally.

That translation layer, where FHIR meets legacy UM, is where most implementations stall.

Complexity Layer 4: Compliance Requires 99.9% API Uptime

CMS’s requirements don’t just apply to implementation. They apply to ongoing operations.

Your APIs must be reliably available. They must be monitored. They must be maintained as standards evolve. And they must report metrics annually. Patient Access API usage metrics are due to CMS each March 31, starting with the 2025 data reported in 2026.

That means your FHIR infrastructure isn’t a project with a completion date. It’s a production service with SLAs, incident response, and a continuous compliance obligation.

Build vs. Buy — The Framework You Actually Need

This is the decision that will define your 2027 compliance outcome. And it’s the one most leadership teams are making with incomplete information. Let’s be direct: for the majority of health plans and TPAs, building a complete CMS-0057-F FHIR API platform from scratch is not a viable strategy. 

Not because it’s technically impossible, but because the total cost of ownership makes it financially unjustifiable, and the timeline makes it operationally reckless. 

That said, “buy” is not a binary switch. The real decision is about which components to build, which to buy, and how to integrate the two. Here’s the framework.

The Build vs. Buy Decision Matrix

Score your organization 1–3 on each dimension, then total your score.

Dimension Build-Favorable Hybrid-Favorable Buy-Favorable
In-house FHIR expertise Deep team with FHIR R4 + Da Vinci production experience Some FHIR experience, limited Da Vinci knowledge No FHIR production team
Available engineering capacity Dedicated team with bandwidth through Q4 2026 Partial capacity; team is split across other priorities The engineering team is at capacity on the existing roadmap
Timeline pressure 18+ months of runway for build, test, and production rollout 12–18 months, tight but possible with focused effort Under 12 months to production, building alone is not viable
Lines of business in scope Single LOB (e.g., MA only) 2–3 LOBs with moderate data fragmentation Multiple LOBs with fragmented legacy data
Competitive differentiation in the API layer API layer is a strategic differentiator (e.g., you’re selling FHIR access to providers as a value-add) Compliance is the goal; differentiation may come later Compliance is the only goal
Budget ceiling Unconstrained, can absorb $2M+ annually in FHIR engineering labor Moderate, must optimize spend; some vendor spend is acceptable Constrained, must minimize labor; subscription model preferred

Score interpretation:

  • 6–9: Build approach is viable. Consider an open-source FHIR server as a base, build configuration and orchestration layers.
  • 10–14: The hybrid approach is optimal. Buy the core FHIR platform; build a data pipeline, consent management, and workflow integration.
  • 15–18: Buy approach is the only realistic path to January 2027 compliance.

The True Cost of Building In-House

When health plans estimate the cost of building their own FHIR solution, they almost always stop at developer salaries. That’s a catastrophic undercount.

Here’s the full labor picture, based on industry data from organizations that have run this calculation:

Scenario FTEs Required Estimated Annual Burdened Labor Cost
Prior CMS-9115-F implementation (single LOB baseline) 3–4 FTEs ~$720,000/year
CMS-0057-F, single LOB 8 FTEs ~$1,440,000/year
CMS-0057-F, all LOBs (enterprise-wide, fragmented data) 16 FTEs ~$2,878,000/year

And labor is only part of the picture. Add:

  • Cloud compute and storage: FHIR resource indexing at payer scale generates significant recurring infrastructure cost.
  • Data processing: transforming and indexing millions of claims and clinical records into FHIR R4 resources is compute-intensive.
  • Security and compliance: HIPAA-compliant OAuth2/SMART on FHIR flows, audit logs, and penetration testing.
  • Regulatory R&D: as Da Vinci IGs update, US Core versions advance, and CMS refines requirements, your in-house team must track and implement every change.
  • Recruiting: FHIR-literate healthcare engineers take 4–7 months to hire and command premium salaries.
  • SLA management, maintaining 99.9% uptime across five APIs, requires dedicated DevOps and 24/7 monitoring.

