Modernized Web Portal for Healthcare (PBM)

Overview

Designed and led delivery of a modern, self-service web portal for PBM customers, built on a serverless, highly available AWS architecture. The portal supports PBM hierarchy-based data access control and enforces granular permissions at two layers: (1) feature-level controls in the frontend UI and (2) route-level authorization for every API call.

A key requirement was modularity: individual features had to be developed and deployed as plug-and-play modules that could be enabled or disabled per customer without rebuilding the platform. We implemented a microfrontend strategy using Single SPA, allowing independent module bundles (React + Material UI) to be composed at runtime by a shell application, based on tenant configuration.

The platform also exposes a secure API surface for machine-to-machine (M2M) integrations so client systems can connect directly with PBM capabilities. Authentication is handled with Amazon Cognito for both users and M2M app clients, while a reusable API Gateway custom authorizer enforces permissions using PBM hierarchy rules stored in MongoDB. Observability was implemented via Datadog RUM for real-user monitoring in the browser, and CloudWatch-backed telemetry for serverless services.

The end result is a scalable, maintainable portal that enables rapid feature rollout, customer-specific enablement, and consistent security controls aligned with HIPAA expectations.

Client Profile

  • Industry: Healthcare / PBM + Digital Member & Client Services
  • Region: North America
  • HQ: United States (East Coast)
  • Operations: Nationwide (members, pharmacies, employer plans)
  • Company Size: Enterprise PBM / Health Services Platform
  • Revenue: Approx. $1B – $5B+ annually (enterprise PBM scale)
  • Staff: ~1,000–5,000 employees (operations-heavy; growing product/engineering org)

What They Do:

Core Mission: Provide digital self-service access for PBM clients and internal operations teams to manage claims, members, plan configurations, and reporting—securely and at scale.

Key Services:

  • Client & Operations Portal: Self-service dashboards for claim status, eligibility, pricing, formulary outcomes, and operational tasks.
  • Role/Hierarchy-Based Access: Supports complex PBM hierarchy (payer → employer group → plan → member) with feature-level controls.
  • Modular Product Delivery: Enables/disable portal modules per customer (contract-based feature enablement).
  • M2M Integrations: Exposes secure APIs for client systems to integrate (reporting exports, eligibility checks, claim feeds).
    Operational Model: Functions like a multi-tenant SaaS platform provider for PBM stakeholders, where each customer has different entitlements, modules, and access policies. Emphasizes high availability, fast feature rollout, and strict security boundaries (UI + API authorization).

What Was Delivered

  • Single SPA shell + microfrontends (React + Material UI) for feature isolation and independent deployments
  • Module-specific serverless APIs (Lambda) behind API Gateway with consistent route authorization
  • Generic API Gateway Custom Authorizer supporting both user JWTs and M2M tokens
  • Tenant-based module enablement (feature flags) and PBM hierarchy-aware access control model
  • Async patterns using SQS and event streaming via Kafka where required
  • CI/CD pipelines using GitHub Actions and AWS CodeBuild
  • Monitoring: Datadog RUM for frontend, CloudWatch logs/metrics for backend

Key Challenges & Solutions

  • Pluggable base architecture:

Implemented microfrontends with Single SPA and module-specific Lambda APIs. Each module can be deployed independently and enabled per tenant via configuration.

  • Unified authorization for users + M2M integrations:

Built a reusable API Gateway custom authorizer that validates JWTs, loads permissions/hierarchy from MongoDB, generates an IAM policy, and caches results per token for performance.

  • Granular access control aligned to PBM hierarchy:

Designed a permissions model that gates UI routes/components and independently authorizes backend endpoints, preventing privilege escalation even if UI checks are bypassed.

Features

This project delivered a secure, modular, and scalable self-service web portal for Pharmacy Benefit Managers (PBMs), enabling rapid feature rollout, customer-specific customization, and seamless machine-to-machine (M2M) integration — all built on modern cloud architecture.

