This article details the system design of PACIFIC, a multi-tenant SaaS platform built on AWS for exchanging product carbon footprint (PCF) data across complex automotive supply chains. It highlights architectural decisions focused on achieving strict data sovereignty, multi-tenancy without dedicated AWS accounts, and interoperability with external data spaces like Catena-X, using services such as Amazon ECS, AWS Fargate, Amazon Cognito, and AWS IAM.
Read original on AWS Architecture BlogThe PACIFIC platform addresses the critical need for transparent and auditable carbon emissions data in the automotive supply chain. The core challenge lies in securely exchanging sensitive PCF data across numerous companies while ensuring each participant maintains full control and sovereignty over their data. This requires a robust multi-tenant architecture capable of isolating data access down to individual companies without the operational overhead of separate infrastructure per tenant.
PACIFIC implements a fine-grained IAM-based isolation model to achieve multi-tenancy and data sovereignty. Instead of provisioning separate AWS accounts or VPCs for each tenant, which would be costly and complex to manage, the platform leverages Amazon Cognito and AWS Secrets Manager. Upon onboarding, each company is assigned a dedicated IAM role with a tightly scoped policy, granting access only to their specific secrets in Secrets Manager. User authentication via Amazon Cognito maps users to their company's IAM role, and AWS STS issues temporary credentials that enforce access solely to their designated resources. This prevents cross-tenant data access at the AWS IAM policy level.
Interoperability with the Catena-X data space is crucial. PACIFIC utilizes Eclipse Dataspace Components (EDC) connectors for standardized cross-company data exchange. For PCF data exchange, the `pcf-exchange-module` acts as a per-tenant endpoint. Authorization for data retrieval is managed through EDC policy negotiation, where usage policies are agreed upon, and then the supplier's EDC issues an authorization token to the consumer's EDC. This token, derived from the supplier's Cognito app client credentials, specifically grants access to that supplier's `pcf-exchange-module` endpoint, ensuring data is shared only after explicit consent and to authorized partners.
Architectural Lesson
Implementing strong multi-tenant isolation doesn't always require full infrastructure replication per tenant. Leveraging cloud-native identity and access management (IAM) services with fine-grained policies can provide robust security and data sovereignty while optimizing operational costs and complexity for SaaS solutions.