What is an Air Gap?


As ransomware evolves from simple disruption to sophisticated, crippling extortion, the traditional "castle and moat" security strategies are increasingly finding themselves outmatched. When a threat actor is already inside the network, how do you ensure your most critical assets remain untouchable?

The answer lies in a concept as old as security itself: total isolation. This strategy is known as the air gap. It is the digital equivalent of a vault, a security measure that ensures a computer network, system, or storage device is physically and logically isolated from unsecured networks, including the public internet and local corporate LANs.

air_gap.png

Enhancing Data Protection with Air Gaps

What does “air gapping” mean?

At its core, as a data security practice, it defines a security state where a computer, network, or storage system is physically isolated from all other networks, particularly unsecured ones like the public internet or a local area network.
 

The term derives from the literal space of air that exists between the disconnected device and the rest of the digital world, signifying that data cannot cross between the two environments electronically.
 

This isolation encompasses the removal or disabling of potential bridges such as Wi-Fi cards, Bluetooth capability, and wired Ethernet connections, ensuring that the only way to move data in or out of the system is through transport media, such as a removable drive or secure tape, under strict human supervision.

Origins of the concept in cybersecurity

The strategy traces its lineage back to high-stakes military and government environments where the compromise of classified information could threaten national security.
 

Originally utilized to protect nuclear command and control systems, intelligence databases, and critical industrial infrastructure, the practice was designed to defend against espionage and sabotage during the Cold War era.
 

These early implementations established the protocol of maintaining distinct secure (often termed "red") and unsecure ("black") networks, ensuring that even if the outer perimeter was breached by an adversary, the core secrets remained physically unreachable and immune to remote hacking attempts.

Why air gapping remains relevant today

Despite the modern push for cloud integration and always-on connectivity, the relevance of air gapping has surged rather than diminished, primarily driven by the industrialization of ransomware and destructive cyber warfare.
 

Modern malware is designed to move laterally across networks, actively hunting for backups to encrypt or delete before triggering a ransom demand; however, an air-gapped environment neutralizes this threat vector entirely because the malicious code has no physical path to reach the isolated target.
 

Consequently, organizations across finance, healthcare, and critical infrastructure are increasingly returning to this disconnected approach to create an immutable last line of defense, ensuring that a "golden copy" of their information survives even a catastrophic, domain-wide compromise.

How Does an Air Gap Work?

An air gap operates on a principle of absolute disconnection. While standard network security relies on software filters, an air space relies on the physical absence of a transmission medium.

To achieve this, the protected system typically has its NICs removed or disabled. There are no Ethernet cables plugged in, no Wi-Fi antennas active, and no Bluetooth radios enabled. The system effectively becomes an island, invisible to the rest of the digital ocean.

Since the system cannot communicate via standard network protocols, information transfer relies on a manual method. To move data into the air-gapped environment, a user must physically copy files onto removable media and walk them over to the isolated machine. This process creates a mandatory human intervention point.

This manual workflow introduces a significant friction that acts as a security feature. Because there is no persistent connection, a hacker cannot execute a remote command shell, exfiltrate data in real-time, or laterally move from an infected workstation to the backup server. The only bridge across the gap is temporary, physical, and strictly controlled.

Types of Air Gap Configurations

Organizations implement air gapping through various architectural setups, ranging from simple disconnected devices to sophisticated enterprise vaults. These configurations are chosen based on the balance between security requirements and the need for operational accessibility.

  • Standalone isolated systems: This is the most basic configuration, consisting of a single computer or server that has absolutely no network interface connections. It is used primarily for highly sensitive tasks, such as root certificate authority management or classified document processing, where input and output occur strictly via inspected removable media.
     
  • Tape library vaulting: A traditional yet highly effective configuration where backup data is written to magnetic tape cartridges. Once the backup is complete, the tapes are ejected from the robotic library and transported to a secure, off-site storage facility, creating a literal gap between the data and the network.
     