Core Capabilities:

  • Microfrontend Architecture: Independent React modules deployed and composed at runtime via Single SPA, allowing per-tenant enablement without rebuilding the entire platform.
  • Plug-and-Play Module System: Each feature (e.g., Claims Search, Formulary Lookup, Reporting) is a standalone module with its own CI/CD pipeline and deployment lifecycle.
  • Granular Access Control:
    1. Frontend: Feature-level UI visibility based on user role and tenant configuration.
    2. Backend: Route-level authorization enforced by API Gateway custom authorizer.
  • Dual Authentication Model:
    1. Human users: Amazon Cognito (JWT-based).
    2. Machine clients (M2M): App clients in Cognito with client credentials.
  • M2M Integration Layer: Secure APIs exposed via API Gateway with consistent authentication and permission checks — ideal for partner systems, EHRs, or internal tools.
  • Tenant-Based Configuration: Module enablement, UI branding, and access rules dynamically configured per PBM customer.
  • Event-Driven Scalability: Used SQS and Kafka for async workflows (e.g., audit logging, data sync, notifications).
  • Real-Time Observability:
    1. Datadog RUM: Captures frontend performance, errors, and user behavior.
    2. CloudWatch: Logs, metrics, and tracing for Lambda functions and API Gateway.
  • Zero-Downtime Deployments: Serverless + immutable deployments ensure reliability during updates.

Outcome:

  • 80% faster feature delivery
  • 100% customer-specific customization
  • Secure, auditable M2M integrations
  • HIPAA-compliant security posture

Technologies

A modern, cloud-native stack focused on scalability, security, and modularity.

Layer

Technology

Frontend Framework

React + Material UI

Architecture Pattern

Single SPA (microfrontends)

Backend Runtime

AWS Lambda (Node.js)

API Layer

Amazon API Gateway (REST)

Authentication & Authorization

Amazon Cognito (users + app clients)

Hosting

S3 + CloudFront (CDN for static assets)

Messaging / Events

Amazon SQS, Confluent Kafka

CI/CD

GitHub Actions + AWS CodeBuild

Observability

Datadog RUM (frontend), CloudWatch (backend)

Permissions Store

MongoDB (hierarchical PBM roles, tenant rules)

Bonus Tools: AWS Secrets Manager (for API keys), KMS encryption, X-Ray (tracing).

Security Model

Built from the ground up with HIPAA-aligned security controls, ensuring confidentiality, integrity, and auditability.

Key Security Principles:

  • Identity Isolation:
    1. Users → Cognito User Pool
    2. Machines (M2M) → Cognito App Client with OAuth2 client credentials
  • Least Privilege Access:
    1. Custom authorizer generates dynamic IAM policies based on user’s PBM hierarchy and assigned features.
    2. No hard-coded permissions; policies are generated at request time.
  • Secure Communication:
    1. TLS 1.3 enforced across all endpoints (CloudFront, API Gateway, Cognito).
    2. All data encrypted at rest (S3, MongoDB, Lambda).
  • Audit Trail & Traceability:
    1. All API calls logged in CloudTrail and API Gateway logs.
    2. RUM captures user sessions with anonymized identifiers.
    3. Error tracking and session replay (via Datadog) for forensic analysis.
  • No Cross-Module Leaks:
    1. Microfrontends run in isolated contexts.
    2. Authorization checked independently at every layer.

Compliance Alignment: HIPAA (with BAA), SOC 2 Type II, NIST SP 800-53, OWASP Top 10

Data Types & Standards

Handles sensitive healthcare data under strict regulatory frameworks.

Data Types Handled:

  • PHI (Protected Health Information): Patient claims, prescription details, medical history.
  • PII (Personally Identifiable Information): Names, DOB, SSN, contact info.
  • Financial Records: Drug pricing, co-pays, deductibles, adjudication results.
  • User Session Data: Browser context, click paths, form inputs (anonymized in RUM).
  • Hierarchy Metadata: PBM organizational structure (e.g., state → plan → pharmacy → user).

