Deployable SaaS (D-SaaS) Standard

Deployable SaaS (D-SaaS) is an open architectural standard for delivering modern service-based software inside customer-owned infrastructure to preserve data sovereignty, strict boundary control, and auditability in regulated environments.

Executive Summary

Modern SaaS delivery models offer efficiency and scalability but often conflict with the requirements of compliance-driven environments. The core issue is the erosion of data sovereignty, defined as an organization’s ability to retain direct technical ownership and enforcement authority over its data, infrastructure, and operational boundaries.

Vendor-hosted SaaS architectures centralize control within the provider’s environment. This creates a structural misalignment with regulated environments that require in-boundary governance, auditability, and technically enforced policy controls.

This standard introduces Deployable SaaS (D-SaaS), a software delivery architecture designed to preserve data sovereignty by deploying and operating SaaS applications entirely within customer-owned infrastructure. D-SaaS reframes SaaS not as a hosting model, but as a delivery and lifecycle model, enabling organizations to adopt modern service-based software without relinquishing control over identity, data, or enforcement boundaries.

Deployable SaaS is intended for organizations operating regulated private cloud environments where data custody, identity governance, and audit scope must remain under direct organizational control.

Background and Market Conditions

Over the past decade, regulated industries such as government, healthcare, finance, and critical infrastructure have aggressively adopted cloud technologies. This adoption has been accompanied by a fundamental shift from software ownership and customer-controlled operation to vendor-hosted SaaS platforms.

Simultaneously, vendors have consolidated the SaaS, PaaS, and IaaS layers into monolithic, provider-controlled environments. While this streamlining improves efficiency and accelerates delivery, it centralizes control and places core functions such as data storage, authentication, and telemetry outside the customer’s domain.

At the same time, regulatory requirements have intensified. Frameworks such as FedRAMP, HIPAA, RMF, PCI-DSS, and SOX require demonstrable boundary control, local auditability, and technical policy enforcement, conditions that are difficult or impossible to meet under traditional SaaS architectures.

While examples are drawn from common regulatory frameworks, Deployable SaaS is intentionally framework-agnostic and applicable wherever strict boundary control is required.

The market has created a paradox: cloud is mandatory, but compliance frameworks assume control models that modern SaaS violates.

The Core Problem: Loss of Data Sovereignty

At the heart of this conflict is the loss of data sovereignty, defined here as an organization’s ability to retain technical ownership and enforcement authority over its data, operations, and security boundaries. This sovereignty is fundamentally eroded by vendor-hosted SaaS delivery models.

Most compliance frameworks implicitly assume that:

  • Organizations own and control the data for which they are responsible.
  • Data location and data flow are known, constrained, and technically enforceable.
  • Authentication, authorization, and auditing occur within governed boundaries.
  • Logs and evidentiary artifacts remain under customer custody.
  • Trust is enforced through technical controls, not inferred through contractual agreements.

Vendor-hosted SaaS architectures violate these assumptions by design. Even when encryption, tenant isolation, or logical separation is employed, the underlying infrastructure, identity stack, logging systems, and runtime environment remain external to the customer’s control.

As a result, audit scope expands beyond the organizational boundary, enforcement authority is diluted, and security posture becomes dependent on vendor implementation details that the customer cannot directly observe or control.

Resulting Impacts

  • Expanded audit scope and increased audit complexity
  • Reliance on exception-based or compensating security controls
  • Fragmented identity and authentication workflows
  • Inconsistent multi-factor authentication enforcement
  • User frustration caused by disjointed access models
  • Unmanaged SaaS tenant sprawl across departments

These are not procedural or operational failures. They are direct consequences of architectural misalignment between modern SaaS delivery models and environments that require strict boundary control.

Structural Limitations of Traditional SaaS

Traditional SaaS architectures are inherently centralized. Service providers retain operational control over:

  • Application runtime and execution environment
  • Platform services and tenancy models
  • Infrastructure and networking layers
  • Authentication and access control systems
  • Monitoring, logging, and telemetry systems

This design places control outside the organization’s governed boundary by default. Even offerings marketed as “private” or “single-tenant” SaaS frequently operate on provider-owned infrastructure, rely on externalized identity systems, and export logs and telemetry through vendor-controlled pipelines.

Configuration-level controls do not change this fundamental reality. When the runtime environment and control plane remain vendor-operated, the organization lacks the technical authority required to enforce its own boundaries.

Compliance cannot be restored through policy overlays, contractual assurances, or compensating controls. As long as the runtime and control plane are vendor-owned, boundary enforcement remains indirect and incomplete.

Deployable SaaS (D-SaaS): Architectural Definition

Deployable SaaS (D-SaaS) is a software delivery architecture in which SaaS applications are provided as self-contained artifacts that are deployed and operated entirely within the customer’s infrastructure.

