Skip to main content

BYOC (Bring Your Own Cloud)

EZ-CDC uses a Bring Your Own Cloud deployment model where data processing happens entirely within your AWS account. This approach provides the security of self-hosting with the convenience of a managed service.

What is BYOC?

In the BYOC model:

  • Workers run in your AWS account on EC2 instances you own
  • Data never leaves your VPC - source and sink connections are direct
  • You control the network - define security groups, subnets, and routing
  • EZ-CDC manages orchestration - we handle job assignment, monitoring, and lifecycle
Architecture Overview

Security Benefits

1. Data Residency

Your data remains within your AWS account boundaries:

Data TypeLocationAccess
Source data (PostgreSQL)Your VPCWorker only
Replicated data (StarRocks)Your VPCWorker only
Connection credentialsEZ-CDC (encrypted)Decrypted only in worker
Job metadataEZ-CDCControl plane
MetricsYour VPC → Control PlanePush only

2. Network Isolation

Workers require zero inbound connections. All traffic is outbound only, connecting to the control plane, databases, and metrics endpoints.

3. IAM-Based Access Control

EZ-CDC uses IAM roles for AWS resource access:

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:GetObject"
],
"Resource": "arn:aws:s3:::ez-cdc-releases/*"
},
{
"Effect": "Allow",
"Action": [
"ssm:UpdateInstanceInformation",
"ssm:DescribeInstanceInformation"
],
"Resource": "*"
}
]
}

4. Encryption

DataEncryption
Connection credentialsAES-256-GCM (at rest)
Control plane communicationTLS 1.3 (in transit)
Database connectionsSSL/TLS (configurable)

BYOC vs Traditional SaaS

AspectTraditional SaaSEZ-CDC BYOC
Data locationVendor's cloudYour cloud
Network exposureVendor IPs need accessNo inbound access
ComplianceDepends on vendorYour controls apply
Data sovereigntyMay cross bordersStays in your region
Audit trailVendor logsYour CloudWatch

Connectivity Options

Standard (Internet)

Workers connect to the control plane over the public internet using TLS-encrypted HTTPS/gRPC.

Standard BYOC Architecture

Pros: Simple setup, no additional AWS resources Cons: Traffic traverses internet (encrypted)

Workers connect via AWS PrivateLink—traffic never leaves AWS network.

BYOC PrivateLink Architecture

Pros: No internet exposure, private IPs only Cons: Additional setup, PrivateLink costs

What EZ-CDC Can See

The control plane only sees:

Visible to EZ-CDC:

  • Job status (running, stopped, failed)
  • Worker health metrics (CPU, memory)
  • Replication metrics (events/sec, lag)
  • Encrypted connection configs
  • Table names (for UI display)

NOT visible to EZ-CDC:

  • Actual row data
  • Query results
  • Decrypted credentials
  • Network traffic content

Compliance Considerations

BYOC helps with compliance requirements:

RegulationHow BYOC Helps
GDPRData stays in your EU region
HIPAAPHI never leaves your BAA-covered account
SOC 2Your existing controls apply
PCI DSSCardholder data stays in your CDE
tip

For regulated industries, combine BYOC with PrivateLink connectivity to eliminate any public internet exposure.

Next Steps