The total cost of ownership over three years for a full in-house build at enterprise scale frequently exceeds $7–9 million, before accounting for the opportunity cost of engineering time diverted from your core platform roadmap.

The Real Cost of Buying

The honest version of the buy calculus includes:

  • Platform subscription typically $500K–$2M annually, depending on plan size, LOBs, and member volume.
  • Implementation services configuration, data mapping, and integration work are still required, typically $200K–$800K for initial deployment.
  • Internal integration engineering: connecting your claims system, UM platform, and provider database to the vendor FHIR layer still requires internal or contracted engineering time.
  • Vendor lock-in risk: if the vendor changes pricing, gets acquired, or exits the market, your compliance program is exposed.
  • Customization ceiling commercial platforms have configuration limits; highly specialized workflows may require custom builds on top of the platform.

For most plans with more than 100,000 members across two or more lines of business, buying a purpose-built FHIR compliance platform is 40–60% less expensive on a 3-year TCO basis than building and staffing the equivalent in-house.

For plans with under 50,000 members and a single line of business, a hybrid approach, open-source FHIR server plus targeted vendor modules for complex capabilities like the PA API, often offers the best balance of cost, control, and compliance speed.

The Four Architecture Patterns Health Plans Are Using in 2026

There is no single “correct” architecture for CMS-0057-F compliance. CMS deliberately avoids mandating specific technical implementations, it mandates capabilities and standards.

In practice, health plans are converging on four implementation patterns:

Pattern 1: Full Commercial Platform

A purpose-built FHIR compliance platform, like 1upHealth, Smile Digital Health, or Rhapsody, that provides a pre-built FHIR server, data ingestion pipelines, Da Vinci IG implementations, SMART on FHIR authorization, and compliance dashboards. The health plan’s team connects source systems and configures workflows.

Plans under severe timeline pressure, plans with limited in-house FHIR expertise, and plans with multiple LOBs requiring a unified compliance layer.

4–8 months from contract to go-live (dependent on data integration complexity).

Vendor dependency and configuration limits. If your UM workflows or consent processes are non-standard, you may hit the platform’s ceiling faster than expected.

Open-Source FHIR Server with Vendor Modules

Deploy an open-source FHIR R4 server (HAPI FHIR, Firely Server, or Aidbox) as your core infrastructure. Purchase commercial modules for the highest-complexity components, typically the PA API workflow (CRD, DTR, PAS) and the Payer-to-Payer data exchange layer. Build data pipelines, consent management, and provider attribution in-house or with a systems integrator.

Plans with moderate FHIR engineering capability that want cost control without fully outsourcing their compliance infrastructure.

Time to production: 8–14 months. Faster than pure build; slower than pure buy.

Integration complexity compounds quickly. Every additional source system that needs to feed the FHIR server adds engineering scope. Budget slippage is common without a strong technical program manager.

EHR/Claims Vendor Extension

What it looks like: If your claims processing platform or care management platform (Facets, HealthEdge, Cognizant TriZetto) is releasing native FHIR compliance modules, extend that existing platform rather than deploying a standalone FHIR server.

Plans are heavily invested in a single enterprise platform that is actively building toward CMS-0057-F compliance on its roadmap.

Time to production: Entirely dependent on the vendor roadmap, which introduces schedule risk outside your control.

You are betting your compliance timeline on a third party’s delivery commitments. If the vendor slips, your plan slips. Thoroughly validate their compliance timeline, test environment availability, and Da Vinci IG readiness before committing to this path.

Pattern 4: Hybrid X12/FHIR Prior Authorization

Rather than building a native FHIR PA workflow from scratch, this pattern deploys a translation layer between provider FHIR submissions (CRD/DTR/PAS) and your existing X12 278 utilization management infrastructure. Providers submit via FHIR; the platform translates to X12 internally; PA decisions return via FHIR.