  • Hardware data diodes: This configuration utilizes a specialized hardware device that enforces one-way information flow at the physical layer. Data can be sent into the high-security network (for example, to archive logs), but no signal can physically return to the source network, making it impossible for an attacker to send command-and-control signals back out.
     
  • Air-gapped backup appliances: These are purpose-built store appliances designed to remain offline by default. The system physically or logically connects to the production network only for the precise duration of a scheduled window, after which it immediately disconnects or powers down to minimize the attack surface.
     
  • Managed recovery vaults: In this setup, critical data is replicated to an isolated environment (often a clean room) that is completely segregated from the production directory and network services. This vault is managed by a separate set of credentials and administrators to prevent an attacker with stolen admin privileges from accessing the secure copies.

Benefits of Air Gapping

Implementing an air gap strategy provides the highest tier of defense for an organization's most critical assets. By physically detaching data from the network, businesses gain several strategic advantages that purely software-based solutions cannot replicate.

  • Protection from ransomware and malware: The primary benefit is its ability to stop the lateral movement of self-propagating malware; because there is no physical connection for the code to traverse, ransomware that encrypts the production network cannot reach or infect the copies, preserving a clean state for recovery.
  • Preventing unauthorized access: Air gapping effectively neutralizes remote hacking attempts and unauthorized intrusions because a threat actor cannot exploit vulnerabilities, brute-force passwords, or use compromised credentials to access a system that is invisible to the network and internet.
  • Ensuring integrity and compliance: Many regulatory frameworks (such as GDPR, HIPAA, and financial standards) require strict measures to guarantee data has not been tampered with; air gapping satisfies these rigorous compliance demands by ensuring that once data is archived in the isolated environment, it remains immutable and unaltered by external forces.
  • Disaster recovery and business continuity: An air-gapped backup serves as the ultimate "insurance policy" or "golden copy," ensuring that even in a worst-case scenario where the entire production environment is wiped out or locked down, the organization retains a recoverable set of information to resume business operations.

Challenges and Limitations of Air Gapping

While air gapping offers superior safety, it introduces significant operational friction and complexity that can hinder agility. The reliance on manual data transfers prevents real-time synchronization, meaning the separated data is always slightly outdated compared to the live production environment.

Furthermore, the isolation is not absolute; the necessary bridging using removable media like USB drives creates a vulnerability where malware can be manually ferried across the gap, as famously demonstrated by the Stuxnet worm, making rigorous decontamination and physical security protocols just as critical as the disconnection itself.

Logical vs Physical Air Gaps

While the traditional "true" air gap is physical, modern environments often employ logical isolation to achieve similar protective goals with greater agility.

A physical air gap is the "classic" approach where the system is completely disconnected from the infrastructure. There is no cabling, no Wi-Fi, and the hardware resides in a separate location or secured rack.

In contrast, a logical air gap relies on network segmentation and software controls to create isolation. The backup data may reside on the same network as the production environment, but it is logically invisible and inaccessible to standard users and applications. This is achieved using immutable store policies (WORM - Write Once, Read Many), distinct authentication domains, and zero-trust net configurations that reject all traffic except specific, authorized backup streams.

Air Gap Use Cases Across Industries

Air gap technologies are essential across high-stakes sectors where data compromise can have catastrophic physical or financial consequences. In the government and military sectors, physical air gaps are standard protocol for protecting top-secret intelligence and weapon control systems from foreign espionage.

Critical infrastructure operators, such as power plants and water treatment facilities, rely on air-gapped Industrial Control Systems (ICS) and SCADA networks to prevent attacks that could endanger public safety.

Meanwhile, financial institutions utilize isolated networks to secure SWIFT transaction terminals and core banking ledgers from fraud, and healthcare organizations increasingly adopt immutable, logically air-gapped backups to protect sensitive patient records from the growing threat of malware targeting hospital availability.

Best Practices for Implementing Air Gaps

Implementing an air gap is not a "set and forget" task; it requires rigorous discipline to remain effective against threats like ransomware.

