๐๏ธ Architecture Trade-Offs for Security and Platform Teams
Intro: Architecture reviews rarely present a clean โsecure vs insecureโ choice. More often they present two valid options with different costs, constraints, and failure modes. This page focuses on the trade-offs senior engineers repeatedly mediate between product speed, platform simplicity, and security assurance.
Trade-off 1: shared cluster vs dedicated cluster
Shared cluster
Strengths: better utilization, lower cost, fewer platform surfaces to manage.
Risks: stronger dependence on namespace isolation, policy discipline, and operational rigor.
Dedicated cluster
Strengths: cleaner blast-radius separation, easier exception handling, simpler tenant narratives for audits.
Risks: more operational sprawl, inconsistent guardrails, cost growth, weaker central visibility if standards drift.
Decision bias: use dedicated clusters for materially different trust zones, compliance domains, or customer commitments โ not simply because a team is loud.
Trade-off 2: multi-tenant database vs per-tenant database
Shared multi-tenant store
Best when product velocity, cost, and operational simplicity matter more than maximal isolation.
Per-tenant store
Best when customer isolation requirements, legal separation, or high-value regulated data justify the operational tax.
Review question: can the team prove tenant isolation in code, query paths, background jobs, and support tooling โ or are they relying on one narrow control?
Trade-off 3: self-hosted runners vs SaaS runners
Self-hosted runners
Pros: more network reach, internal system access, custom tooling.
Cons: larger trust boundary, harder lifecycle hygiene, greater persistence risk.
SaaS runners
Pros: simpler lifecycle, better baseline isolation, less platform maintenance.
Cons: limited network reach, stricter patterns required for internal deployments.
Rule of thumb: if the workload truly needs internal access, isolate runners by trust tier and purpose. Do not solve convenience problems with shared privileged runners.
Trade-off 4: direct internet pulls vs curated internal artifact mirrors
Direct pulls reduce setup friction. Internal mirrors improve provenance control, outage resilience, and policy enforcement.
Choose mirrors when:
- production dependencies matter to uptime or compliance;
- image or package integrity is a recurring concern;
- teams need reviewable approved sources.
Trade-off 5: public admin plane vs private admin plane
A public admin plane is easier to operate globally but raises exposure and trust requirements. A private admin plane reduces exposure but increases access brokerage complexity.
Decision point: if the admin plane can trigger irreversible or high-impact actions, prefer stronger access segmentation even if usability takes a hit.
The architecture memo structure that works
For each trade-off, document:
- context and constraints;
- risk we are willing to accept;
- controls that must be true for the choice to remain safe;
- telemetry needed to know the choice is still working;
- what would trigger revisiting the decision.
Design review prompts
- Which option produces the simplest explainable trust model?
- Which option fails more safely?
- Which option can product teams operate without permanent security hand-holding?
- Which option produces logs and evidence that investigators can actually use?
- Which option scales exception handling more cleanly?
Cross-links
- Multi-Tenant SaaS and Admin-Plane Patterns
- Runner Isolation and Trust Boundaries
- Trusted Images, Harbor, and Signing
Author attribution: Ivan Piskunov, 2026 - Educational and defensive-engineering use.