What is Air Gap?

What is Air Gap?

What is Air Gap? Jonathan Poland

An air gap is a computer network that is physically isolated from other networks, including the internet. This isolation is designed to protect the network and the sensitive data it contains from external threats and vulnerabilities. Air gaps are commonly used in a variety of contexts to enhance information security, including in military systems, medical devices, secure facilities such as prisons, and critical infrastructure such as nuclear power plants.

For example, a military system might use an air gap to protect sensitive information from being accessed by external parties, such as foreign governments or cybercriminals. Similarly, a hospital might use an air gap to protect patient data and ensure the integrity and reliability of its medical devices. In these cases, the air gap helps to reduce the risk of information security breaches and ensure that the systems and data are protected from external threats.

Basically, air gaps are a basic and effective approach to protecting systems and information from external threats. By physically isolating networks from other networks, organizations can reduce the risk of information security breaches and protect sensitive data from external vulnerabilities. The following are illustrative examples of an air gap.

Standalone System

An air gap can be implemented as a standalone system with no networking capabilities whatsoever. For example, a medical device that contains a microcontroller but has no interface to connect to the outside world.

Offline Storage

Data storage devices that are only connected to computers that are offline. For example, a professional musician with a vault of unreleased material that is stored on encrypted data storage devices in a recording studio. Such devices are only connected to musical instruments and computing devices that have no connection to the internet or outside networks.

Stand-alone Network

A network that connects local devices without any physical way to connect to the internet or unsecured networks. For example, the human resources team of a small regional bank want to restrict confidential employee data to three machines that have no outside network connection. The three machines are networked together and attached to various data storage devices. The machines in the network and attached devices have no wireless networking capabilities and are not connected by wire to the internet or the office’s local area network.

Large Networks

An air gap network isn’t necessarily contained to one site and can be geographically distributed at a global, regional, city or campus scale. For example, a globally distributed control system for a pipeline that is completely isolated from unsecured networks. Large air gap networks are often challenging to physically secure. For example, wireless or wired communications running great distances may be intercepted or manipulated.

Physical Security

A hydroelectric dam maintains control systems that aren’t networked to the outside world. These systems are physically secured in a management office that can only be accessed by authorized individuals with a variety of security measures in place such as an access control system and security system.

Segregation Of Duties

A hedge fund is developing financial trading algorithms in a small room with no network connections out and advanced physical security measures such as a mantrap. They often use segregation of duties to ensure that no one person can remove or bring in data to the room. For example, any updates to the system involve multiple trusted people that have different roles such that no single person could install a malicious file.

Signal Blocking

A nuclear power station is completely unconnected to any networks. Efforts are made to block wireless networking signals in sensitive areas of the facility.

Hardware Validation

Modern hardware may contain networking capabilities that is not well documented. This may be done to implement functionality such as remote support or software updates. Alternatively, networking capabilities may be built into things for malicious purposes. As such, implementing a secure air gap network requires carefully reviewing any hardware that comes into contact with the system including external storage devices and peripherals such as a keyboard.

Updates

Air gap networks can only be updated by connecting outside data storage devices. This is a high risk operation and is a common way for air gapped systems to be compromised. Updates to air gap networks require a secure end-to-end procedure that includes a chain of trust for the files you are using and segregation of duties that ensure no single person can add malicious files. The security of updates are also completely reliant on the integrity of the data storage hardware used.

Backups

Air gap networks are commonly backed up locally on the air gap network itself. Implementation of secure offsite backups requires a process with all the same elements as an update process including hardware validation, chain of trust and segregation of duties. Physical security for data leaving a facility is also an important consideration.

Learn More
Relational Capital Jonathan Poland

Relational Capital

Relational capital refers to the value that a company derives from its relationships with stakeholders, such as customers, employees, suppliers,…

Agile Change Management Jonathan Poland

Agile Change Management

Agile change management is the practice of leading continuous delivery processes in which changes are shipped within weeks. This approach…

Product Durability Jonathan Poland

Product Durability

A durable product, often referred to as a durable good, is a product that does not quickly wear out or,…

Deal Desk Jonathan Poland

Deal Desk

A deal desk is a team that is responsible for managing the sales proposal, negotiation, and contract process with customers.…

Business Cluster Jonathan Poland

Business Cluster

A business cluster is a geographic region that is home to a concentration of companies in a particular industry, and…

Risk Acceptance Jonathan Poland

Risk Acceptance

Risk acceptance involves consciously deciding to take on a risk, often because the potential reward outweighs the potential negative consequences…

Schedule Risk Jonathan Poland

Schedule Risk

Schedule risk refers to the risk that a strategy, project, or task will take longer than expected to complete. A…

Economic Relations Jonathan Poland

Economic Relations

Economic relations between nations refer to the economic interactions that occur between them. These interactions can include the exchange of…

Message Framing Jonathan Poland

Message Framing

Message framing is the way in which information and communications are constructed and presented. The way a message is framed…

Content Database

Search over 1,000 posts on topics across
business, finance, and capital markets.

Ai Websites (Q3 2023) Jonathan Poland

Ai Websites (Q3 2023)

A simple resource dump of Ai websites we found during Q3 2023. Human AI Ethical, transparent, and beneficial AI development…

Digital Channels Jonathan Poland

Digital Channels

A digital channel is a means of distributing or selling products or services electronically, as opposed to through physical channels…

Examples of Strategy Jonathan Poland

Examples of Strategy

A strategy is a long-term plan that an organization or individual develops to achieve a specific goal in a competitive…

Inventory 150 150 Jonathan Poland

Inventory

Understanding inventory is crucial for the successful operation of many businesses. Inventory is a broad area with many facets, and…

Overchoice Jonathan Poland

Overchoice

Overchoice, also known as the “paradox of choice,” is a phenomenon in which having too many options or choices can…

The Power of Compound Interest Jonathan Poland

The Power of Compound Interest

Traditional finance will explain compound interest as the interest paid on a loan or deposit calculated based on both the…

What is an Economic Bad? Jonathan Poland

What is an Economic Bad?

An economic bad refers to a negative outcome or impact that results from business activity and consumption. This is in…

What is Progress? Jonathan Poland

What is Progress?

Progress is the advancement of positive and lasting change that has a significant impact. It can be challenging to determine…

Customer Experience 101 Jonathan Poland

Customer Experience 101

Customer experience (CX) refers to the overall experience that a customer has with a company or brand, from their initial…