Air gapping, or creating an air gap, refers to the physical isolation of computer systems or networks so they can’t physically connect to other computer systems or networks.
Air gaps are typically used by organizations to prevent malicious actors, such as hackers, viruses or natural disasters from causing irreparable harm to digital assets. Many air gap backups help protect highly classified information, including military secrets, financial data and systems that control critical pieces of infrastructure like water storage, nuclear power and aviation.
Air gap backups are a data storage tactic that’s typically used in disaster recovery (DR) to help organizations prevent data loss and business disruption during a catastrophic event. In an air gap backup, critical information is copied and stored on a system or air gapped network not easily accessible over the internet, but where an organization can access it once the threat has passed.
Air gapping refers to the physical separation of computers and networks, while air-gapped networks are networks that have been isolated from all external networks, including cloud and wifi. Air-gapped networks are disconnected from the internet and provide a strong layer of protection from a broad range of cybersecurity threats.
Air gapping helps protect organizations from financially crippling ransomware attacks, where data is held hostage by someone with unauthorized access until an organization agrees to pay. This year, Verizon reported that ransomware attacks remained a top threat across 92% of industries.1 And they're expensive: According to the Cost of a Data Breach Report, the global average cost of a data breach in 2024 was USD 4.8 million, a 10% increase over last year and the highest total ever.
Ransomware attacks occur when hackers breach a system with malware, copying sensitive information and restricting physical access to authorized users. Some hackers have demanded double and even triple extortion fees to restore access to sensitive information. In some cases, when stolen data is sensitive, hackers have threatened to leak it to increase the victims’ incentive to pay.
While air gapping can’t stop all ransomware attacks and data breaches, it can help lessen their impact, especially when combined with other network security measures and disaster recovery tactics designed to prevent the stealing of sensitive data.
Air gapping plays a critical role in many disaster recovery (DR) plans, helping organizations create reliable, offsite backups to help them recover from a disruptive event. Like cloud storage, air gap backups provide redundancy, the duplication of critical systems and data that can’t be altered or deleted without permission.
When used as part of a comprehensive DR approach, air gapping is a strong data protection tool, helping keep organizations safe from cyberattacks, efforts to steal, expose, alter, disable or destroy data or digital devices. Air-gapped systems provide a vital layer of defense in addition to firewalls, safeguarding data from human error and the vulnerabilities of untrusted networks.
Air gapping a computer or network involves three fundamental steps: isolation, restriction and data flow. Here’s a closer look at each one.
To control access to a computer or network, the first step is to physically isolate it from others. Critical data and systems need to be physically separate to be secure, but they don’t necessarily need to be in another location. Some organizations keep air-gapped backups in secure locations in the same building as non-air-gapped computers. Others prefer to keep them offsite, in another location, such as a different company office or data center.
Air gapping a computer or network means severely limiting or cutting off altogether its connectivity to other computers and networks. Air-gapped networks, for example, typically have a limited number of access points that are kept restricted to a few authorized users. By reducing the number of access points, organizations can make it less likely that a bad actor will gain access.
Controlling data flow is critical to air gapping computers and networks. In a secure network, data is only allowed to flow in one direction, a concept known as unidirectional data flow. Unidirectional data flow on an air-gapped system means that data is only ever added to the air-gapped system, never copied or removed. This is key to maintaining the integrity of air-gapped backups and ensuring data transfer remains safe.
There are 3 types of air gapping that are widely practiced: physical, logical and cloud air gapping.
Physical air gaps provide the highest level of security because they physically disconnect a system or network from all threats. However, they require a significant amount of effort to update and restore because they are so isolated. Logical and cloud-based air gaps are more practical in terms of keeping software and hardware up to date but offer less robust security. Here’s a closer look at the strengths and weaknesses of each type of air gapping.
A physical air gap places a physical barrier between a device and any other system or network. To accomplish this, storage volumes that are physically air-gapped are completely removed from any systems they're associated with, and their network connections are severed. Physical air gapping is used across a wide range of removable media, including hard disks, tapes, drives and other backup devices.