  • Define strict access controls: Limit physical access to the air-gapped environment to a minimum number of vetted personnel and enforce a "two-person rule" for critical operations to prevent insider threats.
     
  • Sanitize removable media: Establish a mandatory scanning station to analyze all USB drives or external disks for malware before they are ever connected to the safe system.
     
  • Automate logical isolation: If using a logical air gap, ensure the store is immutable (WORM) and managed by a completely separate authentication system (e.g., not connected to the main corporate directory).
     
  • Regularly test turnaround: An air gap is useless if the data cannot be retrieved; schedule periodic drills to physically retrieve, mount, and restore data from the isolated environment to verify integrity and recovery times.

Air Gap vs Other Measures

While standard security tools are essential for daily defense, they operate on connected networks, whereas an air gap relies on total isolation.

  • Air gap vs firewalls and IDS: Firewalls and intrusion detection systems (IDS) filter traffic based on rules and signatures, but if a zero-day exploit bypasses these software filters, the network is exposed; an air gap, by contrast, physically prevents any traffic flow, rendering remote exploits impossible regardless of software vulnerabilities.
     
  • Air gap vs network segmentation: Network segmentation (using VLANs) limits lateral movement by dividing a net into smaller zones, but these zones remain in reality connected and potentially traversable via misconfigurations or credential theft; an air gap removes the connection entirely, offering a starker, physical boundary that logical segmentation cannot emulate.
     
  • Air gap vs cloud-based isolation: Cloud-based isolation (often called "immutable backup") creates a logical air gap by locking data against changes (WORM) within a connected environment; while highly effective for rapid malware recovery, it lacks the absolute disconnection of a physical air gap, which protects against platform-wide compromises or insider threats with administrative cloud access.

How OVHcloud Implements Air Gap Security Concepts

OVHcloud integrates the principles of isolation and immutability into its architecture to provide robust protection that mirrors traditional air gapping.

  • Data isolation and secure data backup solutions: OVHcloud’s cold archive solution leverages IBM tape library technology to store data offline for long-term retention; this provides a modern, automated equivalent of a physical air gap where data is written to tape and physically decoupled from the active disk ecosystem until retrieval is requested.
     
  • Anti-ransomware and disaster recovery readiness: By supporting object lock (WORM) on its S3-compatible Object Storage, OVHcloud allows users to create immutable backups that cannot be encrypted, modified, or deleted by malware or malicious actors for a set duration, effectively creating a logical air gap for immediate disaster turnaround.
     
  • OVHcloud compliance and sovereignty approach: OVHcloud ensures that data remains in reality and legally separated through its rigorous data sovereignty framework; data is stored in localized data centers (immune to extraterritorial laws like the US CLOUD Act for non-US customers) and protected by strict physical access controls, ensuring that the "gap" protects against both cyber threats and geopolitical risks.

OVHcloud and air gap security

While the concept of an air gap originated in strict physical isolation, modern cloud providers like OVHcloud have evolved these principles to meet the demands of a hyper-connected world and a distributed cloud. By combining dedicated hardware, immutable storage, and private networking,

Public Cloud Icon

Disaster Recovery as a Service (DRaaS)

To bridge the gap between offline security and online availability, OVHcloud partners with Zerto and Veeam to offer automated replication to a geographically separate, secure environment.

Public Cloud Icon

Backup and Object Storage

OVHcloud offers a tiered approach to isolation that includes both logical and physical options. The "Cold Archive" solution provides a genuine physical air gap by storing data on magnetic tapes in robotic libraries that are offline by default.

Public Cloud Icon

Network & Security Services

The vRack private network technology allows organizations to build their own isolated network segments that span the globe without ever traversing the public internet.

Public Cloud Icon

Private Cloud

For the highest level of sovereignty and isolation, OVHcloud’s Hosted Private Cloud provides a single-tenant, dedicated on-premise cloud platform that is, in a physical sense, separated from other customers.