Comment by stopachka
5 days ago
My choice of the word "logically separated", was meant to specifically answer the question the reader asked:
> If someone else's account is compromised, how do I know I won't be?
If you have other questions, you can feel free to ask, and I'd be happy to answer in more detail.
It'd be useful to understnad the nature of that logical separation: for example is data from different tenants stored on disk using different encryption keys? what about in memory? or perhaps there's no encryption-level isolation but you're relying on an authorization layer to authorize to different pieces of data: if that's the case is that built on Postgres's row-level security, for example?
These are fundamental points to be open and transparent about to instill confidence
HOW are they logically separated? Are there any layers to this security? Any standard established security boundaries like containers? Or is it just your app code doing its best not to have security bugs?