Logical air gaps are software partitions and network segmentation used to create a type of virtual storage. While logical air gapping is less secure because it is still done on systems and networks that remain interconnected, it is far more practical to a physical air-gapped backup and can still provide many of the same benefits.
Like logical air gapping, cloud air gapping involves sending backup data to a virtual location in the cloud, usually through a backup service provider. This is a common practice, and many tech companies like Apple, Microsoft and Google offer cloud backup services to their users. Cloud backups offer offsite storage; however, customers are required to align with the service rules offered by the provider.
Air gapping and air gap backups provide several valuable benefits to organizations. Here are some of the most important:
Despite its many strengths, air gapping has vulnerabilities that organizations need to be aware of when they’re considering it as a security measure. Here are some of the most common:
Many government agencies use air gapping as a way to maintain the confidentiality of a wide range of information. From the real identities of confidential sources to state secrets and sensitive information about defense systems, air gapping provides a highly secure method of keeping information safe and controlling who has access to it.
Financial institutions guard the transaction histories, passwords and personally identifiable information (PIN) of millions of customers and organizations. Retail and investment banks, stock exchanges, hedge funds and other kinds of financial institutions deploy air gapping to keep customer and business records safe from unauthorized access, data breaches and fraudulent activities.
Hospitals, insurers and other organizations in the healthcare field rely on air gapping to secure their patients’ confidential records, protect research data and keep medical facilities safe. Also, air gapping in the healthcare field helps ensure compliance with complex regulations like the Health Insurance Portability and Accountability Act (HIPAA) and others by protecting records from someone trying to gain unauthorized access.
Critical infrastructure, such as power plants, bridges, air traffic control, water sources and others, relies on air gapping to keep their industrial control systems and confidential data safe. By keeping their most sensitive data on air-gapped networks, organizations operating critical infrastructure prevent unauthorized access that might cause disruptions to vital services like transportation, power, emergency response and more.
Organizations conducting critical research into areas as far-ranging as aerospace, pharmaceutical and scientific advancement use air gapping to protect the data they rely on most. Depending on the industry, these air-gapped systems provide a critical line of defense against the stealing of industrial secrets and the compromising of valuable innovations.
All links reside outside ibm.com
1 Verizon Data Breach Investigations Report, Summary of Findings, Verizon Business, 2024
2 An unprecedented look at Stuxnet, Wired, 3 November 2014
Explore the essentials of data security and understand how to protect your organization’s most valuable asset—data. Learn about the different types, tools and strategies that will help safeguard sensitive information from emerging cyberthreats.
This on-demand webinar will guide you through best practices for increasing security, improving efficiency and ensuring data recovery with an integrated solution designed to minimize risk and downtime. Don’t miss insights from industry experts.
Learn how to overcome your data challenges with high-performance file and object storage, designed to enhance AI, machine learning and analytics processes while ensuring data security and scalability.
Learn about the types of flash memory and storage and explore how businesses are using flash technology to enhance efficiency, reduce latency and future-proof their data storage infrastructure.
IBM Storage DS8000 is the fastest, most reliable and secure storage system for IBM zSystems and IBM Power servers.
IBM Storage is a family of data storage hardware, software defined storage, and storage management software.
IBM provides proactive support for web servers and data center infrastructure to reduce downtime and improve IT availability.
IBM web domains
ibm.com, ibm.org, ibm-zcouncil.com, insights-on-business.com, jazz.net, mobilebusinessinsights.com, promontory.com, proveit.com, ptech.org, s81c.com, securityintelligence.com, skillsbuild.org, softlayer.com, storagecommunity.org, think-exchange.com, thoughtsoncloud.com, alphaevents.webcasts.com, ibm-cloud.github.io, ibmbigdatahub.com, bluemix.net, mybluemix.net, ibm.net, ibmcloud.com, galasa.dev, blueworkslive.com, swiss-quantum.ch, blueworkslive.com, cloudant.com, ibm.ie, ibm.fr, ibm.com.br, ibm.co, ibm.ca, community.watsonanalytics.com, datapower.com, skills.yourlearning.ibm.com, bluewolf.com, carbondesignsystem.com