Explainedback-iconCybersecurity 101back-iconWhat is an Air gap?

What is an Air gap?

An air gap is a security measure where a device, network, or system is physically isolated from unsecured networks, including the public internet, to reduce the risk of unauthorized access or cyberattacks.

Air-gapped environments are commonly used in critical infrastructure, government systems, military networks, industrial control systems, and highly sensitive enterprise operations. Because these systems are disconnected from external networks, attackers generally have fewer remote access opportunities.

However, an air gap does not make a system completely immune to compromise. Insider threats, removable media, supply chain attacks, and misconfigurations can still introduce security risks.

How do air-gapped systems work?

Air-gapped systems are intentionally separated from external communication channels. In many cases, they operate on isolated internal networks with restricted physical and logical access controls.

Organizations may implement air gaps by:

  • Physically disconnecting systems from the internet
  • Using separate network infrastructure
  • Restricting wireless connectivity
  • Limiting external device access
  • Controlling data transfer methods

For example, some industrial environments transfer files into isolated systems using tightly controlled removable storage devices rather than network-based communication.

Types of air gaps

Type  Description 
Physical air gap  Complete physical separation from external networks and internet-connected systems 
Isolated network environment  Systems operate within dedicated internal networks with tightly controlled external communication 
Controlled transfer environment  Data movement between isolated and connected systems occurs through manual, policy-governed methods 
One-way transfer systems  Specialized technologies that permit one-way data flow to support isolated environments 

Physical air gaps generally provide stronger isolation than network segmentation or restricted connectivity alone. However, operational controls and secure data transfer procedures remain important in all isolated environments.

Why do organizations use air gaps?

Air gaps are primarily used to reduce exposure to external threats and limit attack pathways into sensitive environments.

Common use cases include:

  • Critical infrastructure protection
  • Industrial control and SCADA systems
  • Classified government networks
  • Secure research environments
  • Backup and recovery infrastructure

Additionally, air-gapped backup systems are sometimes used to help reduce ransomware recovery risks by isolating backup data from production environments.

Limitations of air-gapped security

Although air gaps can reduce remote attack exposure, they may introduce operational and management challenges.

Potential limitations include:

  • Slower software updates and patching
  • Complex data transfer workflows
  • Increased operational overhead
  • Limited remote administration capabilities
  • Risks from insider threats or infected removable media

As a result, organizations often combine air gaps with additional security controls such as access management, monitoring, endpoint protection, and strict operational procedures.

How Hexnode can support isolated environments?

Hexnode support broader endpoint management and device control strategies in restricted or controlled environments.

Organizations may use Hexnode to:

  • Enforce device compliance policies
  • Restrict unauthorized applications
  • Manage peripheral and device usage policies
  • Improve visibility into managed endpoints
  • Configure security restrictions on supported devices

Additionally, Hexnode can help IT teams apply policies, generate device reports, and monitor compliance across managed devices.

FAQs

The purpose of an air gap is to isolate systems from unsecured networks and reduce the risk of unauthorized remote access or cyberattacks.

No. Air-gapped systems can still face risks from insider threats, infected removable media, supply chain compromises, or operational misconfigurations.

An air gap involves strong isolation, often through physical separation, while network segmentation separates systems within connected environments using logical controls.

In some cases, yes. Malware can potentially reach isolated systems through removable media, compromised updates, or insider activity.