Chapter 1. The air-gapped environment and its impact


An air-gapped environment is a computer system or network that is physically or logically disconnected from all external networks, specifically the internet. Its primary purpose is to provide the highest possible security for highly sensitive data and critical infrastructure. This offline, secure environment eliminates digital entry points for hackers, malware, or other cyber threats.

1.1. Impact on workflow

Red Hat build of Podman Desktop simplifies local container development, which relies heavily on pulling resources from the internet. In an air-gapped environment, the entire workflow shifts from an online, automated process to a manual, pre-fetched, and controlled one. The isolation from external networks makes the air-gapped environment much less convenient to operate. The following table highlights the impact of such an environment on the workflow of Red Hat build of Podman Desktop:

Expand
Table 1.1. Workflow comparison: Automated versus Air-gapped
Core workflow areaOnline or automated (Default)Air-gapped (Manual process)

Installation and dependencies (For example, Kind or Docker Compose binaries for Windows or macOS)

Automatic downloading of all required components and binaries.

Manual pre-fetching: You must download all the executable files externally, transfer them through secured removable media, and install them manually.

Container image management (For example, pulling images)

Direct pulling of images from internet registries, such as Docker Hub or Quay.

Manual load or import: Use an internet-connected machine to fetch the required images and save them as .tar files. Then, transfer and load these files to your air-gapped machine or an internal registry.

Updates and security patches (For example, Red Hat build of Podman Desktop, Kind, or Docker Compose upgrade)

Automatic checks and seamless updates.

Manual patching: You must fetch, transfer, and install application-related updates manually.

In an air-gapped environment, you can implement high-level security at the cost of speed and convenience, turning instant network actions into secure, multistep manual procedures.

Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top