Industry Verticals - Knowledge Check
Test your expertise in industry-specific sovereign cloud implementations for healthcare, financial services, government, and critical infrastructure sectors.
Quiz Instructions
Total Questions: 15
Passing Score: 12/15 (80%)
Time Estimate: 25-35 minutes
Format: Expert-level scenario-based questions
This assessment covers:
- Healthcare sovereignty patterns (HIPAA, PHI protection)
- Financial services compliance (PCI DSS, SOX)
- Government cloud requirements (FedRAMP, ITAR)
- Critical infrastructure protection (NERC CIP, ICS/SCADA)
Question 1: Healthcare — PHI Storage Requirements
A healthcare provider is deploying Azure Local for their sovereign environment. Where should PHI (Protected Health Information) be stored?
A) Azure public cloud with encryption at rest
B) Azure Local with HIPAA BAA and encryption
C) Any location with strong passwords
D) Third-party SaaS with HIPAA compliance badge
Click to reveal answer
Correct Answer: B
Explanation: Azure Local with HIPAA BAA provides maximum control:
Requirements for PHI:
| Requirement | Azure Local Solution |
|---|---|
| Data residency | On-premises storage |
| Access control | Local identity + Entra ID |
| Encryption | BitLocker + network encryption |
| Business Associate Agreement | Microsoft HIPAA BAA covers Azure Local |
| Audit trail | Local logs + Azure Monitor |
Why Not Others:
- A: Public cloud may not meet organizational residency requirements
- C: Passwords alone don’t meet HIPAA technical safeguards
- D: Third-party SaaS requires careful BAA review and may not provide data control
Reference: Healthcare Sovereign
Question 2: Financial Services — PCI DSS Scope
A bank is implementing Edge RAG for customer service automation. The RAG system will access customer account data. What is the PCI DSS consideration?
A) RAG systems are exempt from PCI DSS
B) Only the vector database is in scope
C) The entire RAG system (inference, vector DB, knowledge base) is in scope
D) Only network connections to payment systems are in scope
Click to reveal answer
Correct Answer: C
Explanation: Any system that stores, processes, or transmits cardholder data is in scope:
PCI DSS Scope for RAG:
| Component | In Scope? | Reason |
|---|---|---|
| LLM inference | Yes | Processes queries that may contain card data |
| Vector database | Yes | May store embeddings of card data |
| Knowledge base | Yes | Source documents may contain card data |
| Network path | Yes | Data traverses these connections |
Scope Reduction Options:
- Tokenize cardholder data before RAG ingestion
- Use data masking in knowledge base
- Segment RAG system from CDE (Cardholder Data Environment)
Reference: Financial Services
Question 3: Government — FedRAMP Authorization Levels
A government agency needs to deploy a sovereign cloud solution for “Secret” classified data. What is required?
A) FedRAMP Low authorization
B) FedRAMP Moderate authorization
C) FedRAMP High authorization
D) FedRAMP does not apply to classified data
Click to reveal answer
Correct Answer: D
Explanation: FedRAMP is for unclassified government data:
Classification Levels:
| Data Type | Framework | Environment |
|---|---|---|
| Public | FedRAMP Low | Commercial cloud |
| CUI (Controlled Unclassified) | FedRAMP Moderate/High | Gov cloud |
| Secret | ICD 503 / CNSSI 1253 | Air-gapped/classified cloud |
| Top Secret | ICD 503 / CNSSI 1253 | Air-gapped/classified cloud |
Classified Data Requirements:
- Air-gapped infrastructure
- DISA STIG compliance
- Physical security controls
- Personnel clearances
- Azure Government Secret / Top Secret regions
Reference: Government Cloud
Question 4: Critical Infrastructure — NERC CIP Compliance
An energy utility is deploying Azure Local for operational technology (OT) network monitoring. Which NERC CIP standard is MOST relevant for access control?
