In-VPC Data Warehousing: A CISO's Guide
The Problem With Data Leaving Your VPC
Every time a query result crosses a network boundary, it creates an exfiltration vector. Traditional cloud data warehouses operate in their own multi-tenant environments. Your data travels from your VPC to theirs, gets processed on shared infrastructure, and returns over the internet — sometimes through public endpoints. For regulated industries, this architecture is a compliance nightmare.
CISOs are increasingly asking a simple question: why does our most sensitive data need to leave our security perimeter at all?
What In-VPC Deployment Actually Means
HatiData deploys entirely inside your AWS VPC. The compute nodes, the storage layer, the query engine — all of it runs on infrastructure you own and control. Your data never traverses the public internet. It never touches a multi-tenant environment. It never leaves your security boundary.
The control plane — the component that handles orchestration, billing, and metadata — communicates with the data plane exclusively through AWS PrivateLink. This means even the management traffic stays within AWS's private backbone network, never touching a public endpoint.
CMEK: Your Keys, Your Control
Customer-Managed Encryption Keys (CMEK) give you full control over data-at-rest encryption. HatiData encrypts all data using keys stored in your AWS KMS account. You control the key rotation policy, you control the access policy, and you can revoke access at any time.
This is not envelope encryption where the vendor holds a master key. This is true CMEK — if you delete the key, the data becomes permanently unreadable. That level of control is what auditors want to see.
Immutable Audit Logs
Every query executed against HatiData is logged to an immutable audit trail. Logs are written to S3 with Object Lock enabled — once written, they cannot be modified or deleted, even by account administrators. The default retention period is 7 years, configurable to meet your specific compliance requirements.
Each audit record includes the full query text, execution metadata, the authenticated identity of the caller, and a SHA-256 hash for tamper detection. This gives your compliance team a forensic-grade record of every data access event.
Compliance Timeline Compression
The typical security review for a new data vendor takes 3–6 months: questionnaire, architecture review, pen test, legal review, DPA negotiation. HatiData's in-VPC architecture compresses this timeline dramatically.
Because the data plane runs inside your VPC, it's already covered by your existing SOC 2, HIPAA, and FedRAMP controls. Your network segmentation, your monitoring, your incident response — all of it applies automatically. The only new component to evaluate is the control plane, which handles no customer data and communicates exclusively over PrivateLink.
We've seen CISOs approve HatiData in a single meeting. When the data never leaves your VPC, most of the hard questions answer themselves.
A Security Architecture, Not a Feature List
Security isn't a feature you bolt on — it's an architecture you build from the ground up. HatiData was designed for environments where data sovereignty, encryption, and auditability are non-negotiable. If your organization operates under SOC 2, HIPAA, PCI-DSS, or similar frameworks, in-VPC deployment isn't a nice-to-have — it's the only architecture that makes sense.
Ready to see what an in-VPC data warehouse looks like in your environment? Start with a Shadow Mode pilot — we deploy alongside your existing warehouse, read-only, and you evaluate on your own terms.