Customer-Managed AWS Deployment

Run FormKiQ entirely inside your own AWS account — your keys, your policies, your boundaries.

Deploy FormKiQ with full customer control over IAM, KMS, networking, region selection, and audit posture.

When sovereignty, audit, or internal policy requires that no third party can access production infrastructure, customer-managed deployment is the right model. FormKiQ is deployed via CloudFormation into an AWS account you own and operate. FormKiQ teams have no access unless you explicitly grant it.

What "customer-managed" means in practice

  • Encryption: Customer-managed KMS keys. No FormKiQ key material ownership.
  • IAM: Policies and roles are defined and governed by your security team.
  • Networking: Deploy in your VPC with private endpoints and egress controls.
  • Region selection: Deploy per region for multi-jurisdiction architecture.
  • Audit: CloudTrail, CloudWatch, and FormKiQ event trails support exportable evidence.

Comparison: Deployment Models

Customer-ManagedVendor-ManagedHybrid
Data in your AWS accountYesSegregated accountProduction only
FormKiQ team accessNone unless grantedOperational accessNon-production only
Your team manages infrastructureFullNoProduction

When to choose customer-managed

  • Policies prohibit vendor access to production data.
  • Regulated sectors require strict sovereignty boundaries.
  • Cross-border transfer restrictions require jurisdictional control.
  • Security teams must own IAM and encryption posture end-to-end.

Getting started

Deploy with CloudFormation in minutes. FormKiQ can support architecture reviews and onboarding in non-production while your team owns production operations.

Book a Call