A) CIP-002 (BES Cyber System Categorization)
B) CIP-004 (Personnel & Training)
C) CIP-005 (Electronic Security Perimeters)
D) CIP-007 (System Security Management)
Click to reveal answer
Correct Answer: C
Explanation: CIP-005 governs Electronic Security Perimeters (ESPs):
NERC CIP Access Control Standards:
| Standard | Focus |
|---|---|
| CIP-005 | Network segmentation, ESP boundaries, remote access |
| CIP-004 | Personnel vetting, training requirements |
| CIP-007 | Ports/services, patch management, malware |
CIP-005 Requirements:
- Define Electronic Security Perimeter boundaries
- Restrict inbound/outbound traffic
- Monitor and log all access
- Multi-factor authentication for remote access
Azure Local Alignment:
- Network isolation between IT/OT
- SDN-based micro-segmentation
- Azure Arc for monitoring (controlled connectivity)
Reference: Critical Infrastructure
Question 5: Healthcare — Breach Notification
A hospital experiences a ransomware attack affecting 50,000 patient records. What are the HIPAA notification requirements?
A) Notify HHS within 72 hours
B) Notify HHS within 60 days, individuals within 60 days, media immediately
C) Notify HHS within 60 days, individuals within 60 days, media within 60 days
D) No notification required if data was encrypted
Click to reveal answer
Correct Answer: C
Explanation: HIPAA Breach Notification Rule requirements:
Notification Timelines:
| Recipient | Timeline | Threshold |
|---|---|---|
| HHS | Within 60 days of discovery | All breaches |
| Individuals | Within 60 days | All affected individuals |
| Media | Within 60 days | Breaches affecting 500+ in a state |
50,000 Records:
- Exceeds 500 threshold → media notification required
- Annual HHS breach report due within 60 days
- Individual notification via mail or substitute notice
Encryption Exception:
Encrypted data is a “safe harbor” ONLY if the encryption key was not compromised.
Reference: Healthcare Sovereign
Question 6: Financial Services — Cross-Border Data Transfer
A European bank needs to share transaction data with their US subsidiary for fraud analysis. What is required under GDPR?
A) No restrictions — internal company transfers are exempt
B) Standard Contractual Clauses (SCCs) or Binding Corporate Rules (BCRs)
C) Data can be transferred if encrypted
D) Only aggregated data can be transferred
Click to reveal answer
Correct Answer: B
Explanation: GDPR Chapter V governs international data transfers:
Transfer Mechanisms:
| Mechanism | Description |
|---|---|
| Adequacy decision | US is not adequate (post-Schrems II) |
| SCCs | Contractual clauses approved by EU Commission |
| BCRs | Internal corporate rules approved by DPA |
| Derogations | Explicit consent, contract necessity, legal claims |
US Transfers (Post-Schrems II):
- SCCs required with supplementary measures
- Transfer Impact Assessment recommended
- Consider data localization if transfer risks are high
Why Not Others:
- A: Intra-company transfers still cross borders
- C: Encryption alone doesn’t satisfy transfer requirements
- D: Personal data transfer restrictions apply regardless of aggregation
Reference: Financial Services
Question 7: Government — ITAR Compliance
A defense contractor is implementing Azure Local for engineering data. The data includes technical specifications for military equipment. What is the PRIMARY compliance concern?
A) FedRAMP authorization
B) ITAR export control — data must not be accessible to foreign nationals
C) HIPAA for employee health data
D) PCI DSS for payment processing
Click to reveal answer
Correct Answer: B
Explanation: ITAR (International Traffic in Arms Regulations) controls defense-related technical data:
ITAR Requirements:
| Requirement | Implementation |
|---|---|
| Access control | US persons only |
| Data location | US territory or approved locations |
| Cloud provider | US-controlled facilities, US persons |
| Encryption | End-to-end with US-controlled keys |
Azure Local for ITAR:
- On-premises deployment in US facility
- No foreign national access to systems
- Air-gapped or strictly controlled connectivity
- Customer-managed encryption keys
Penalties:
- Civil penalties up to $1M per violation
- Criminal penalties up to $1M and 20 years imprisonment
Reference: Government Cloud
Question 8: Critical Infrastructure — ICS/SCADA Integration
A water utility wants to connect their SCADA system to Azure for analytics. What is the SAFEST integration pattern?