CMS explicitly allows this hybrid model under enforcement discretion that removed the requirement to use X12 278 exclusively.

Plans with mature X12 UM infrastructure that cannot be replaced before 2027. This protects your existing operational investment while meeting the FHIR compliance requirement.

6–10 months. The translation layer is well-understood, and several vendors specialize in it.

This approach has a ceiling. As provider EHR systems fully adopt Da Vinci IGs, the translation layer becomes a long-term technical debt item. Plan your migration path to native FHIR now, even if you implement the hybrid model first.

Five Implementation Risks and How to Solve Them

The plans that will struggle to meet the January 2027 deadline aren’t the ones that started late. They’re the ones who started with the wrong assumptions. Here are the five risks that most commonly derail CMS-0057-F programs and what to do about each.

Risk 1: Underestimating the Data Pipeline Before the FHIR Layer

The mistake: Teams scope their FHIR API project as a software build and forget that it requires clean, current, structured source data to function.

What actually happens: The FHIR server is built and tested. Then the team discovers that the claims data feed has a 72-hour lag. The clinical data sits in a proprietary warehouse schema. The provider database hasn’t been reconciled in 18 months. The PA decisions are stored in a UM system with no real-time API.

Every one of these becomes a project within the project.

De-risk it: Before writing a line of FHIR code, conduct a full data gap analysis. Map every required data element (USCDI v1/v3, claims, PA decisions) to its source system, refresh rate, and access mechanism. Identify gaps. Build the pipeline before, or in parallel with, the FHIR layer.

Risk 2: Treating Provider-Patient Attribution as an Afterthought

The mistake: Teams assume their existing provider roster is accurate enough for the Provider Access API’s attribution requirements.

What actually happens: Attribution data is wrong. Providers query for members who terminated coverage six months ago. Members who opted out of data sharing still have their records returned. Regulatory scrutiny follows.

De-risk it: Build provider-patient matching and consent management as dedicated workstreams, not as features added after the FHIR server is live. CMS will audit this. Your providers will test it. Your members’ attorneys will care about it.

Risk 3: Scoping Only the Technical Requirements and Missing Operational Readiness

The mistake: Compliance is treated as an engineering project, not a cross-functional program.

What actually happens: The APIs go live. Providers don’t know they exist, don’t know how to authenticate, and don’t trust the data quality. Member call volume spikes as enrollees receive PA decision notifications they don’t understand. The Provider Directory API returns stale data because the operational process for 30-day updates was never implemented.

De-risk it: Assign a compliance program manager with authority across IT, operations, provider relations, and member services. API go-live is an operational event, not a deployment event. Train your provider relations team before the PA API is live. Prepare member communications before the Patient Access API data goes live.

Risk 4: Assuming the First Vendor Demo Reflects Implementation Reality

The mistake: The RFP process evaluates platform capabilities against a demo environment. The production implementation then reveals that the platform’s Da Vinci IG support is theoretical, its claims data ingestion requires significant custom mapping, or its bulk data performance degrades at production member volume.

De-risk it: Require sandbox access as a condition of contract negotiation. Run your actual data through the vendor’s test environment, not synthetic data. Ask for reference calls specifically with health plans of similar size, LOB complexity, and legacy infrastructure. Validate Da Vinci IG version support explicitly.

Risk 5: Building Toward Compliance Without Planning for What Comes After

The mistake: The entire program is oriented toward checking the box by January 2027. No one has planned for ongoing maintenance, annual metric reporting, IG version upgrades, or how to actually drive provider adoption.

What actually happens: You meet the deadline. Six months later, the Pa API has 3% provider adoption because nobody drove onboarding. Your Da Vinci IG version is outdated. The next round of CMS rulemaking introduces new requirements that your architecture doesn’t support.

