Disconnected Environments
Isolation is a vital cybersecurity tactic in system design and architecture (SDA). Its goal is to safeguard sensitive data by limiting external access. It includes concepts such as air-gapped systems and disconnected environments.
Disconnected or isolated environments are networks or systems intentionally void of internet connectivity to ensure security requirements. Some systems or components require disconnection because they handle sensitive data or operate under stringent regulatory compliance. Disconnecting these systems from the internet reduces potential cyberattack avenues, enhancing overall security posture.
This isolation is often achieved logically using virtual local area networks (VLANs), non-routable subnets, and firewalls. Such systems can share the same networking infrastructure as their internet-connected counterparts yet remain distinct and secure.
Latest articles on Disconnected Environments
How oc-mirror version 2 enables disconnected installations in OpenShift 4.16
See how to use oc-mirror to install OpenShift in disconnected environments...
Easily expanding Red Hat OpenShift clusters
A new feature is now available as a Developer Preview in OpenShift 4.16 that...
How to get Red Hat OpenShift operators' information without oc-mirror plug-in
Learn how to create an OpenShift operator oc-mirror's ISC configuration file...