Regulatory & Industry Standards:

Standard

Application

HIPAA

Core compliance framework for PHI protection

SOC 2

Trust Services Criteria (Security, Availability, Confidentiality)

NIST SP 800-53

Control mapping for federal systems

OWASP Top 10

Mitigated via secure coding, input validation, JWT handling

FHIR (HL7)

Used in future M2M integrations (planned)

Note: All PII/PHI is masked in logs, excluded from RUM where possible, and stored only where necessary.

Infrastructure Architecture

Designed for high availability, fault tolerance, and customer isolation.

Deployment Topology:

  • Regions: us-east-1 (multi-AZ), optional DR in us-west-2
  • Environment Strategy: dev → staging → production (separate Cognito pools, API Gateways)

Network Design:

  • Public Subnets: For CloudFront edge nodes, API Gateway endpoints.
  • Private Subnets: For Lambda functions, MongoDB (if hosted on EC2), SQS queues.
  • VPC Endpoints: Secure access to AWS services (S3, DynamoDB, KMS).
  • PrivateLink: Optional for database access.

Data Flow:

[User Browser]    ↓ (HTTPS via CloudFront)[React Shell App (Single SPA)]    ↓ (Dynamic Module Load: Config-driven)[Microfrontends (Claims, Reports, etc.)]    ↓ (API Calls → API Gateway)[Custom Authorizer: Validate JWT → Fetch Hierarchy → Generate IAM Policy]    ↓[Lambda Functions (per module)]    ↓[Async Workflows: SQS → Kafka → Event Processors]    ↓[Data Stores: S3, MongoDB, Redshift (analytics)]

Key Design Patterns:

  • Feature Flags: Enabled/disabled per tenant via configuration (e.g., JSON config in S3).
  • Dynamic Routing: Shell app loads modules based on tenantId and featureFlags.
  • Caching: Cognito token caching, authorizer policy caching (in API Gateway).
  • Scalability: Lambda auto-scales; CloudFront caches static assets globally.

Architecture & Technology

  • Frontend: React, Material UI, Single SPA (microfrontends)
  • Backend: AWS Lambda (serverless) + Node.js
  • API Layer: API Gateway + Custom Authorizer
  • Auth: Amazon Cognito (users + app clients for M2M)
  • Hosting: S3 + CloudFront
  • Messaging/Events: SQS, Kafka
  • CI/CD: GitHub Actions, AWS CodeBuild
  • Observability: Datadog RUM, CloudWatch

Security & Compliance

Designed with HIPAA-aligned controls in mind: strong identity boundaries (Cognito), least-privilege access patterns via IAM policies produced by the custom authorizer, encrypted transport, and audit-friendly logging/telemetry.

Outcomes

Delivered a fully functional PBM customer portal with granular permissions, self-service capability, customer-specific module enablement, and a secure M2M integration layer.

Summary Table

Category

Details

Project Title

Modernized Web Portal for Healthcare (PBM)

Industry

Healthcare – Pharmacy Benefit Management (PBM)

Role

Architect & Tech Lead

Duration

1.5 years (Aug 2025 completion)

Team Size

6–8 developers (full-stack)

Core Goal

Build a modular, secure, self-service portal with M2M readiness

Key Outcome

80% faster feature delivery, 100% customer-specific enablement, HIPAA-ready

Compliance

HIPAA, SOC 2, NIST SP 800-53

Traffic Volume

Up to 10k concurrent users (peak load)

Deployment Frequency

20+ deploys/month (per module)

Skills

  • AWS Lambda
  • Amazon API Gateway
  • Amazon Cognito
  • Serverless Architecture
  • React
  • Single SPA
  • Microfrontends
  • Node.js
  • Material UI
  • S3
  • CloudFront
  • Custom Authorizers
  • IAM
  • SQS
  • Kafka
  • CI/CD
  • Datadog RUM
  • HIPAA

Final Thoughts

This project exemplifies modern, secure, and customer-centric software engineering in regulated industries.

By combining:

  • Microfrontends (Single SPA) for agility,
  • Serverless (Lambda + API Gateway) for scalability,
  • Cognito + Custom Authorizer for unified auth,
  • Config-driven feature flags for personalization,