A) Direct internet connection from SCADA to Azure
B) VPN tunnel from SCADA network to Azure
C) Unidirectional data diode from OT to IT, then to Azure
D) Bidirectional API gateway in DMZ
Click to reveal answer
Correct Answer: C
Explanation: Unidirectional data diodes provide physical one-way data flow:
Data Diode Architecture:
SCADA Network → [Data Diode] → IT Network → Azure
(OT Zone) (IT Zone)
Why Data Diodes:
| Benefit | Description |
|---|---|
| Physical isolation | Hardware enforces one-way flow |
| No remote access | OT network cannot receive inbound traffic |
| Regulatory compliance | Meets NERC CIP, IEC 62443 |
| Reduced attack surface | No pathway for remote exploitation |
Why Not Others:
- A: Direct internet connection exposes SCADA to attacks
- B: VPN allows bidirectional traffic
- D: Bidirectional gateway creates attack path
Reference: Critical Infrastructure
Question 9: Healthcare — Edge RAG for Clinical Decision Support
A hospital is implementing Edge RAG for clinical decision support. Which data handling approach is CORRECT?
A) Send patient symptoms to cloud RAG for diagnosis
B) Use local RAG with de-identified clinical guidelines only
C) Use local RAG with PHI but no logging
D) Store all RAG queries in cloud analytics
Click to reveal answer
Correct Answer: B
Explanation: Local RAG with de-identified data provides clinical value while maintaining compliance:
Recommended Architecture:
| Component | Location | Data Type |
|---|---|---|
| LLM inference | Edge (Azure Local) | Processes queries locally |
| Vector database | Edge | De-identified clinical guidelines |
| Knowledge base | Edge | Medical literature, protocols |
| Audit logs | Edge + optional secure cloud | De-identified usage metrics |
PHI Handling:
- Queries may contain PHI → process locally
- Knowledge base uses de-identified reference data
- Responses must not persist PHI
- Audit trails required but must protect PHI
Why Not Others:
- A: Sending PHI to cloud violates data residency
- C: Logging is required for HIPAA accountability
- D: Query logs containing PHI cannot go to cloud
Reference: Healthcare Sovereign
Question 10: Financial Services — Algorithmic Trading Sovereignty
A trading firm needs to ensure their AI trading algorithms and associated data remain within their control. What is the PRIMARY concern?
A) Algorithm IP protection and preventing cloud provider access
B) Minimizing cloud costs
C) Maximizing algorithm speed
D) Using the latest GPU models
Click to reveal answer
Correct Answer: A
Explanation: Operational sovereignty for trading algorithms is critical:
Sovereignty Concerns:
| Concern | Solution |
|---|---|
| Algorithm IP | Customer-managed encryption, confidential computing |
| Data access | No cloud provider access to trading data |
| Audit trail | Complete logging of all data access |
| Key management | Customer Lockbox, HSM-backed keys |
Azure Local Benefits:
- On-premises execution — algorithm never leaves facility
- No cloud provider access to running workloads
- Customer controls all encryption keys
- Air-gapped option for maximum isolation
Regulatory Driver:
SEC Rule 15c3-5 and MiFID II require firms to maintain control over trading systems.
Reference: Financial Services
Question 11: Government — Continuous Monitoring (ConMon)
For FedRAMP High systems, what is the continuous monitoring requirement?
A) Annual security assessment
B) Quarterly vulnerability scans
C) Monthly vulnerability scans, annual penetration test, continuous logging
D) Real-time monitoring only during business hours
Click to reveal answer
Correct Answer: C
Explanation: FedRAMP High requires rigorous continuous monitoring:
ConMon Requirements:
| Activity | Frequency |
|---|---|
| Vulnerability scanning | Monthly (High), Quarterly (Moderate) |
| Penetration testing | Annual |
| POA&M updates | Monthly |
| Security control assessment | Annual (subset) |
| Continuous logging | 24/7 with 90-day retention |
Azure Local Alignment:
- Microsoft Defender for Cloud for vulnerability scanning
- Azure Monitor for continuous logging
- Regular POA&M reporting to sponsoring agency
- Third-party annual assessments
Reference: Government Cloud
Question 12: Critical Infrastructure — Incident Response
A power grid operator detects a cyberattack on their control systems. In addition to internal response, who must they notify?
