← Back to Blog

Air-Gapped Security and Offline Workflows

By Necron Team

Why air-gapped security still matters

Air-gapping is one of the few controls that changes the attack surface by construction: if a system has no routable path to adversary infrastructure, remote exploitation drops from "likely" to "requires physical or supply-chain access."

But "air-gapped" is not a checkbox. Most failures are operational: the gap gets bridged informally (shared USB sticks, ad-hoc updates, or "just this once" file transfers).


Air gap threat model (the part people skip)
Air-gapped workflows are excellent against:

  • Mass ransomware propagation and lateral movement
  • Credential stuffing → cloud takeover → bulk exfiltration
  • Opportunistic remote exploitation of exposed services

Air-gapped workflows are not a silver bullet against:

  • Insider access (malicious or careless)
  • Removable media as the infection vector
  • Supply-chain compromise of tools/firmware
  • Coercion (border / "compelled unlock" scenarios)

So the goal is simple: make the only bridge across the gap controlled, auditable, and integrity-verified.


Hard air gap vs "controlled connectivity"

In practice you'll see two architectures:


1) Hard air gap (recommended for highest assurance)
Secure workstation has no network interface enabled/connected. Transfer only via controlled removable media.


2) Controlled connectivity ("soft air gap")
A dedicated isolated network segment, often one-way (data diode) or with strict allowlists. Useful when you must ingest telemetry/artifacts frequently.

If you're building a process for sensitive documents, keys, or long-term archives, hard air gap is usually easier to get right.


The 3-zone model: A (online) → B (quarantine) → C (air-gapped)

A robust offline workflow uses three zones:


Zone A: Online / collaboration environment
Email, cloud sync, ticketing, vendor portals. Highest exposure, lowest trust.


Zone B: Transfer + quarantine environment
A dedicated "buffer" machine. Malware scanning, file normalization, hashing, signature verification. Packaging (e.g., read-only media creation, encrypted containers).


Zone C: Air-gapped secure environment
Offline workstation(s). Keys and high-value data live here. Strict import/export rules.

Most air gaps fail because A talks directly to C. Don't do that. Force everything through B.


Your transfer medium is your "network cable"

Removable media is the bridge. Treat it like an untrusted network interface.


Minimum controls:

  • Dedicated media for transfers (don't reuse personal sticks)
  • Strong authentication and lockout on encrypted media
  • Clear directionality rules (inbound vs outbound media)
  • Inventory + chain-of-custody for high-sensitivity workflows

Better controls:

  • Separate inbound-only and outbound-only media sets
  • Write-protect (where feasible)
  • Re-image/reformat schedule and retirement policy

Integrity is as important as confidentiality

Air-gapped systems often get confidentiality right (encryption) and integrity wrong ("did we import the right thing?").

You want two integrity layers:


1) Cryptographic checksums
Compute SHA-256 in Zone A. Transfer hash manifest + payload through Zone B. Verify in Zone C before use.


2) Signed artifacts for software/tools
Prefer vendor signatures (or reproducible builds where realistic). Verify signatures in Zone B and again in Zone C.

This is non-negotiable for offline update pipelines.


Offline encryption architecture: keys separate from storage

For offline workflows, the cleanest pattern is separation of duties:

  • Encrypted data stored in ordinary folders (local disk, external drive, even cloud-synced folders)
  • Key material kept on dedicated hardware and presented only when needed

This model also composes well with mirrored storage: you can replicate ciphertext to multiple locations while keeping keys off those locations. In a vault-style design, the app can present an in-app "vault view" without mounting an OS drive, and avoid persisting plaintext to disk during browsing.


Practical implication: Your "air-gapped vault" can be the offline workstation + key hardware. The ciphertext can still live on removable drives or sync folders without granting those media any ability to decrypt.


Handling "open for edit" without leaking plaintext everywhere

A hard constraint: third-party editors need a real filesystem path. You cannot "edit in memory" with arbitrary desktop apps.

So the correct workflow is:

  1. Decrypt into an app-private temp working directory
  2. Open the file in its default app
  3. Watch for safe-save patterns
  4. Re-encrypt on each save
  5. Cleanup on close/crash recovery

(If you support this, document the unavoidable reality: external apps may create their own caches/scratch files.)


Updates for air-gapped environments: a disciplined pipeline

Air-gapped systems still need patching. The risk is that the update mechanism becomes the compromise mechanism.


Recommended:

  • Updates are downloaded in Zone A
  • Verified and staged in Zone B (signature check, hash manifest)
  • Imported into Zone C on a defined cadence (e.g., monthly)

Avoid:

  • "Let's quickly plug in Ethernet to patch"
  • Installing tools from random USB drives
  • Running unsigned binaries "just to check"

Common failure modes (and how to avoid them)
  • One USB drive used everywhere → make media sets role-specific.
  • No hash/signature verification → enforce "verify before execute/open."
  • Ad-hoc exceptions → exceptions become the norm; require approvals.
  • No inventory → you can't prove control or respond to incidents.
  • No rehearsal → test restoration and import procedures quarterly.

FAQs
Is an air-gapped computer automatically secure?
No. It reduces remote attack surface, but removable media and supply-chain risks become dominant.


What's the safest way to move files into an air-gapped environment?
Use a quarantine station and verify hashes/signatures before import.


Do I still need encryption if the system is air-gapped?
Yes—especially for lost/stolen media and long-term archives.


Can I use cloud storage with an air-gapped workflow?
Yes, if the cloud only ever sees ciphertext and the keys remain offline/hardware-bound.

Ready to encrypt your files locally before they reach the cloud?

Get Started with Necron Vault Manager →