D-SaaS departs from traditional SaaS by explicitly decoupling:

  • Hosting from service delivery
  • Operation from ownership
  • Capability from vendor-controlled infrastructure

Rather than operating the application on behalf of the customer, the provider delivers the software as a deployable unit while retaining responsibility for lifecycle activities such as updates, vulnerability remediation, and product support.

The customer operates the service fully within its governed environment, preserving data sovereignty, boundary control, and compliance enforcement without sacrificing modern service-based software delivery.

Architectural Invariants

Deployable SaaS is defined by a strict set of architectural invariants. These are hard requirements that form the foundation of the D-SaaS compliance-aligned delivery model. The invariants are non-negotiable. If any are violated, the product does not qualify as Deployable SaaS.

Customer-Owned IaaS Tenancy

The application must be deployed entirely within infrastructure owned and controlled by the customer. This includes compute, storage, and network boundaries.

No Vendor-Operated Runtime or Tenant

The vendor must not host, operate, or share the runtime environment. All execution, orchestration, and service operation occur within the customer’s control plane.

Data Remains In-Boundary

All data, including configuration data, operational data, metadata, and telemetry, must remain within the customer’s defined boundary of authority at all times.

Identity Integrates with Customer IdP

Authentication must integrate directly with the customer’s identity provider. This enables enforcement of local identity policies such as role-based access control and multi-factor authentication.

Logs and Audit Artifacts Remain Local

All operational logs, telemetry, and security-relevant evidence must be generated, retained, and accessible within the customer environment. Logs must be forensically complete and suitable for audit and review.

No Required External Control Plane

The system must operate fully without reliance on a vendor-operated control plane or external orchestration service. External connectivity must not be required for normal operation.

Artifact-Based Updates Under Customer Control

All updates, patches, and configuration changes must be delivered as cryptographically signed artifacts. The customer retains full control over update timing, approval, and deployment.

Data and Log Preservation During Updates

All critical operational data and security-relevant logs must be preserved across upgrades, patches, and redeployments. A zero-regression posture is required to maintain forensic continuity and evidentiary integrity.

Air-Gap Compatible Deployment

The system must support air-gapped and disconnected environments. Vendors must assume that external repositories, update endpoints, and validation services may be unreachable and must provide offline-compatible installation, update, and maintenance workflows.

Offline-Verifiable, Time-Bound Licensing

Licensing must be time-bound and enforceable without requiring external validation or license server communication. Offline-verifiable cryptographic mechanisms, such as signed license tokens using public and private key pairs, must be supported to enable licensed functionality in fully disconnected environments.

Note: Any product that fails to meet all of the above invariants cannot be considered a Deployable SaaS solution.

D-SaaS Deployment Models

Deployable SaaS supports multiple deployment approaches to align with customer infrastructure preferences and operational constraints.

Container-Based Deployments

Delivered as Docker or OCI-compliant containers and deployed using Kubernetes or functionally equivalent orchestration platforms. The customer retains full control over scheduling, scaling, networking, and runtime configuration.

Virtual Machine Appliance Deployments

Provided as virtual machine images compatible with common enterprise and cloud-native hypervisors, including VMware, KVM, and equivalent platforms. These deployments support environments where container orchestration is unavailable or prohibited and accommodate software designs that cannot rely on container-based execution.

Supported Private Cloud Environments

Designed for deployment into customer-owned private cloud infrastructure, including environments built on AWS GovCloud, Azure Stack, OpenStack-based platforms, or equivalent private cloud implementations.

Connected and Disconnected Operation

Supports both connected and fully disconnected environments. Updates, patches, and configuration changes are delivered as cryptographically signed artifacts and applied under customer control without requiring continuous network connectivity.

This deployment flexibility enables D-SaaS solutions to operate consistently across diverse regulatory, compliance, and operational contexts while preserving strict boundary control.

Trust Boundaries and Control Planes

Deployable SaaS enforces a strict separation of responsibility between the Customer Plane and the Provider Plane. This separation is fundamental to preserving data sovereignty, auditability, and enforcement authority.

Customer Plane Responsibilities

  • Executing and operating the application runtime
  • Managing identity, authentication, and access control
  • Maintaining network segmentation and boundary enforcement
  • Collecting, storing, and reviewing logs, evidence, and telemetry
  • Enforcing compliance, security policy, and operational governance within the environment

All operational data and enforcement mechanisms remain within the customer’s boundary of authority.

Provider Plane Responsibilities

  • Developing, building, and cryptographically signing release artifacts
  • Supplying vulnerability remediation, patches, and functional updates
  • Providing documentation, operational guidance, and product support
  • Maintaining source code, secure build pipelines, and product lifecycle processes

The provider does not operate or access the customer runtime environment.

