Air-Gapped

Master this essential documentation concept

Quick Definition

A security measure in which a computer or network is physically isolated from unsecured networks, including the public internet, ensuring no unauthorized data can enter or leave the environment.

How Air-Gapped Works

Understanding Air-Gapped

A security measure in which a computer or network is physically isolated from unsecured networks, including the public internet, ensuring no unauthorized data can enter or leave the environment.

Key Features

  • Centralized information management
  • Improved documentation workflows
  • Better team collaboration
  • Enhanced user experience

Benefits for Documentation Teams

  • Reduces repetitive documentation tasks
  • Improves content consistency
  • Enables better content reuse
  • Streamlines review processes

See how Docsie helps with air-gapped documentation

Looking for a better way to handle air-gapped in your organization? Docsie's Air-Gapped Documentation solution helps teams streamline their workflows and improve documentation quality.

Real-World Documentation Use Cases

Documenting Secure Software Deployment Pipelines for Nuclear Facility Control Systems

Problem

Engineering teams at nuclear facilities must deploy software updates to reactor control systems that live on air-gapped networks, but lack standardized documentation for the manual transfer process, leading to inconsistent procedures, missed verification steps, and potential regulatory non-compliance with NRC requirements.

Solution

Air-gapped deployment documentation formalizes every physical step of the transfer chain — from cryptographic hash verification on the internet-connected build server, through the data diode or write-once media transfer, to installation confirmation on the isolated control system — creating an auditable, repeatable procedure.

Implementation

['Map the full transfer chain: document each physical handoff point from the connected build environment to the air-gapped network, naming specific hardware (e.g., Owl Cyber Defense data diode, write-once DVD burner) and personnel roles (Security Officer, Control Engineer).', 'Define verification gates: specify the exact SHA-256 checksum comparison procedure at the transfer station and the post-installation integrity check command run on the isolated workstation, including expected output formats.', 'Create a chain-of-custody log template: design a signed paper or offline digital form capturing timestamp, media serial number, file hashes, and dual-authorization signatures required at each transfer step.', 'Integrate with regulatory checklists: cross-reference each procedure step with the applicable NRC 10 CFR 73.54 or IEC 62645 cybersecurity control requirement so auditors can trace compliance directly from the document.']

Expected Outcome

Facilities achieve consistent, auditable software deployments with zero missed verification steps, reducing regulatory audit findings and cutting average deployment time from 3 days to 6 hours due to eliminated rework from undocumented ad-hoc procedures.

Creating Incident Response Runbooks for Air-Gapped Financial Trading Infrastructure

Problem

Security operations teams at stock exchanges and clearinghouses run matching engines on air-gapped networks for tamper prevention, but their incident response runbooks assume internet-connected tools like Slack, cloud-based ticketing, and online threat intelligence feeds — rendering the documentation useless during an actual incident on the isolated network.

Solution

Air-gapped-aware incident response documentation replaces every internet-dependent tool reference with offline equivalents, pre-stages threat intelligence snapshots on the isolated network, and defines communication protocols using only resources available within the air-gapped boundary.

Implementation

['Audit existing runbooks for internet dependencies: identify every step referencing cloud tools (VirusTotal lookups, Splunk Cloud, PagerDuty alerts) and flag them for replacement with offline alternatives (local MISP instance, on-premises Splunk, internal paging system).', 'Pre-stage offline resources: document the schedule and procedure for syncing threat intelligence feeds (STIX/TAXII exports, YARA rule sets) from the connected network to the air-gapped environment via the authorized transfer station, including maximum allowable age of the data.', 'Define isolated communication protocols: specify the use of offline collaboration tools (Mattermost on-prem, physical war room location, landline bridge numbers) and document the escalation tree that does not rely on internet-connected mobile devices.', 'Conduct tabletop exercises using only air-gapped resources: run quarterly drills where responders must execute the runbook without touching any internet-connected device, documenting gaps discovered and updating the runbook accordingly.']

Expected Outcome

Incident response mean-time-to-contain drops by 40% because responders no longer waste time improvising offline workarounds mid-incident, and post-incident reviews confirm all required forensic data was captured using pre-documented offline tooling.

