No Network Access
Overview
No network access is a complete physical isolation between internal and external networks, with no direct network connectivity whatsoever. Data transfers can only occur through secure physical media like encrypted drives, requiring strict manual processes and security controls for any movement of artifacts or dependencies.
Architecture
This is a typical Artifactory deployment in a no-network air-gapped environment. Note that the JFrog Platform on both sides includes JFrog’s Security solutions like JFrog Xray.
No Network Connection Scenario
Complete Physical Isolation
In this scenario, the internal and external environments have absolutely no network connectivity between them. This represents the highest level of security isolation but requires the most complex operational procedures.
Architecture Characteristics
- Internal Artifactory instance operates completely disconnected from external networks
- External Artifactory instance on DMZ has internet access for dependency acquisition
- Physical media (removable drives, secure transfer devices) serves as the only data bridge
- All artifact transfers require manual intervention and physical transport
Operational Model
- Dependencies are identified and requested through formal processes
- This should ideally be an automated process as much as possible to ease developers experience
- External instance downloads and validates all required artifacts and their transitive dependencies
- Approved artifacts are exported to secure, encrypted physical media
- Internal instance imports artifacts from physical media for internal distribution
- All transfers undergo security scanning and approval workflows
Security Benefits
- Complete immunity from network-based attacks and data exfiltration
- Physical control over all data movement and artifact transfers
- Maximum protection for classified or highly sensitive development activities
- Absolute prevention of unauthorized external communications
Operational Challenges
- Significant delays in dependency acquisition and updates
- Complex coordination required between internal and external teams
- Physical security requirements for data transfer media
- Manual processes prone to human error and delays