De-risk it: Build a post-go-live operations plan before you launch. Assign ownership for API monitoring, metric reporting, provider onboarding, and regulatory tracking. Your FHIR infrastructure is a product, not a project.

The Recommended Implementation Guides for CMS-0057-F

CMS does not mandate a single implementation path. But it strongly recommends a specific set of implementation guides, and the practical healthcare ecosystem is aligning around them.

Here is the current recommended IG stack for each API:

Patient Access API

Foundation: FHIR R4, SMART App Launch IG Release 2.0.0, USCDI v1 and v3

Recommended IGs:

  • CARIN Consumer Directed Payer Data Exchange (Blue Button) IG STU 2.0/2.1, for claims and encounter data structure
  • Da Vinci PDex IG STU 2.0/2.1, for payer-specific resource profiles including prior auth data
  • PDex US Drug Formulary IG STU 2.0.1/2.1.0, for drug formulary data

Provider Access API

Foundation: FHIR R4, FHIR Bulk Data Access IG v1.0.0, SMART Backend Services (for system-to-system authentication)

Recommended IGs:

  • Da Vinci PDex IG STU 2.0/2.1, for payer data exchange profiles
  • Da Vinci Member Attribution (ATR) IG, for provider-patient panel management
  • Da Vinci PAS IG, for prior authorization data included in provider responses

Key distinction: Unlike the Patient Access API (which uses consumer-facing OAuth 2.0 flows), the Provider Access API uses backend service authentication, designed for EHR-to-payer system connections, not individual user authentication. Many teams scope this incorrectly.

Payer-to-Payer API

Foundation: FHIR R4, SMART on FHIR (for member opt-in flows), USCDI v1 and v3.

Recommended IGs:

  • Da Vinci PDex IG for the data package exchanged between payers
  • CARIN Blue Button IG for claims and encounter data structure within the exchange package

Technical note: This API requires your plan to act as both a sender (when a member leaves your plan) and a receiver (when a member joins your plan from another payer). Both flows must be implemented and tested independently.

Prior Authorization API

Foundation: FHIR R4, SMART on FHIR / SMART App Launch (for EHR-embedded workflows).

The Da Vinci PA Workflow (the ePA workflow):

  • CRD (Coverage Requirements Discovery): The first touchpoint. Fires inside the provider’s EHR at the point-of-care. Returns whether PA is required and what documentation is needed in real time.
  • DTR (Documentation Templates and Rules): Allows the payer to push documentation templates directly into the provider’s EHR workflow for completion, reducing phone and fax back-and-forth.
  • PAS (Prior Authorization Support): The submission and response layer. Accepts the PA request electronically and returns the decision, approved, denied, or pended, with the required denial reason if applicable.

Together, CRD → DTR → PAS create a fully automated PA workflow from EHR order to authorization decision. This is the architecture CMS envisioned. It’s also the most complex to implement end-to-end.

Provider Directory API

Foundation: FHIR R4, no authentication required (publicly accessible).

Recommended IGs:

  • Da Vinci PDEX Plan-Net IG for provider directory structure and search parameters

Operational requirement: Provider directory data must reflect changes within 30 days of any update. This requires an operational process, not just a technical one, for keeping directory data current.

Your 90-Day CMS-0057-F Readiness Roadmap

You have less than eight months to January 1, 2027. Here is how to use the first 90 days of that window to establish a compliance posture that doesn’t collapse under pressure.

Days 1–30: Assess, Decide, and Commit

Week 1–2: Run the Decision Matrix

  • Score your organization on the Build vs. Buy framework from Chapter 3
  • Identify which APIs you are furthest behind on (most plans: PA API and Payer-to-Payer)
  • Pull your current Patient Access API usage metrics, you should already have 2025 data collection underway for the March 2026 reporting requirement

Week 2–3: Conduct the Data Gap Analysis

  • Map every required USCDI data element to its source system
  • Document refresh cadency, access mechanism, and known data quality issues for claims, clinical data, and PA decisions
  • Identify your provider-patient attribution process. Does it exist? Is it accurate?

