Single-tenant Architecture

Master this essential documentation concept

Quick Definition

A software design where each customer gets their own dedicated, isolated instance of the platform with separate infrastructure, as opposed to sharing a common environment with other users.

How Single-tenant Architecture Works

graph TD A[User Interface] --> B[API Gateway] B --> C[Service Layer] C --> D[Data Layer] D --> E[(Database)] B --> F[Authentication] F --> C

Understanding Single-tenant Architecture

A software design where each customer gets their own dedicated, isolated instance of the platform with separate infrastructure, as opposed to sharing a common environment with other users.

Key Features

  • Centralized information management
  • Improved documentation workflows
  • Better team collaboration
  • Enhanced user experience

Benefits for Documentation Teams

  • Reduces repetitive documentation tasks
  • Improves content consistency
  • Enables better content reuse
  • Streamlines review processes

Documenting Single-Tenant Architecture Decisions Your Team Can Actually Find Later

When your team designs or evaluates a single-tenant architecture, the reasoning behind key decisions rarely lives in a single place. Engineers walk through infrastructure diagrams in onboarding calls, security teams explain tenant isolation boundaries in recorded compliance reviews, and architects justify the trade-offs between dedicated instances versus shared environments during sprint planning sessions. The knowledge exists — it's just locked inside video recordings that nobody has time to rewatch.

This creates a real problem for documentation and technical teams. When a new engineer asks why your platform provisions separate databases per customer rather than using a shared schema, the honest answer is often: "There's a recording from six months ago that covers this." Scrubbing through a 90-minute architecture review to find a 4-minute explanation of tenant isolation isn't a workflow — it's a bottleneck.

Converting those recordings into searchable documentation changes how your team works with this knowledge. A video walkthrough of your single-tenant architecture becomes a structured reference doc where someone can search "why separate infrastructure" and land directly on the relevant explanation, complete with context. Compliance auditors, new hires, and integration partners can all self-serve answers that previously required interrupting a senior engineer.

If your team regularly captures architecture discussions, onboarding sessions, or technical reviews on video, see how you can turn those recordings into documentation your whole team can search and reference.

Real-World Documentation Use Cases

Documenting Compliance Boundaries for a Healthcare SaaS Platform

Problem

Healthcare SaaS vendors struggle to demonstrate to HIPAA auditors and enterprise customers that patient data is fully isolated — shared infrastructure diagrams fail to satisfy compliance officers who need proof of dedicated environments per covered entity.

Solution

Single-tenant architecture documentation explicitly maps each customer's dedicated database, compute, and network resources, providing clear evidence of data boundary enforcement that satisfies HIPAA Business Associate Agreements and SOC 2 Type II audits.

Implementation

['Create per-tenant infrastructure diagrams using tools like Lucidchart or draw.io, showing dedicated VPCs, RDS instances, and S3 buckets labeled with customer identifiers.', 'Document the provisioning runbook in Confluence, detailing how Terraform modules spin up isolated stacks (VPC, subnets, security groups, RDS cluster) for each new customer onboarding.', "Produce a data flow document showing that PHI never traverses shared message queues or shared caches, with explicit 'no cross-tenant access' annotations at each network boundary.", 'Attach the architecture document to the BAA template so legal and sales teams can provide it directly to prospective healthcare customers during procurement reviews.']

Expected Outcome

Enterprise healthcare customers complete security reviews 40% faster, and audit findings related to data co-mingling are eliminated from annual SOC 2 reports.

Onboarding Enterprise Customers Who Require Custom Configuration and SLA Guarantees

Problem

Enterprise sales engineers waste days explaining to Fortune 500 prospects why their custom retention policies, SSO configurations, and uptime SLAs cannot be guaranteed in a shared multi-tenant environment, causing deal delays and lost contracts.

Solution

Single-tenant architecture allows each enterprise customer to have a dedicated instance with independently configurable parameters — custom data retention, private VPN peering, and isolated maintenance windows — all documented per customer in a dedicated runbook.

