Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementLogical Security

Air-gapped advantages in a non-air-gapped world

By Dan Ciruli
Cybersecurity image

Image via Unsplash

August 31, 2023

Cybersecurity has become a top priority across virtually every industry sector, public and private — especially in light of recent research that shows cyberattacks are viewed as the United States’ greatest threat. As these threats grow more prominent, so does the need to create secure environments to limit the exposure of sensitive data. One of the best ways to minimize exposure to such threats is to isolate data by deploying environments that have no, or limited, connection to the internet — also known as an “air-gapped” cluster. While there are a host of challenges organizations are forced to deal with when creating an air-gapped environment for cloud-native applications, through careful planning, leaders can create an effective air-gapped environment that will limit exposure to breaches.

While there are some technologies that can’t be air-gapped, there are many opportunities and benefits for the technologies that can. This piece will outline a few key considerations organizations should take when adopting an air-gap-first mindset, and why this is an approach that, no matter the industry, companies should consider implementing to ramp up their security culture.

Why an air-gapped-first approach can help – even when you don’t think air-gap applies

It is an exciting time in technology, and nearly every enterprise is looking to move to the cloud, modernize, and innovate faster. Ubiquitous access to the internet and mobile applications have spurred the creation of more and more connected apps. This means that more and more services are deployed on clusters that need to place calls out to the internet and accept calls from the internet. Not only that, but in the world of containerization and Kubernetes, it is extremely common for deployments to be dependent on things like container registries. All of these trends have made it more and more common for clusters to be ‘connected.’ However, our increasingly connected world has opened up a host of new threats and organizations need to first prioritize protecting their environment. Ransomware, for example, is one threat that teams need to prepare for ahead of time, but it’s just one of many. 

There are obvious use cases for air-gapping: sensitive government data, data that lives in remote locations that don’t have consistent internet access (i.e. a cruise ship or a car), financial systems to prevent fraud, among others. That said, even when it may not feel like it applies, taking an air-gapped approach can provide significant benefits. It will force security leaders to think about exactly what needs to be exposed to the internet, rather than assuming that everything should be. There are many ways to air-gap, and the type of air-gap approach a business should take is really dependent on its specific needs. 

Where are the needs on the spectrum of air-gappedness?

Depending on organizational needs, different levels of air-gapping can prove to be successful. Below is an overview on when different types of air-gapping may be relevant for an organization:

  • 100% air-gapped: there are many times when full air-gapping is appropriate, such as if there are no connections available due to remote locations or regulatory reasons. Most commonly, fully air-gapped environments are found in situations in which classified information is involved. This type of air-gapping is the best choice for sensitive information and environments that need to be completely secure.
  • Occasionally air-gapped: often used in moving vehicles, occasional air-gapping make sense for cases such as cars or ships. As these vehicles are often in motion or in remote locations, the ability to occasionally air-gap is vital to their success.
  • Logically air-gapped: hybrid solutions such as logically air-gapping is best when there is a physical connection, but protects network-connected digital assets through air-gapping. This can help to secure your software supply chain by ensuring that the cluster cannot fetch images from the internet, it can help protect from intrusion by locking down ports and paths not necessary
  • Partially air-gapped: many companies can benefit from partially air-gapped infrastructures — one that provides the security of air-gapping while still exposing certain ports or paths for communication purposes. What’s key here is that this exposure is only by exception and therefore very controlled. This can allow information to still be reasonably accessible to the broader team, while still maintaining a level of security that protects this data.

Why security leaders should rethink their architecture to minimize security vulnerabilities

Any business that has big data centers is at risk because their entire organizations are exposed to cyber threats. Additionally, in an environment with a tremendous amount of complexity and growth, there are a plethora of new areas to protect. Taking security risks into account prior to creating an infrastructure is always best practice, but even established companies can take a step back and identify new ways that they can revamp their architecture to be even more secure. By first identifying what can be air-gapped or even intermittently air-gapped, businesses will be in a much better and secure position to protect their data. 

As teams continue to face new security threats, an air-gapped mindset can help approach the challenge of overcoming them and ultimately create a more secure environment. Whether an organization implements air-gapped or intermittent air-gapped measures is up to their infrastructure needs, the type of data they’re protecting, and ultimately what is feasible for and aligned with their business goals. 

KEYWORDS: cloud security cloud-based security data data breach data center security financial security fraud prevention ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dan Ciruli is the VP of Product at D2iQ. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • airport1-900px.jpg

    Study Reveals What Air Travelers will Tolerate for Non-Discriminatory Security Screening

    See More
  • First Air Cargo Security Summit a Success

    See More
  • Air Cargo Security Still a Challenge; Complex with Industry Fragmented

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing