The 'Virtual Air Gap': Building Fort Knox in AWS

Published: (January 17, 2026 at 08:54 PM EST)
3 min read
Source: Dev.to

Source: Dev.to

Imagine standing in front of your CISO (or a very strict Data Privacy Officer in Germany) and saying: “We are moving our sensitive patient data to the cloud.”
The reaction? Panic. Hyperventilation. “Never! That needs to be air‑gapped! No internet connection allowed!”

I come from the world of Pharma IT (BioNTech). I know these requirements inside out, and I am here to tell you: yes, it is possible—but we have to stop treating the cloud like open public Wi‑Fi at a coffee shop.

Today we’ll do a deep dive, build a Landing Zone according to high‑security standards, and explain how an “air‑gap” actually works in AWS.

The Landing Zone

What a Landing Zone Is Not

A Landing Zone is not just a single AWS account.

Multi‑Account Strategy with AWS Control Tower

When we talk about a Landing Zone we mean a multi‑account strategy orchestrated by AWS Control Tower. We don’t throw everything into one bucket; we separate responsibilities into distinct accounts.

Account Types

AccountPurpose
Security AccountHolds immutable logs (CloudTrail) that nobody can delete (Write‑Once, Read‑Many).
Shared ServicesCentralized tooling and services used across the organization.
Workload Accounts (Prod/Dev)Host the actual applications.

Service Control Policies (SCPs)

Think of SCPs as “parental controls” that sit above the local administrator.

Example policy: In this account, nobody—not even the Root user—is allowed to create a public IP address or attach an Internet Gateway.
That becomes the first wall.

Private by Design

Simulating the Air Gap

Rule #1: In your sensitive subnet, do not attach an Internet Gateway (IGW).
Any packet destined for 0.0.0.0/0 simply dies—there is no path to the public internet.

“But if there’s no internet, how do we talk to S3 or our database backups?”

AWS PrivateLink (VPC Endpoints) creates a private tunnel directly through the AWS backbone network. Traffic never leaves the Amazon network, and services such as S3 appear as if they are on the same LAN.

Encryption with Customer‑Managed Keys (CMK)

We use KMS Customer Managed Keys with strict key policies, e.g., “This key can ONLY be used if the request originates from this specific VPC.”
Even if data is exfiltrated, without the correct key and VPC context it is useless.

Secure Access without SSH

  1. Install the SSM Agent (or use AMIs with it pre‑installed).
  2. Use AWS Systems Manager Session Manager for interactive shells.
  3. Authenticate via IAM (MFA) and launch sessions from a browser or terminal.

No public IP, no open SSH port, no key‑pair management.
Every command is logged, providing full auditability (e.g., “Who typed rm -rf …?”).

LayerRecommendation
IsolationDedicated AWS account, locked down by SCPs (Organizational Policies).
NetworkPrivate subnets without an Internet Gateway.
ConnectivityVPC Endpoints (PrivateLink) for all AWS services.
AccessSSM Session Manager instead of SSH/Bastion.
DataKMS encryption with strict, VPC‑bound key policies.

Designing the architecture this way yields systems that are compliant, secure, and scalable—no need to cut physical cables, just apply the right logical controls.

Back to Blog

Related posts

Read more »

𝗗𝗲𝘀𝗶𝗴𝗻𝗲𝗱 𝗮 𝗣𝗿𝗼𝗱𝘂𝗰𝘁𝗶𝗼𝗻‑𝗥𝗲𝗮𝗱𝘆 𝗠𝘂𝗹𝘁𝗶‑𝗥𝗲𝗴𝗶𝗼𝗻 𝗔𝗪𝗦 𝗔𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲 𝗘𝗞𝗦 | 𝗖𝗜/𝗖𝗗 | 𝗖𝗮𝗻𝗮𝗿𝘆 𝗗𝗲𝗽𝗹𝗼𝘆𝗺𝗲𝗻𝘁𝘀 | 𝗗𝗥 𝗙𝗮𝗶𝗹𝗼𝘃𝗲𝗿

!Architecture Diagramhttps://dev-to-uploads.s3.amazonaws.com/uploads/articles/p20jqk5gukphtqbsnftb.gif I designed a production‑grade multi‑region AWS architectu...