Hardware-level boundaries between customer workloads
Multi-tenant applications need strong isolation between customers. A vulnerability in one tenant's workload shouldn't compromise others. BoxLite's micro-VMs provide hardware-level isolation—each tenant runs in their own VM with a separate kernel, making cross-tenant attacks extremely difficult.
When multiple customers share infrastructure, isolation is critical:
Customer workloads, plugins, and custom code execution
VPS, serverless functions, and managed services
Department or team-level isolation requirements
Healthcare, finance, government requiring strong isolation
Containers (Docker, Kubernetes) provide process-level isolation but share the host kernel. Container escapes have occurred (CVE-2024-21626, CVE-2020-15257, etc.), allowing attackers to break out and access other tenants or the host.
BoxLite's micro-VMs run a separate kernel per tenant. Even if a tenant achieves a kernel exploit, they're still contained within their own VM.
| Isolation Level | Containers | BoxLite VMs |
|---|---|---|
| Kernel | Shared | Separate per tenant |
| Escape attack surface | Kernel syscalls | Hypervisor (minimal) |
| Noisy neighbor risk | Higher | Lower (VM scheduling) |
| Compliance readiness | May require extra controls | Strong isolation by default |
import boxlite
async def run_tenant_workload(tenant_id: str, code: str):
# Each tenant gets their own isolated micro-VM
async with boxlite.SimpleBox(
image="python:3.12-slim",
memory_mb=512,
cpus=1,
labels={"tenant_id": tenant_id}
) as box:
result = await box.exec("python", "-c", code)
return {
"tenant_id": tenant_id,
"output": result.stdout,
"exit_code": result.exit_code
} BoxLite enforces resource limits at the VM level:
These limits are enforced by the hypervisor, not inside the guest OS, so a malicious tenant cannot bypass them.
Hardware-level isolation helps with compliance requirements:
Learn how BoxLite can help secure your multi-tenant platform.