Boundary Enforcement

No operational data, telemetry, identity information, or audit artifacts cross from the Customer Plane into the Provider Plane during normal operation. Interaction between planes is limited to artifact delivery and support workflows explicitly initiated and controlled by the customer.

This separation ensures that trust is enforced through architecture rather than assumed through contractual agreement, reinforcing data sovereignty, auditability, and accountability.

Compliance Alignment Through Architecture

Deployable SaaS aligns with compliance requirements through architectural design rather than procedural overlays or compensating controls.

Boundary Control

All sensitive operations, including data processing, identity enforcement, and audit generation, occur entirely within the customer’s governed environment.

Audit Scope Reduction

Because the application runtime, data, and logs remain within customer-owned infrastructure, audit scope is limited to systems under direct organizational control.

Policy Enforcement

Identity, access control, logging, and retention policies are enforced internally using the customer’s existing governance and security frameworks.

Elimination of Exception-Based Security

Architectural alignment removes the need for security exceptions, waivers, or compensating controls commonly required by vendor-hosted SaaS models.

By preserving ownership of infrastructure, identity, and operational boundaries, D-SaaS makes compliance an intrinsic outcome of the architecture rather than a condition imposed after deployment.

Secondary Effects and Operational Benefits

While the primary drivers behind Deployable SaaS are data sovereignty, boundary control, and compliance alignment, the architecture also produces meaningful secondary operational benefits.

Reduced SaaS Tenant Sprawl

Service deployment within customer-owned infrastructure consolidates SaaS capability under organizational governance and eliminates uncontrolled external tenants.

Consistent Authentication and Multi-Factor Enforcement

All access is mediated through existing identity systems, enabling uniform authentication, authorization, and multi-factor authentication policies across services.

Improved User Experience

Users interact with services through a consistent access model, avoiding identity friction and fragmented authentication workflows.

Simplified Auditing and Evidence Collection

All logs, telemetry, and audit artifacts remain locally accessible within the governed environment, reducing audit preparation effort and complexity.

Easier Integration with Existing Operations

Deployments align naturally with established IT, security, and DevSecOps workflows without requiring architectural exceptions or specialized handling.

These benefits are not additional features or optimizations. They are direct consequences of architectural alignment and strict boundary control inherent to the D-SaaS model.

Comparison Matrix

The following matrix contrasts Deployable SaaS with common software delivery models to highlight differences in ownership, control, and compliance alignment.

Table 1: Software Delivery Model Comparison

Capability Traditional SaaS Single-Tenant Hosted SaaS On-Prem Software Deployable SaaS (D-SaaS)
Data Ownership Vendor-controlled Vendor-controlled Customer-owned Customer-owned
Boundary Control External Partial Internal Internal
Identity and MFA Vendor-managed Mixed Customer-managed Customer-managed
Logging and Audit External or limited Partial Local Local
Deployment Flexibility Vendor-defined Limited High High
Delivery Format Web application Hosted service Installable software Container or VM appliance
Lifecycle Model Continuous remote delivery Provider-managed Manual upgrades Artifact-based updates under customer control

Is Deployable SaaS the Same as Legacy Software?

While Deployable SaaS shares the concept of customer-managed deployment with traditional boxed software, the two models differ fundamentally in architecture, delivery format, and operational expectations.

Table 2: Legacy Software vs Deployable SaaS

Aspect Legacy Software (Box Model) Deployable SaaS (D-SaaS)
Target Environment Workstations and servers Private and hybrid cloud, orchestrated IaaS
Deployment Format Installers such as EXE, MSI, or ISO Containers and VM appliances
Update Model Manual patches or physical media Signed artifacts with controlled rollout
Compliance Alignment Optional or indirect Architectural by design
Connectivity Assumptions Standalone or network-connected Air-gap compatible
Licensing Model Product keys or activation mechanisms Cryptographic, offline-verifiable licensing

Deployable SaaS is purpose-built for modern private cloud environments. It supports air-gapped operation, identity federation, audit-grade logging, and continuous vendor lifecycle responsibility while preserving customer ownership of infrastructure and enforcement boundaries. It is not a rebranded legacy software model. It is a modern service architecture designed for sovereignty and compliance.

D-SaaS Compliance and Certification Model

Deployable SaaS establishes two distinct and complementary designations to indicate conformance with the D-SaaS architectural standard: D-SaaS Compliant and D-SaaS Certified. These designations are intentionally differentiated to reflect different levels of assurance while preserving the clarity and integrity of the standard.