Writing Operator Manuals for Air-Gapped Industrial SCADA Systems in Water Treatment Plants

Problem

Water utility operators managing air-gapped SCADA systems that control chemical dosing and pump stations cannot access vendor documentation portals, online knowledge bases, or firmware update notifications from the plant floor, leaving them with outdated printed manuals and no clear process for receiving critical safety advisories from ICS-CERT.

Solution

A structured offline documentation management system formalizes how vendor advisories, updated manuals, and firmware changelogs are reviewed on an internet-connected workstation, sanitized, and physically transferred to the air-gapped operator environment on a defined schedule, with version-controlled local copies maintained on the isolated network.

Implementation

["Establish a documentation intake process: designate a connected 'documentation workstation' outside the air-gapped boundary where a librarian role subscribes to ICS-CERT advisories, vendor portals (Siemens ProductCERT, Schneider Electric), and downloads updated manuals weekly.", 'Define sanitization and transfer procedures: document the malware scanning steps (using an offline-updated AV tool), PDF/A conversion for format standardization, and the use of a hardware write-blocker and one-way data diode to move approved documents to the air-gapped document server.', 'Maintain a versioned offline document repository: specify the folder structure, naming convention (e.g., VENDOR_MODEL_DOCTYPE_YYYYMMDD.pdf), and retention policy on the local file server accessible from operator HMI terminals, with a printed index posted in the control room.', "Create a critical advisory escalation path: document the procedure for urgent ICS-CERT advisories requiring immediate operator awareness, including who authorizes an emergency transfer, the expedited scanning checklist, and how operators are notified via the plant's internal PA system."]

Expected Outcome

Operators have access to documentation no more than 7 days old, all ICS-CERT critical advisories reach the air-gapped environment within 4 hours of publication via the expedited path, and annual safety audits confirm zero instances of operators using superseded procedures.

Documenting Cryptographic Key Management Procedures for Air-Gapped Certificate Authorities

Problem

Organizations running offline root Certificate Authorities (CAs) for PKI infrastructure — a security best practice requiring the root CA to be air-gapped — struggle to document the complex ceremony procedures for key generation, signing, and storage in a way that is detailed enough for infrequent operators to execute correctly years apart without institutional knowledge loss.

Solution

Air-gapped CA ceremony documentation captures every physical and logical step of root CA operations with enough precision that a qualified-but-unfamiliar operator can execute a signing ceremony correctly, including hardware token handling, HSM procedures, and the physical security controls required by standards like WebTrust for CAs.

Implementation

['Document the physical environment setup: specify the Faraday cage or RF-shielded room requirements, the roles and minimum number of witnesses (Key Ceremony Administrator, Internal Auditor, two Key Custodians), the hardware inventory checklist (HSM model, firmware version, offline laptop OS build), and the camera/recording setup for audit evidence.', 'Write step-by-step HSM and key generation procedures: capture every command executed on the air-gapped CA system (e.g., specific PKCS#11 commands or vendor HSM CLI syntax), the expected output at each step, and the error handling procedure if output does not match — leaving no step to operator interpretation.', "Define key material handling and storage documentation: specify the exact process for splitting the root CA private key using Shamir's Secret Sharing (m-of-n threshold), the hardware token types used for each share, tamper-evident bag procedures, and the geographically distributed safe storage locations with access log requirements.", 'Create a ceremony rehearsal and validation checklist: document a dry-run procedure performed on a non-production air-gapped system 30 days before a real ceremony, with a sign-off checklist confirming each operator has successfully completed their role and the ceremony documentation is current.']

Expected Outcome

Root CA signing ceremonies are completed without errors in a single session (historically requiring multiple retries due to undocumented steps), ceremony audit logs satisfy WebTrust auditor requirements without supplemental explanation, and key custodian onboarding time decreases from 2 days to 4 hours using the self-contained documentation.

Best Practices

Enumerate Every Authorized Data Transfer Channel and Its One-Way Constraints

Air-gapped environments are only as secure as the transfer mechanisms connecting them to the outside world. Documentation must explicitly list every approved ingress and egress path — data diodes, write-once optical media, hardware write-blockers — and specify the directionality and data types permitted on each channel. Ambiguity in transfer documentation is the most common source of accidental air-gap violations.

