How does DADI handle tenant isolation?
We prevent data leakage and disruption with role-based access control (RBAC), encryption on the VMs, multi-factor authentication and E2E encryption. Effectively, each tenant (Host) within the network is within it’s own isolated container with it’s own policies, protected against intrusion on the Host hardware and encrypted across the network. Inbound and outbound queries to the host can only come from an authenticated request, and the results are regularly spot checked by peer Hosts.
Hosts are also limited to running a single app, replicated as required across the Gateway VPC, with no preference by the Host admin as to which application their system is in support of.
There’s no way to circumvent authenticated connections to apps running on the Hosts.