Implementation

['Maintain a per-customer configuration manifest (YAML or Terraform variables file) stored in a dedicated Git repository branch, documenting every deviation from default settings such as custom SSO provider, data residency region, and backup frequency.', 'Write a customer-specific Architecture Decision Record (ADR) explaining why the tenant was provisioned with dedicated compute tiers (e.g., r6g.4xlarge for memory-intensive workloads) versus standard sizing.', 'Publish an SLA addendum document that references the isolated infrastructure topology, explicitly stating that maintenance windows, scaling events, and incidents on one tenant do not affect others.', "Provide the customer with a read-only dashboard link (e.g., Grafana) scoped to their tenant's metrics, backed by documentation explaining what each dedicated resource metric represents."]

Expected Outcome

Enterprise deal close rates improve by 25% as procurement and InfoSec teams receive concrete infrastructure documentation that directly answers RFP security questionnaires.

Incident Response Documentation for Tenant-Specific Outages

Problem

When an outage occurs in a shared platform, operations teams struggle to produce post-mortems that clearly attribute root cause to a specific tenant's workload versus platform-wide infrastructure, leading to vague RCAs that erode customer trust.

Solution

With single-tenant architecture, each customer's infrastructure stack has its own monitoring namespace, log streams, and alerting rules, enabling precise incident scoping and tenant-specific post-mortem documentation that names exact resources and timelines.

Implementation

['Document the per-tenant observability stack in a runbook: each tenant has a dedicated CloudWatch log group, Datadog service tag, and PagerDuty escalation policy, ensuring alerts are immediately attributed to the correct customer environment.', "Create an incident response template in Notion or Confluence that includes a 'Tenant Scope' field, populated automatically from the alerting system, so engineers immediately know which isolated stack is affected.", "Write the post-mortem using tenant-specific resource identifiers (e.g., 'RDS instance rds-acme-corp-prod failed' rather than 'shared database cluster degraded'), providing customers with precise, verifiable timelines.", "Store each post-mortem in the customer's dedicated documentation space, accessible via the customer portal, reinforcing transparency and accountability."]

Expected Outcome

Customer-reported satisfaction with incident communication increases from 62% to 89%, and post-mortem turnaround time drops from 72 hours to under 24 hours due to clear resource attribution.

Regulatory Data Residency Documentation for Global Financial Services Clients

Problem

Financial services firms operating under GDPR, MAS TRM, or data localization laws in Brazil (LGPD) require documented proof that their data never leaves a specific geographic region — a guarantee impossible to make cleanly in a shared multi-tenant deployment.

Solution

Single-tenant architecture enables provisioning fully isolated stacks within a specified AWS or Azure region, with documentation explicitly mapping every data store, backup target, and log destination to the required geographic boundary.

Implementation

['Create a Data Residency Architecture Document for each regulated customer, listing every AWS service used (RDS in eu-west-1, S3 bucket with no replication rules, CloudWatch Logs in eu-west-1) with region annotations and screenshots of console configurations.', "Document the Terraform workspace configuration that enforces region constraints via provider blocks, and include this as an appendix in the compliance package delivered to the customer's DPO.", 'Produce a network topology diagram (using nwdiag or draw.io) showing that all inter-service communication stays within the designated region, with no cross-region replication or CDN caching of sensitive data.', "Schedule a quarterly review process, documented in the runbook, where the infrastructure team audits the tenant's resource inventory against the data residency manifest and updates the compliance document accordingly."]

Expected Outcome

Financial services customers pass regulatory audits in Germany, Singapore, and Brazil without requiring additional technical clarification requests, reducing compliance documentation cycles from 3 months to 3 weeks.

Best Practices

Automate Tenant Provisioning with Infrastructure-as-Code Templates

Each new tenant should be provisioned through a repeatable, version-controlled IaC template (Terraform module or AWS CloudFormation stack set) rather than manual console clicks. This ensures every tenant's isolated environment is architecturally identical, auditable, and reproducible, eliminating configuration drift between customer instances.