D-SaaS Compliant Mark

D-SaaS Compliant

Self-attested conformance to the published D-SaaS invariants.

D-SaaS Certified Mark

D-SaaS Certified

Independent verification by Lab 0x2A against defined acceptance criteria.

D-SaaS Compliant

D-SaaS Compliant indicates that a software product conforms to the Deployable SaaS architectural standard based on a self-assessment against the published D-SaaS invariants. This designation reflects architectural alignment and intent, not independent validation.

Key Characteristics

  • Self-attested by the product owner or developer
  • Demonstrates architectural alignment with the D-SaaS standard
  • Deployable into customer-owned infrastructure, including private cloud IaaS
  • Data, identity, logging, and operational control boundaries remain under customer control
  • No vendor-operated runtime, shared tenancy, or external control plane is required

D-SaaS Compliant is an architectural declaration, not a certification. It does not imply independent verification, formal assurance, or endorsement by Lab 0x2A beyond conformance with the published standard definition.

Permitted Usage

The D-SaaS Compliant mark may be used in:

  • Product documentation
  • Architecture and system design diagrams
  • White papers and technical briefs
  • Marketing or informational materials that accurately describe architectural alignment

D-SaaS Certified

D-SaaS Certified indicates that a software product has undergone independent verification by Lab 0x2A and has been validated against the D-SaaS standard and its defined acceptance criteria. This designation represents a higher level of assurance than self-attestation.

Key Characteristics

  • Verified against formal D-SaaS acceptance and validation criteria
  • Includes review of deployment architecture, control boundaries, and runtime behavior
  • Confirms adherence to D-SaaS architectural invariants in practice
  • Certification may be version-specific, environment-specific, and time-bounded
  • Certification may be suspended or revoked if the product no longer conforms

D-SaaS Certified signals that the product has been evaluated beyond self-assessment and meets the requirements of the D-SaaS standard as verified by the standard’s steward.

Permitted Usage

The D-SaaS Certified mark may be used only:

  • After successful completion of the Lab 0x2A verification process
  • In formal documentation, proposals, and compliance-relevant materials
  • In contexts where architectural assurance or independent validation is required

Reference Implementation and Stewardship

The Deployable SaaS architecture was originally conceived under Hodge IP & Holdings Co. LLC and implemented through Lab 0x2A LLC, which together continue to develop secure software products that conform to the D-SaaS architectural model.

Deployable SaaS is not a proprietary framework. It is an open architectural standard intended to be adopted, implemented, and evaluated by any vendor or organization that requires compliance-grade data sovereignty and strict boundary control.

Lab 0x2A serves as the reference implementer and steward of the D-SaaS standard. Its role is to maintain the architectural definition, publish conformance criteria, and provide optional verification for organizations that seek independent validation of D-SaaS compliance.

The objective of D-SaaS is to establish a repeatable and defensible software delivery pattern for regulated and boundary-controlled environments, enabling modern service-based capabilities without relinquishing ownership of infrastructure, identity, or enforcement authority, while reducing operational overhead and increasing customer adoption and acceptance.

Conclusion

Deployable SaaS was created in response to the structural limitations of traditional SaaS delivery models in regulated and compliance-intensive environments.

By decoupling SaaS capability from vendor-hosted infrastructure, D-SaaS restores data sovereignty, preserves auditability, and aligns software delivery with the architectural assumptions embedded in modern compliance frameworks.

D-SaaS is not a workaround or an incremental adaptation of existing models. It is a structural correction to a systemic problem and a viable path forward for delivering secure, compliant, and modern service-based software without relinquishing control of infrastructure, identity, or enforcement authority.

Glossary

Data Sovereignty

The principle that an organization retains technical ownership and enforcement authority over its data, including how and where it is processed, stored, and audited.

Boundary Control

The ability to define, enforce, and govern technical perimeters for data, identity, access, and operational authority within an environment.

Tenancy

The logical and infrastructural separation between different customers, environments, or operational domains within a shared or multi-tenant platform.

Control Plane

The system layer responsible for managing configuration, identity integration, policy enforcement, updates, and orchestration of services.

Deployable SaaS (D-SaaS)

A software delivery architecture in which SaaS applications are deployed and operated entirely within customer-owned infrastructure, with no vendor-operated runtime, shared tenancy, or external control-plane dependency.

How to Cite This Standard

Use the canonical URL and version when referencing this standard in architecture documents, compliance narratives, or procurement artifacts.

Lab 0x2A. "Deployable SaaS (D-SaaS) Standard", v1.1, https://lab0x2a.com/standards/d-saas, accessed YYYY-MM-DD.

Change Log

Date Version Summary
2025-12-14 v1.1 Initial publication of the D-SaaS architectural standard and compliance designations.