ISSN :3049-2335

Security Challenges of LLM Integration in Multi-Tenant SaaS: Threats, Vulnerabilities, and Mitigations

Review Article (Published On: 27-Apr-2026 )
DOI : https://dx.doi.org/10.54364/cybersecurityjournal.2026.3121

Nazarii Romankiv and Dmitro Sytnikov

Adv. Knowl. Based Syst. Data Sci. Cybersecur., 3 (1):443-465

Nazarii Romankiv : NURE

Dmitro Sytnikov : Kharkiv National University of Radio Electronics

Download PDF Here

DOI: https://dx.doi.org/10.54364/cybersecurityjournal.2026.3121

Article History: Received on: 11-Jan-26, Accepted on: 01-Apr-26, Published on: 27-Apr-26

Corresponding Author: Nazarii Romankiv

Email: ayzrian@gmail.com

Citation: Nazarii Romankiv (2026). Security Challenges of LLM Integration in Multi-Tenant SaaS: Threats, Vulnerabilities, and Mitigations. Adv. Know. Base. Syst. Data Sci. Cyber., 3 (1 ):443-465


s

Abstract

    

The rapid pace of Large Language Model (LLM) adoption and incorporation into existing multi-tenant SaaS suites brings new security risks that challenges application security paradigms. RAG, AI agents with tool access, and newly articulated patterns for context orchestration all provide attack surfaces specific to GenAI systems. Multi-tenancy creates a further layer of risk through cross-tenant data leakage, shared inference infrastructure, and the difficulty in enforcing tenant isolation when AI models are processing chunks of tokens from multiple tenants in the same infrastructure. In this work, we surfed a wave of content created by AI researchers and researchers studying AI, such as OWASP Top~10 for LLM Applications (2025), NIST AI~600-1, and other more recent academic sources to get the lay of the land regarding security threats residing specifically in multi-tenant SaaS setups with LLM integration hung off the side. We derive a taxonomy of threats categorized by five classes of attack surface vulnerability, and map each threat to specific defenses in a defense-in-depth style framework. The analysis is rooted in real-world SaaS architectures like Context Orchestration Layers (COL), RAG pipelines, and Model Context Protocol (MCP). We prove that 12 out of the 18 discovered vulnerabilities experience greater amplification from multi-tenancy than single-tenant deployments. Cross-tenant data exfiltration and knowledge base poisoning had the highest amplification factors. Defending LLMs in SaaS requires a composite approach to safeguarding input, enforcing tenant isolation, sanitizing output, hardening the supply chain, and monitoring over time. We provide a mitigation matrix tying all our discovered threats to specific defenses, along with guidance for SaaS architects on implementing them.


Statistics

   Article View: 9
   PDF Downloaded: 2