Week 3–4: Make the Architecture Decision

  • Based on your decision matrix score and data gap findings, select your pattern: full commercial, open-source hybrid, vendor extension, or X12/FHIR hybrid for PA.
  • If procuring a vendor, initiate the RFP and sandbox evaluation process immediately, procurement timelines alone can consume 60–90 days.
  • Define your program structure: identify the cross-functional program manager, executive sponsor, and workstream leads across IT, compliance, operations, and provider relations.

Days 31–60: Foundation and Procurement

Technical track:

  • Stand up the FHIR R4 server (commercial or open-source) in a development environment.
  • Begin implementing SMART on FHIR / OAuth 2.0 authorization framework.
  • Build an initial data pipeline from your claims system to the FHIR layer — prioritize Patient Access API data first.
  • Begin provider-patient attribution and consent management design.

Program track:

  • Finalize vendor contract (if buying)
  • Initiate sandbox testing with your actual data
  • Document your architecture decision with a compliance rationale for CMS audit readiness
  • Schedule the first compliance review with your regulatory affairs team

Days 61–90: Build, Configure, and Begin Integration Testing

Technical track:

  • Complete Patient Access API data pipeline, claims, encounters, USCDI data, and PA decisions.
  • Begin Provider Directory API data feed (30-day update operational process must be in place before go-live).
  • Configure SMART App Launch for consumer-facing Patient Access flows.
  • Begin CRD endpoint implementation (earliest-stage PA API component).
  • Start Payer-to-Payer API design: both sender and receiver flows.

Operational track:

  • Draft provider communication materials explaining PA API availability and authentication requirements.
  • Identify your highest-volume PA service categories, these are your priority CRD/DTR/PAS implementation targets.
  • Begin drafting annual PA metric reporting process, first report covered 2025 data, due March 2026; next covers 2026 data.

Testing track:

  • Begin integration testing in the sandbox with a reference EHR (Epic or Oracle Health sandbox if available).
  • Test bulk data export performance for Provider Access API, validate under production-representative member volumes.

CapMinds: Your End-to-End CMS-0057-F FHIR API Compliance Service Partner

Meeting the January 1, 2027, deadline isn’t just about writing code, it’s about having the right partner to guide every layer of your compliance journey. 

CapMinds delivers a complete digital health technology service built for health plans, payers, and TPAs navigating the full complexity of CMS-0057-F.

Our services cover everything your program needs:

  • FHIR R4 API Development & Implementation: All five mandated APIs, built to spec
  • SMART on FHIR / OAuth 2.0 Authorization Setup: Secure, compliant access frameworks
  • Da Vinci IG Integration: CRD, DTR, PAS, PDex, and Plan-Net alignment
  • Legacy Data Pipeline & Integration Service: Claims, UM, and clinical system connectivity
  • Prior Authorization Workflow Modernization: X12-to-FHIR translation or native FHIR builds
  • Provider Directory API Management: 30-day update-ready operational processes
  • Payer-to-Payer Data Exchange Service: Sender and receiver flow implementation.
  • Compliance Monitoring & Reporting: Annual metric tracking and audit readiness.
  • And More: EHR integrations, interoperability consulting, and ongoing platform maintenance.

Don’t let your roadmap fall behind a deadline that won’t move. Partner with CapMinds and turn your compliance obligation into a competitive advantage.

Schedule a free compliance assessment

Frequently Asked Questions

What APIs are required for CMS-0057-F compliance?

CMS-0057-F requires impacted payers to implement five FHIR-based APIs, all due in production by January 1, 2027:

  1. Patient Access API gives members access to claims, encounters, USCIS clinical data, and prior authorization information through third-party apps.
  2. Provider Access API gives in-network providers access to member claims, USCDI data, and PA information, individually or in bulk.
  3. Provider Directory API publicly accessible FHIR directory of contracted providers, updated within 30 days of changes.
  4. Payer-to-Payer API enables data exchange when a member switches plans, covering up to 5 years of claims and clinical history.
  5. Prior Authorization API enables electronic PA submission, documentation retrieval, and automated decision return.

