{"id":516105,"date":"2024-06-05T11:30:02","date_gmt":"2024-06-05T15:30:02","guid":{"rendered":"https:\/\/www.commvault.com\/?post_type=cmv_glossary&p=516105"},"modified":"2024-08-09T12:14:36","modified_gmt":"2024-08-09T16:14:36","slug":"air-gap-backup","status":"publish","type":"cmv_glossary","link":"https:\/\/www.commvault.com\/glossary-library\/air-gap-backup","title":{"rendered":"Air Gap Backup"},"content":{"rendered":"\n
Air gap backup refers to a backup system that is physically isolated from the main computer or network, creating a “gap” between the two systems. This separation ensures that the backup data is not accessible to hackers or malware that may have infected the primary system. <\/p>\n\n\n\n
The air gap backup system is typically implemented by storing the backup data on a separate physical device, such as an external hard drive or a tape drive and disconnecting that device from the network or computer after the backup is completed. This physical separation ensures that the backup data is not vulnerable to cyber-attacks, such as ransomware, which can infect and encrypt data on connected systems. <\/p>\n\n\n\n
Air gap backup is often used by organizations with high-security requirements, such as government agencies, financial institutions, and healthcare providers. It provides an additional layer of protection against data loss or theft and is considered a best practice for data backup and disaster recovery planning.<\/p>\n\n\n\n
Air gap backup and networking are generally not compatible, as air gap backup involves physically isolating the backup system from the network or computer it is backing up. The purpose of this isolation is to prevent any communication between the two systems and ensure that the backup data is not vulnerable to cyber-attacks that may target the primary network or computer. <\/p>\n\n\n\n
However, in some cases, air gap backup systems may be connected to a network for the purpose of transferring data between the backup system and the primary system. In these cases, strict security measures must be implemented to ensure that the backup system remains isolated from the network and is not vulnerable to cyber threats. <\/p>\n\n\n\n
One way to achieve this is by using a dedicated network that is physically separate from the primary network, such as a local area network (LAN) or wide area network (WAN). This dedicated network can be used exclusively for transferring data between the backup system and the primary system and can be secured using encryption and other security protocols to prevent unauthorized access. <\/p>\n\n\n\n
Another approach is to use specialized hardware or software that creates a virtual air gap between the backup system and the primary system, even if they are physically connected to the same network. This can be achieved using network segmentation, firewalls, and other security measures that limit the communication between the two systems to only what is necessary for data transfer. <\/p>\n\n\n\n
+———————-+ +———————–+ <\/p>\n\n\n\n
| Primary Network | | Backup System | <\/p>\n\n\n\n
| | | | <\/p>\n\n\n\n
| +————-+ | | +—————+ | <\/p>\n\n\n\n
| | | | | | | | <\/p>\n\n\n\n
| | Firewall +———–+ Backup Device | | <\/p>\n\n\n\n
| | | | | | | | <\/p>\n\n\n\n
| +————-+ | | +—————+ | <\/p>\n\n\n\n
| | | | <\/p>\n\n\n\n
+———————-+ +———————–+ <\/p>\n\n\n\n
In this diagram, the primary network and backup system are connected by a dedicated network interface or through a direct connection. A firewall is used to enforce strict access controls, allowing only the necessary traffic between the primary network and the backup device. <\/p>\n\n\n\n
The backup device, such as an external hard drive or tape drive, is physically separated from the primary network when not in use, creating an air gap. The backup device is only connected to the primary network when data needs to be backed up or restored. <\/p>\n\n\n\n
This configuration ensures that the backup device is isolated from the primary network, protecting it from cyber-attacks such as malware and ransomware. The use of a firewall adds an additional layer of protection by controlling the flow of traffic between the primary network and the backup device. <\/p>\n\n\n\n
An air-gapped system or computer is one that is physically isolated from other networks and systems, including the internet. This isolation is achieved by disconnecting the system or computer from any external connections, such as ethernet cables or Wi-Fi, and by disabling any wireless or Bluetooth connectivity. <\/p>\n\n\n\n
The purpose of an air-gapped system or computer is to provide an extra layer of security and prevent unauthorized access or data exfiltration. This makes air-gapped systems particularly useful in situations where sensitive or confidential data is being handled, such as in military operations, financial institutions, and research labs. <\/p>\n\n\n\n
However, air-gapped systems can be difficult to maintain and manage, as they require physical access to transfer data to and from the system. This can make it challenging to keep the system up to date with software patches and updates, and to back up data on a regular basis. <\/p>\n\n\n\n
In addition, while air gapping can provide a high degree of security, it is not foolproof. Cyber attackers have developed creative methods for breaching air-gapped systems, such as using malware on removable storage devices or exploiting vulnerabilities in the firmware of the system. <\/p>\n\n\n\n
As such, it is important to use other security measures in conjunction with air gapping, such as strong access controls, encryption, and continuous monitoring of system activity, to ensure the security of sensitive or confidential data. <\/p>\n\n\n\n