✓ Do: Maintain a Terraform module registry with a 'tenant-stack' module that accepts customer_id, region, and tier as input variables, and automatically creates the full isolated stack — VPC, subnets, RDS, S3, IAM roles — with consistent naming conventions like 'rds-{customer_id}-prod'.
✗ Don't: Do not manually provision tenant infrastructure through cloud consoles or ad-hoc scripts, as this produces undocumented snowflake environments that are impossible to audit, replicate, or decommission cleanly.

Enforce Strict Network Isolation Between Tenant VPCs

Each tenant's compute and data resources must reside in a dedicated VPC with no VPC peering connections to other tenant VPCs, ensuring that a misconfigured security group or compromised workload in one tenant cannot laterally access another. This is a foundational security control that must be documented and validated through automated compliance checks.

✓ Do: Use AWS Organizations Service Control Policies (SCPs) or Azure Policy to enforce that tenant VPCs cannot establish peering connections outside their designated account boundary, and document this control in the tenant security baseline runbook.
✗ Don't: Do not place multiple tenants in the same VPC and rely solely on security groups for isolation, as this creates a shared blast radius and fails to satisfy network-level isolation requirements demanded by enterprise security reviews.

Implement Per-Tenant Observability Namespaces from Day One

Monitoring, logging, and alerting must be scoped to individual tenants using dedicated namespaces, log groups, or service tags from the moment the tenant stack is provisioned. Retroactively adding per-tenant observability to a commingled monitoring setup is extremely difficult and often produces gaps in historical data that complicate incident investigations.

✓ Do: Tag all tenant resources with a 'tenant_id' label at provisioning time, configure Datadog or CloudWatch to use this tag as a dimension for all metrics and dashboards, and create a dedicated PagerDuty service per tenant so alerts are automatically routed to the correct on-call team.
✗ Don't: Do not aggregate all tenant logs into a single shared log stream with the intention of filtering by tenant later — this approach leaks log data across tenant boundaries, complicates access control, and makes per-tenant log export for compliance requests extremely slow.

Design Tenant Offboarding and Data Deletion Procedures Before Launch

GDPR Article 17 and similar regulations require the ability to fully delete a customer's data upon contract termination. In single-tenant architecture, this is straightforward — the entire isolated stack can be destroyed — but only if the deprovisioning runbook is documented and tested before the first customer is ever onboarded.

✓ Do: Create a tenant deprovisioning runbook that runs 'terraform destroy' on the tenant workspace, verifies S3 bucket deletion with versioning disabled, confirms RDS snapshot deletion or transfer, and produces a signed Certificate of Deletion document delivered to the customer.
✗ Don't: Do not defer deprovisioning documentation until a customer actually requests deletion — by that point, undocumented manual provisioning steps will make it unclear which resources belong to the tenant, risking incomplete deletion and regulatory non-compliance.

Document Tenant-Specific Upgrade and Maintenance Window Policies

One of the key advantages of single-tenant architecture is the ability to schedule maintenance, apply patches, and deploy upgrades on a per-customer basis without impacting other tenants. This benefit is only realized if the process is explicitly documented and communicated to customers, otherwise operations teams default to synchronized deployments that negate the isolation advantage.

✓ Do: Maintain a per-tenant maintenance schedule document in the customer portal, specifying the agreed maintenance window (e.g., 'Sundays 02:00–04:00 UTC'), the notification lead time (48 hours), and the rollback procedure specific to that tenant's stack version.
✗ Don't: Do not apply platform-wide rolling deployments that push all tenants to a new version simultaneously, as this eliminates the customer's ability to schedule upgrades around critical business periods and removes the safety net of staggered rollout validation.

How Docsie Helps with Single-tenant Architecture

Build Better Documentation with Docsie

Join thousands of teams creating outstanding documentation

Start Free Trial