Associated Doc

Are My Resources and Data Isolated Between Organizations?

Updated on 13 April, 2026

Understand how Vultr isolates resources and data between organizations. Each organization maintains separate infrastructure, billing, and access boundaries.


Yes. Vultr IAM enforces strict tenant isolation at the organization boundary. Each organization is a completely separate context. Resources, users, roles, groups, and permission policies in one organization are not accessible from another organization, regardless of whether the same user is a member of both. In practice, this means:

  • No cross-org resource visibility — a user who belongs to multiple organizations cannot interact with resources from one organization while operating in another. Resources are always scoped to the organization in which they were created.
  • One org context at a time — when using the Vultr Console, you always operate within a single active organization. Any actions you take (managing users, assigning policies, deploying resources) apply only within the organization you are currently switched into.
  • Explicit switching required — moving between organizations is always a deliberate action. There is no automatic or implicit context switching that could cause you to accidentally perform actions in the wrong organization.
  • Enforced isolation — tenant boundaries are enforced at the platform level, not just the Console level. This means cross-org access is prevented regardless of whether you are using the Vultr Console or the API.