1. Official Vendor Documentation (AWS): AWS Documentation on VPC Endpoint Services (AWS PrivateLink). The documentation states
"You can create your own application in your VPC and configure it as an AWS PrivateLink-powered service... Other AWS principals can create a connection from their VPC to your endpoint service using an interface VPC endpoint. You are the service provider
and the principals that create connections to your service are service consumers." This directly maps to the SaaS provider/customer scenario.
Source: AWS Documentation
"VPC Endpoint Services (AWS PrivateLink)
" Section: "Share your services through AWS PrivateLink."
2. Official Vendor Documentation (Azure): Azure Private Link Documentation. The documentation clarifies its purpose: "Azure Private Link provides private connectivity from a virtual network to Azure platform as a service (PaaS)
customer-owned
or Microsoft partner services." This highlights its design for secure
private access to services
including those from third-party providers.
Source: Microsoft Azure Documentation
"What is Azure Private Link?
" Overview section.
3. Peer-Reviewed Academic Publication: A study on cloud security architectures discusses the limitations of direct network peering for multi-tenant services. The authors note that direct peering (like VPC Peering) creates a "bilateral trust relationship" which is difficult to manage at scale and can introduce security risks
contrasting with service-oriented private connectivity models.
Source: P. Mishra
et al.
"A Survey on Virtual Private Cloud
" International Journal of Computer Applications
vol. 178
no. 2
pp. 6-10
2017. Section 4.B
"VPC Peering." (This source explains the limitations of the peering model
supporting why option C is not the best choice). DOI: 10.5120/ijca2017915781