Back to Blog

How We Handle Tenant Isolation When Every Customer Brings Their Own Database


Multi-tenancy is hard. Multi-tenancy where every customer brings their own database, schema, and access patterns is a fundamentally different engineering problem. At Vigilense, we built our isolation model from the ground up for BYODb, and it goes far beyond logical separation.

In the cloud, each tenant's data, compute, and network are fully separated at the infrastructure level. This ensures that even in the "AI Storm," where automated reasoning engines are running thousands of queries, your data remains in a "Sovereign" silo.

Why BYODb Makes Isolation Harder

Most multi-tenant platforms control the data layer. They decide the schema and the storage engine. BYODb removes that luxury. You cannot rely on a single shared database with row-level policies. You need:

  • Credential vaults that never co-mingle secrets.
  • Query sandboxing to prevent a detection rule from reaching another tenant's data.
  • Network segmentation that treats every customer connection as its own trust boundary.

The Six Isolation Layers

Our model is built in depth. Compromise of any single layer does not expose data because the remaining five enforce boundaries independently.

1. Identity Layer

Every request is authenticated with tenant context before it touches any business logic. We enforce MFA and SSO (SAML 2.0/OIDC). Sessions are short-lived and use device-trust validation to prevent token replay.

2. Application Layer

The tenant ID is injected into every downstream operation via middleware. If a code path attempts to execute without tenant context, the request fails immediately. This makes unscoped queries impossible.

3. Data Layer

We offer three levels of isolation based on your compliance needs:

  • Standard: Row-Level Security (RLS) on shared tables.
  • Enhanced: Dedicated schema per tenant within a shared instance.
  • Maximum (Sovereign): A fully dedicated database instance. No shared processes, no shared memory.

4. Encryption Layer

We use a layered key hierarchy:

  • Master Key: HSM-protected (Hardware Security Module).
  • Tenant KEK (Key Encryption Key): Unique to you; wraps all your data keys.
  • Crypto-Shredding: If a tenant leaves, we destroy the KEK, rendering all data permanently unrecoverable.

5. Network Layer (The "PrivateLink" Standard)

Tenant traffic is isolated via full VPC isolation. We support AWS PrivateLink and VPC Peering, meaning your security telemetry never traverses the public internet to reach our "brain."

6. Compute Layer

This is where we differentiate. Each tenant's workloads (including our AI SOC Analysts) run in dedicated containers. A "noisy neighbor" or a high-intensity AI investigation in another tenant's environment cannot degrade your performance or access your memory.

The AI Safety Factor: Causal Reasoning Boundaries

As we deploy AI agents to perform 3-Layer Blast Radius investigations, isolation becomes even more critical. Our AI agents are "Context-Locked." They are physically unable to generate a query that traverses outside of your specific VPC and credential set. We do not just "tell" the AI to stay in its lane; we build the lane out of iron.

How We Test the "Blast Radius"

Architecture diagrams are promises; testing is proof.

  • Annual 3rd-Party Pentests: Focused specifically on cross-tenant privilege escalation.
  • CI/CD Boundary Tests: Every code change is tested for "unscoped query" vulnerabilities.
  • Chaos Engineering: We deliberately misconfigure network policies in a sandbox to ensure our secondary layers (Encryption/Identity) hold firm.

The Bottom Line

Tenant isolation in a BYODb architecture is not a feature. It is a system of interlocking controls. We built this because our customers are trusting us with their most sensitive telemetry. We earn that trust with engineering rigor, not marketing language.

View our full security posture in the Trust Center.


View our full security posture.

Explore Trust Center
RC

Ruchika Sharma

Co-founder & CTO
15+ years designing and operating enterprise SOC infrastructure, leading SIEM architecture and automated detection pipelines.