NIS2 in the Factory Hall: Compliance through Automation
The grace period for cybersecurity in the industry is coming to an end. With the new EU directive …

In modern software development, “always online” is the standard paradigm. However, in industrial manufacturing (OT), healthcare, or critical infrastructure, the reality is often different: systems are operated in air-gapped environments. This means these networks are physically or logically completely isolated from the public internet—a proven method for protection against cyberattacks and industrial espionage. This isolation was long considered an obstacle to modern IT methods. But today, it is clear: Cloud-Native technologies like Kubernetes can be successfully deployed in isolated networks if the architecture is fundamentally adapted.
A standard Kubernetes cluster requires a permanent internet connection. It retrieves Container images from public registries, downloads updates from GitHub, and validates security certificates via external interfaces. In an air-gapped environment, these automated processes fail. The four core challenges of isolated environments:
The heart of an air-gapped system is a local registry (such as Harbor or Quay). All necessary images are checked, signed in a secured transfer zone, and then physically transferred into the isolated network. The cluster then exclusively accesses this internal “harbor.”
External dependencies are replaced by on-premise equivalents within the closed network:
Object Storage: Local storage solutions (like MinIO) provide S3-compatible interfaces necessary for many modern apps.
Automation via GitOps models is also possible offline. A local Git server (e.g., Gitea or GitLab) is used within the air-gap. New configurations are introduced through controlled data gateways. A controller in the cluster then automatically synchronizes the state with the local codebase. Why the effort is worth it
Operating Kubernetes in an isolated environment is technically more challenging but offers crucial advantages for highly sensitive industrial areas:
Air-Gapped Kubernetes proves that highest security demands and modern software infrastructure are not opposites. By designing autonomous island clusters, industrial companies can leverage the scalability and flexibility of Containers without giving up the protective shell of their isolated networks. It is the way to combine the speed of the software world with the stability of production.
What does “Air-Gapped” mean in IT systems?
An air-gapped system is a network that has no connection to unsecured networks like the public internet. The goal is protection against digital attacks and unauthorized data exfiltration.
Can Kubernetes be operated without an internet connection?
Yes. By using local Container registries, internal DNS services, and local certificate management, Kubernetes can be operated completely autonomously in isolated environments.
How do updates get into an air-gapped system?
Updates are carried out through a defined process where data is transferred into the isolated network via a secured interface (data gateway) or physical media after a security check.
The grace period for cybersecurity in the industry is coming to an end. With the new EU directive …
Docker Swarm is Not Kubernetes for Beginners When discussing container orchestration today, two …
A security incident is systemic when it repeats, scales, and becomes normalized. The current data …