Episode 47 — Select Firewalls, Airgaps, and Software Defined Perimeters for Clear Boundaries
This episode explains how to choose between firewalls, airgaps, and software defined perimeters based on threat models, operational constraints, and assurance requirements, which the ISSAP exam often frames as “best control approach for this boundary.” You’ll learn what each option actually provides in terms of isolation, policy enforcement, and attack surface reduction, and how to avoid misunderstanding an airgap as a complete security solution when people still move data and manage systems. We’ll cover practical selection factors like latency tolerance, remote access needs, monitoring requirements, and the maturity of identity and device posture controls required to make an SDP effective. Examples include segmenting an OT environment from corporate IT, protecting sensitive research networks, and using identity-centric access to reduce exposed services while still enabling administrators to do their jobs. Troubleshooting topics include firewall rule sprawl that defeats intent, “temporary” bridges across airgaps that become permanent, and SDP deployments that fail because identity sources, certificates, or endpoint posture signals are unreliable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.