✓ Do: Create a transfer channel matrix table in your documentation listing each channel by name, hardware model, permitted data direction (inbound only / outbound only), approved file types, maximum file size, required scan procedure, and the role authorized to initiate a transfer.
✗ Don't: Do not document transfer procedures with vague language like 'move files via USB as needed' — this invites the use of read-write USB drives that can exfiltrate data, bypassing the air-gap entirely.

Maintain Offline-First Documentation Tooling Within the Air-Gapped Boundary

Documentation that lives exclusively in cloud platforms (Confluence Cloud, Google Docs, Notion) is inaccessible from within an air-gapped environment, defeating its purpose at the exact moment operators need it most. Teams must deploy and maintain self-hosted or locally installed documentation systems inside the air-gapped network and document the process for keeping them synchronized with the authoritative source.

✓ Do: Deploy an on-premises documentation platform (Confluence Data Center, BookStack, or MkDocs served from a local web server) inside the air-gapped network, and document the weekly synchronization procedure for pushing approved documentation updates through the authorized transfer channel.
✗ Don't: Do not store the primary or only copy of air-gapped system runbooks on internet-connected SaaS platforms, assuming operators will print what they need — printed documents become stale and lack the searchability required during high-pressure incidents.

Version-Control All Air-Gapped Environment Documentation With Offline Git Repositories

Changes to procedures, network diagrams, and configuration baselines in air-gapped environments must be tracked with the same rigor as source code, because undocumented changes are indistinguishable from unauthorized modifications during a security audit. An offline Git server provides full change history, author attribution, and diff capability without requiring internet connectivity.

✓ Do: Run a self-hosted Git server (Gitea or GitLab Community Edition) on the air-gapped network, enforce commit signing with GPG keys whose public keys are stored in the repository itself, and document the branching strategy and mandatory peer-review process for all documentation changes.
✗ Don't: Do not manage air-gapped documentation as a collection of individually dated Word documents (e.g., 'RunBook_v3_FINAL_JohnEdits2.docx') — this approach makes it impossible to determine the current authoritative version or audit what changed between revisions.

Document Physical Security Controls as Integral Components of the Air-Gap Architecture

An air-gapped network's security model depends equally on physical access controls and logical network isolation — a technically perfect network separation is nullified if an unauthorized person can walk up to a workstation. Documentation must treat physical security procedures (badge access logs, mantrap procedures, visitor escort policies, clean-desk requirements) as first-class technical specifications, not administrative afterthoughts.

✓ Do: Include a dedicated 'Physical Security Controls' section in your air-gapped environment architecture document that specifies the badge access tier required for each zone, the procedure for escorting visitors, the maximum time a transfer station can be left unattended, and the camera coverage map with retention period.
✗ Don't: Do not relegate physical security to a separate HR or facilities policy document that technical operators are unlikely to reference — if the physical controls are not in the technical runbook, operators will not know to enforce them during non-standard situations like emergency maintenance.

Define and Document the Malware Sanitization Procedure for Every Inbound Transfer

Removable media and data diode transfers are the primary attack vector against air-gapped systems, as demonstrated by the Stuxnet worm which spread via infected USB drives to air-gapped Iranian nuclear centrifuge controllers. Every piece of data entering the air-gapped environment must pass through a documented, hardware-enforced sanitization process using an offline-updated security tool, and this process must be documented in enough detail to be consistently repeatable.

✓ Do: Document a mandatory sanitization checklist for all inbound transfers specifying: the dedicated sanitization workstation (never connected to either network), the antivirus/EDR tool and its offline signature update schedule, the Content Disarm and Reconstruction (CDR) tool for document sanitization, the file type whitelist, and the dual-person integrity requirement where two authorized personnel witness and sign off on each transfer.
✗ Don't: Do not allow the same removable media device to be plugged into both the internet-connected preparation workstation and the air-gapped destination system without an intermediate sanitization step — this is the exact attack path exploited by Stuxnet and remains the most common air-gap compromise vector.

How Docsie Helps with Air-Gapped

Build Better Documentation with Docsie

Join thousands of teams creating outstanding documentation

Start Free Trial