Overview
Bastions and airgaps are strategies for controlling how systems connect—or don't connect—to the outside world. They focus on limiting exposure, creating strong boundaries that support a broader security design. In this unit, we look at how we can seperate systems and create safe disconnects should a problem arise.
Learning Objectives
- Understand the role and importance of air-gapped systems.
- Recognize how to balance strong security with operational efficiency.
- Learn how bastion hosts can help control and limit system access.
- Understand methods for automating the jailing and restriction of users.
- Gain a foundational understanding of
chroot
environments and diversion techniques.
Relevance and Context
As organizations grow, protecting critical systems becomes more challenging. Air-gapped systems and bastion hosts offer proven ways to limit exposure and manage access securely. Understanding these concepts is essential for building strong security foundations without creating unnecessary barriers to operations.
Prerequisites
To be successful, students should have a working understanding of skills and tools including:
- Basic directory navigation skills.
- Ability to edit and manage configuration files.
- Understanding of SystemD services and the use of the
sysctl
command. - Basic knowledge of Bash scripting.
Key Terms and Definitions
Air-gapped
Bastion
Jailed process
Isolation
Ingress
Egress
Exfiltration
Cgroups
Namespaces
- Mount
- PID
- IPC
- UTS