Operational requirements, faster PA decision timeframes, and public metric reporting began January 1, 2026.

What is the difference between the Provider Access API and the Payer-to-Payer API?

This is one of the most commonly confused distinctions in CMS-0057-F implementation planning.

Provider Access API: Connects your plan to your in-network providers. A provider queries your FHIR endpoint to retrieve data about their attributed patients, claims history, clinical records, and PA status. The data flow is: payer → provider. Authentication uses SMART Backend Services (system-to-system). Member opt-out is required (members can block providers from accessing their data through this channel).

Payer-to-Payer API: Connects your plan to another payer when a mutual member changes coverage. The new payer queries the previous payer’s FHIR endpoint to retrieve up to five years of data. The data flow is: previous payer → new payer. Member opt-in is required (members must affirmatively consent to this data transfer). Your plan must implement both the sending role (when members leave your plan) and the receiving role (when members join from another payer).

Should health plans build or buy FHIR APIs for CMS-0057-F?

For the majority of health plans with more than one line of business, more than 50,000 members, or less than 14 months to their January 2027 deadline, buying a purpose-built FHIR compliance platform is the more defensible decision.

However, “buy” is not a single decision. Even with a commercial platform, your internal team must build data pipelines from legacy source systems, implement consent and attribution processes, manage provider onboarding, and maintain operational compliance. Buying the FHIR layer doesn’t eliminate engineering, it focuses it on higher-value integration work.

The right answer for your organization depends on your timeline, your existing FHIR engineering capability, your data infrastructure complexity, and your budget constraints. Use the decision matrix in Chapter 3 to calibrate.

What is the best architecture for CMS-0057-F compliance?

There is no single best architecture. CMS mandates capabilities and standards, not specific implementations.

That said, the architecture that balances compliance speed, operational resilience, and long-term maintainability for most health plans in 2026 is the hybrid model: a commercial or open-source FHIR R4 server as the core platform, augmented with purpose-built modules for the Prior Authorization API’s CRD/DTR/PAS workflow, and connected to existing claims and UM systems through a purpose-built data integration layer.

For the Prior Authorization API specifically, if you have mature X12 278 utilization management infrastructure, a hybrid X12/FHIR translation architecture is the fastest compliant path. You expose a FHIR-facing PA API externally and translate internally to your existing X12 UM system. This approach is fully permitted under CMS’s enforcement discretion on HIPAA Administrative Simplification.

The key architectural non-negotiables, regardless of pattern:

  • FHIR R4 (v4.0.1) as the base standard
  • SMART on FHIR for all consumer-facing authorization flows
  • SMART Backend Services for system-to-system Provider Access API flows
  • FHIR Bulk Data Access IG for Provider Access API bulk data operations
  • Alignment with Da Vinci IGs (CRD, DTR, PAS, PDex) for long-term EHR interoperability

How long does CMS-0057-F FHIR API implementation take?

Realistic timelines, based on 2025–2026 implementation experience across health plan environments:

Implementation Pattern Time to Production
Full commercial platform (clean data, single LOB) 4–6 months
Full commercial platform (complex data, multiple LOBs) 7–12 months
Open-source FHIR server + vendor PA modules 8–14 months
Full in-house build (experienced FHIR team) 18–24 months
X12/FHIR hybrid PA API only 4–8 months

If your organization has not made the build vs. buy decision and begun active implementation by Q2 2026, the January 1, 2027, deadline is at serious risk. Plans that missed the March 31, 2026, metrics reporting deadline are already behind the compliance curve.

Leave a Reply

Your email address will not be published. Required fields are marked *