A) Only their insurance provider
B) CISA (Cybersecurity and Infrastructure Security Agency)
C) Local law enforcement only
D) No external notification required
Click to reveal answer
Correct Answer: B
Explanation: Critical infrastructure operators must report to CISA:
Reporting Requirements:
| Requirement | Source |
|---|---|
| CISA reporting | CIRCIA (Cyber Incident Reporting for Critical Infrastructure Act) |
| NERC reporting | CIP-008 (Incident Reporting) |
| FBI reporting | Recommended for criminal activity |
CIRCIA Timelines (2024+):
- Significant cyber incidents: 72 hours
- Ransomware payments: 24 hours
- Supplemental reports as new information emerges
NERC CIP-008:
- Report to E-ISAC (Electricity ISAC)
- Document incident and response
- Share lessons learned with sector
Reference: Critical Infrastructure
Question 13: Healthcare — Telehealth Sovereignty
A hospital is deploying telehealth services using Azure Local. What is the KEY sovereignty consideration for video consultations?
A) Video quality must be 4K
B) Video streams must be encrypted and not traverse foreign networks
C) Patients must provide verbal consent
D) Consultations must be limited to 30 minutes
Click to reveal answer
Correct Answer: B
Explanation: Telehealth video contains PHI and must be protected:
Sovereignty Requirements:
| Requirement | Implementation |
|---|---|
| Encryption | End-to-end encryption (TLS 1.3 minimum) |
| Data path | Video must not route through foreign servers |
| Recording storage | On-premises or sovereign cloud storage |
| Access control | Provider and patient authentication |
Azure Local Telehealth:
- Local media servers for video processing
- ExpressRoute for reliable connectivity
- Recordings stored on local storage with encryption
- Integration with EHR for documentation
Why Routing Matters:
Video streams contain patient images and audio discussing health conditions — both PHI under HIPAA.
Reference: Healthcare Sovereign
Question 14: Financial Services — Disaster Recovery
A bank’s primary Azure Local deployment is in Frankfurt. For disaster recovery, where should the secondary site be located?
A) US East region for maximum geographic separation
B) Another EU region (e.g., Netherlands) maintaining data residency
C) On-premises tape backup only
D) Cloud-based backup in any region with encryption
Click to reveal answer
Correct Answer: B
Explanation: DR must maintain data residency:
DR Site Selection:
| Factor | Requirement |
|---|---|
| Data residency | Must remain in EU (GDPR, EBA guidelines) |
| Geographic separation | 200+ km for disaster resilience |
| Network latency | < 10ms for synchronous replication |
| Regulatory equivalence | Same compliance certifications |
EU DR Options:
| Primary | Secondary | Distance |
|---|---|---|
| Frankfurt | Amsterdam | ~365 km |
| Frankfurt | Paris | ~450 km |
| Frankfurt | Dublin | ~1,100 km |
Why Not Others:
- A: US location violates EU data residency
- C: Tape backup doesn’t provide RTO for modern banking
- D: “Any region” may violate regulatory requirements
Reference: Financial Services
Question 15: Government — Zero Trust for Classified Networks
A defense agency is implementing Zero Trust on their classified network. What is the UNIQUE requirement compared to unclassified Zero Trust?
A) No unique requirements — Zero Trust is the same everywhere
B) Physical access controls, personnel clearances, and air-gapped architecture
C) Only biometric authentication is required
D) Encryption is not required on classified networks
Click to reveal answer
Correct Answer: B
Explanation: Classified Zero Trust includes additional physical and personnel controls:
Classified Network Requirements:
| Layer | Standard Zero Trust | Classified Addition |
|---|---|---|
| Identity | MFA, conditional access | Personnel clearances, NDA |
| Device | Device health attestation | Accredited hardware, TEMPEST |
| Network | Micro-segmentation | Air-gap, SIPR/JWICS networks |
| Data | Encryption, classification | Cross-domain guards, SCG |
| Physical | Building access | SCIFs, SAPF, intrusion detection |
Air-Gap Implications:
- No internet connectivity
- Manual update processes
- Physical media transfer procedures
- Increased operational complexity
Reference: Government Cloud
Assessment Complete
Scoring Guide:
| Score | Result |
|---|---|
| 15/15 | Expert — Ready for complex industry engagements |
| 12-14/15 | Proficient — Minor review recommended |
| 9-11/15 | Developing — Review highlighted industries |
| < 9/15 | Needs Improvement — Complete module review |
Next Steps
- Review: Healthcare Sovereign
- Review: Financial Services
- Review: Government Cloud
- Review: Critical Infrastructure
- Next Assessment: Architecture Patterns Knowledge Check