Exactly When You Need Them Most.
Ransomware response, planned maintenance, regulatory requirements: any of these can isolate your network. When that happens, MFA fails, the IdP goes unreachable, and operators fall back to shared passwords. This is not a configuration problem. It is a structural gap in every organization running isolated OT networks.
1 in 4
Industrial security tests finds shared or default credentials in OT networks
87%
Increase in ransomware attacks on industrial operators in 2024
5 Years
Nation-state actors maintained undetected access using only valid credentials
Sources: Claroty State of CPS Security 2024 · CISA Advisory AA24-038A, February 2024
Part 1: The Problem
Each one is serious on its own. Together, they compound into an identity posture no security leader would choose. Most have inherited it anyway.
Ransomware containment, planned maintenance windows, and NERC CIP Electronic Security Perimeters all cut the internet connection your identity platform needs to function. MFA stops working. RADIUS times out. Engineers fall back to shared passwords to keep systems running.
Shared admin credentials are the default in most OT environments. Not because anyone chose them, but because individual identity management was never deployed there. One password, used by a dozen people, on systems that control physical infrastructure. If something goes wrong, there is no audit trail.
NERC CIP, ISA/IEC 62443, and HIPAA assessors require per-user access records, authentication logs, and proof of MFA controls, all generated from inside the network boundary. That evidence cannot exist if the identity system that produces it was never deployed there. Before every audit, someone rebuilds the log manually in a spreadsheet. That is not a compliance program.
Why It’s Unsolved
Modern IAM was built on one assumption: the device authenticating and the service validating can both reach the internet. Every architectural decision that followed was built on that assumption. Cloud-hosted FIDO2 servers, SaaS policy engines, mobile push notifications, centralized audit logs.
When the assumption breaks, the stack breaks with it.
RADIUS is the clearest example. The protocol runs locally over UDP; it was built for on-premises communication. But the identity store it validates against has moved to the cloud. When the network isolates, RADIUS times out. Operators either cannot authenticate or fall back to a shared local account.
There is a compounding problem. Federal and DoD networks are transitioning to IPv6 per OMB M-21-07. New switches, routers, and firewalls are being deployed on IPv6 transport. But most IAM vendors’ RADIUS implementations only support IPv4. If your RADIUS server cannot operate over IPv6, it cannot authenticate users to any network device on IPv6 infrastructure.
The environments controlling power grids, pipelines, and clinical networks run on the weakest identity controls in the organization. Not by choice. The tools were built for a connected world, and these environments deliberately are not.
It requires extending identity controls into the environments your current tools cannot reach. Here is what that looks like.
Switches, routers, and firewalls validate credentials via RADIUS against a local identity store with MFA enforced. Full IPv6 transport support for networks completing OMB M-21-07 transition. No shared account. No timeout. No fallback.
Shared credentials are eliminated. Every access event is attributed to a named person, not a shared account that a dozen people know the password to.
Authentication runs on local infrastructure inside the boundary: FIDO2, TOTP, YubiKey, CAC. No outbound call. No timeout. No fallback to a static password during an isolation event.
Accounts created for a maintenance window or turnaround cycle are time-bounded by design. When the work ends, the access ends.
Per-user access logs are produced continuously inside the boundary. No manual reconstruction before every audit.
Part 2: The Solution
SecureAuth AirGap deploys every identity control your isolated network needs as a single package. No cloud dependencies. No components that call home.
The Problem
RADIUS times out when the network isolates
What AirGap Delivers
RADIUS validates against an on-premises IdP via local LDAP. Full IPv4 and IPv6 transport. MFA enforced at the network layer. OMB M-21-07 compliant.
The Problem
Cloud IAM stops working when the network closes
What AirGap Delivers
Workforce IdP runs on Windows Server virtual appliances inside the boundary. No outbound call at any point in the authentication chain.
The Problem
FIDO2 requires a cloud server to register and authenticate hardware tokens
What AirGap Delivers
FIDO Service deploys on-premises. YubiKeys and passkeys register and authenticate entirely inside the boundary.
The Problem
Mobile push MFA routes through a cloud service that becomes unreachable when the network closes
What AirGap Delivers
Mobile Service deploys on-premises. Push notifications route through local infrastructure. Familiar MFA experience with no SaaS dependency.
The Problem
Audit logs don’t exist inside the OT perimeter
What AirGap Delivers
Every authentication event logged locally inside the boundary. Continuous retention. SIEM export. No manual reconstruction.
The complete stack ships as a single deployable package.
Windows Server virtual appliances. Runs the full identity and policy engine locally.
On-premises FIDO2 WebAuthn server. Hardware token registration and authentication inside the boundary.
On-premises authentication app support. Push notifications route through local infrastructure.
Local RADIUS server with full IPv4 and IPv6 transport. Validates against the on-premises IdP via LDAP. MFA enforced at the network layer for switches, routers, and firewalls. OMB M-21-07 compliant.
Local database stores all FIDO, Mobile Service, and RADIUS configuration and enrollment data inside the boundary.
NERC CIP Electronic Security Perimeters. SCADA and EMS networks. Grid operators and water/wastewater systems.
Petrochemical, refining, LNG, and midstream pipeline operations. ISA/IEC 62443 compliance zones.
Hospitals and health systems with segmented clinical networks. Post-ransomware isolation environments. HIPAA access logging requirements.
Automotive OEM, aerospace, and discrete manufacturing with isolated OT environments.
Trusted by CISOs, OT Security Leads, Infrastructure Architects, and Compliance Teams responsible for identity in isolated networks.
How security and operations leaders in critical infrastructure are closing the identity gap in their most sensitive networks, without replacing existing infrastructure.
The SecureAuth AirGap Playbook is a practical guide for security and operations leaders. It covers the structural gap in air-gapped identity, why it has gone unsolved, and what a complete on-premises identity stack looks like in practice, including RADIUS over IPv6, offline MFA, and automated audit logging inside the OT perimeter.
What’s Inside the Playbook