Multi-Tenant AI Security Explained

Most enterprise AI tools are multi-tenant SaaS - your data and another company's data share the same infrastructure. Understanding what "tenant isolation" actually means helps you ask the right security questions before signing a contract.

Tenant isolation = data boundariesYour documents, conversations, and config should be inaccessible to other tenants
Two isolation modelsLogical isolation (shared DB, row filters) vs physical isolation (separate stores per tenant)
BYOK strengthens isolation at the model layerYour key means your model calls are billed and tracked separately from all other tenants
Four questions to ask every vendorTraining data, vector store isolation, blast radius, and conversation log retention
The Basics

What multi-tenancy means in SaaS AI

A multi-tenant SaaS AI product serves many customers (tenants) from a single shared infrastructure deployment. When you sign up for ChatGridAI, Glean, or most enterprise AI tools, your account is one tenant among potentially thousands, all running on the same underlying servers, databases, and application code.

Multi-tenancy is standard practice and is not inherently a security problem. The security question is: what boundaries exist between tenants? Can a bug, misconfiguration, or compromised account in one tenant affect another?

For AI tools specifically, the key isolation surfaces are:

  • Document and vector stores: Can your uploaded documents be queried by another company's employees?
  • Conversation logs: Are your employees' chat histories stored separately from other tenants?
  • API key management: Is your OpenAI key isolated from other tenants' keys?
  • Model calls: Is there any cross-tenant contamination in the model's context window?
  • Configuration: Can a bug in one tenant's setup affect another tenant's behavior?
Isolation Models

Logical isolation vs physical isolation

Logical isolation

All tenant data shares one database or vector store. Each record is tagged with a tenant ID. Queries are filtered to return only the current tenant's records. Cost-effective and common. The risk: a filter condition bug or injection attack can potentially return another tenant's records.

Physical isolation

Each tenant has a separate database or vector store instance. Tenant A's documents are in a completely different data store from Tenant B's. A bug cannot accidentally return cross-tenant data because the data stores are not shared. More expensive but the blast radius of any failure is contained to one tenant.

Neither model is universally better - the right choice depends on the sensitivity of the data and the vendor's engineering investment in isolation guarantees. What matters most is that you ask and get a specific answer, not a vague "we take security seriously."

The Four Questions

What to ask every SaaS AI vendor

1. Is my data used to improve the model?

Not just OpenAI's policy - the vendor's policy. Some vendors use aggregated customer data (queries, feedback, retrieved documents) to improve their own retrieval or routing models. Ask specifically: "Do you use our queries, documents, or any derived data to train or improve any model, retrieval system, or feature on your end?"

2. Are vector stores isolated per tenant?

Ask: "Are our uploaded documents stored in a separate vector database instance or in a shared one with row-level filtering?" If shared, ask what happens if the row-level filter has a bug. Ask for the last penetration test date and whether cross-tenant data access was in scope.

3. What is the blast radius of a bug?

Ask: "If there is a data access bug in your system, what is the worst-case exposure? Could it affect all tenants simultaneously or is it contained to a single tenant?" A well-designed multi-tenant system should have architectural boundaries that limit blast radius, not just application-layer filters.

4. How long are conversation logs retained?

Ask: "How long do you retain conversation logs, who on your team can access them, and can we request deletion?" Conversation logs contain your employees' questions about internal policies - they are sensitive. Understand who can see them and whether the vendor uses them for any purpose beyond your own audit trail.

BYOK and Tenant Isolation

How BYOK strengthens isolation at the model layer

In a shared-credit model, all tenants' model calls flow through one vendor OpenAI account. A compromised vendor credential or a billing misconfiguration can theoretically affect all tenants at once. With BYOK, each tenant's model calls use their own key and their own OpenAI account. A problem with one tenant's key does not affect others.

BYOK also means:

  • OpenAI rate limits apply per your account, not shared across all vendor tenants
  • OpenAI usage analytics are specific to your account, not aggregated across tenants
  • Revoking access (rotating your key) is unilateral - you do not need the vendor's cooperation
  • If the vendor's system is compromised, attackers cannot make model calls on your behalf without your key

BYOK does not address vector store or conversation log isolation - those are still vendor responsibilities. But it adds a meaningful layer of isolation at the most sensitive external API call in the system.

FAQ

Multi-tenant AI security - common questions

It can be, with the right isolation architecture and vendor practices. The key is asking specific questions about how tenant data is separated - not accepting vague "enterprise-grade security" answers. SOC 2 Type II certification is a useful baseline but does not answer all questions about tenant isolation specifically. Ask for architecture documentation and penetration test reports.
Multi-tenant isolation separates different companies from each other. RBAC (role-based access control) separates different users and departments within the same company. You need both. Multi-tenant isolation prevents Company A from seeing Company B's data. RBAC prevents an IT employee at Company A from seeing HR data at Company A.
SOC 2 Type II is the most common and covers security, availability, and confidentiality controls. ISO 27001 is also relevant for information security management. GDPR compliance documentation matters for European data. These certifications establish a security baseline but should be supplemented with specific questions about multi-tenant architecture, penetration test results, and incident response processes.

Per-tenant isolation backed by BYOK and separate vector stores.

ChatGridAI separates each customer's data architecturally - and each department within a customer gets its own isolated bot.

$5/seat/month - 14-day free trial - no credit card required