Egress Air Gap: How to Serve the Internet Without Trusting It
Part 4 of 4 · Infrastructure Philosophy
Series recap: Parts 1–3 established that IAM complexity is itself a vulnerability, that cloud repatriation is economically rational, and that sovereign AI infrastructure is operationally achievable. Part 4 describes the network model that makes all of it defensible.
Traditional air-gapped systems are absolute: no network in, no network out. That works for classified defence systems or payment HSMs, but it is operationally impossible for anything that needs to serve users. The moment you add an HTTP listener, the air gap is gone — or so conventional thinking goes.
That framing is wrong. It conflates ingress reachability with egress freedom, and those are two entirely separate threat surfaces.
The Egress Air Gap Model
An egress air-gapped cluster is a Kubernetes environment where inbound traffic is explicitly permitted and protected, but outbound traffic from workloads to the external internet is categorically blocked at the network level. The cluster can receive the world; it cannot call it.
The boundary works in three distinct layers:
- DDoS scrubbing and ingress termination happen outside the cluster — at the edge, before a single packet reaches a Kubernetes node. Only clean, legitimate HTTP/HTTPS flows are forwarded inward.
- Frontend workloads — load balancers, ingress controllers, API gateways — accept those flows, terminate TLS, and route internally. These are the only components with an external listener.
- All other workloads — application services, databases, ML inference endpoints — have no route to the public internet. They can communicate within the cluster and respond to requests arriving via the frontend tier, but they cannot initiate outbound connections.
Critical distinction: The egress block is not a Kubernetes NetworkPolicy suggestion. It is a hard drop at the host level — iptables or nftables rules on the nodes themselves, or a hardware firewall upstream of the cluster, that reject any packet originating from a workload pod whose destination falls outside the cluster CIDR. NetworkPolicy handles east-west segmentation; host-level enforcement handles the north-south hard stop.
Why This Is a Meaningful Security Boundary
The value of egress air-gapping is asymmetric. If an attacker compromises an application pod, the blast radius is contained: they cannot exfiltrate data to a command-and-control server, they cannot pull a second-stage payload from the internet, and they cannot pivot to cloud metadata endpoints. The compromise is loud and local rather than quiet and distant.
This matters most in environments where the workloads themselves are high-value targets: LLM inference services, financial processing systems, healthcare record APIs. The data they hold is exactly what an attacker would want to move out of the cluster. Egress air-gapping makes that movement impossible at the network layer, before any application-level control even runs.
Contrast this with a conventional secure cloud deployment that relies on IAM policies and security groups. Those controls are correct and necessary, but they are software — they can be misconfigured, bypassed by a credential compromise, and they exist inside the same trust boundary as the workloads they protect. A hard egress block at the kernel or hardware level is not a policy. It is physics.
The Hybrid Nature of This Model
Egress air-gapped is not fully air-gapped, and it should not pretend to be. The cluster deliberately accepts ingress traffic because that is its job. What makes it hybrid is that the air gap applies selectively to the trust model:
- Ingress from the internet — permitted, filtered, terminated at the edge
- Egress from workloads to the internet — blocked categorically
- Intra-cluster traffic — controlled by NetworkPolicy, segmented by namespace
This is the same pattern that governs how a hardened datacenter operates: the front door exists, the loading dock exists, but the interior is not freely accessible from either. The distinction is one of directionality and initiation.
Operational Implications
Running in this model has practical consequences that operators must design around explicitly.
Container images cannot be pulled from public registries at runtime. A private internal registry — Harbor, for example — must mirror all images needed by the cluster. Image pull happens during a controlled synchronisation window, not on-demand from workload nodes.
Software updates and package installations cannot happen via apt, pip, or npm from within a running pod. Dependencies must be baked into images at build time in an external CI environment, then pushed to the internal registry.
Outbound webhooks and third-party API calls are structurally impossible. Any integration with an external service must be mediated by a gateway that sits outside the cluster boundary, receives data from the cluster via a controlled push mechanism, and handles the external call separately. This is operationally more complex, but it enforces an explicit audit trail: every external interaction is intentional and logged.
Certificate and secret rotation must be pre-staged or delivered via a trusted internal path — a Vault instance inside the cluster, or a hardware-backed secrets system accessible without outbound internet routes.
Where This Applies
Egress air-gapping is the right architecture for any deployment where the cost of data exfiltration exceeds the operational overhead of running an isolated cluster:
- Sovereign AI inference — models trained on proprietary data that must not be reachable from outside the jurisdiction
- Private LLMOps platforms — fine-tuning pipelines where training data is a competitive asset
- Regulated financial and healthcare workloads — under GDPR, HIPAA, or sector-specific mandates
- Defence and critical national infrastructure — where internet reachability is a liability, not a feature
It is not the right architecture for systems that genuinely need to call external APIs in the hot path — payment processors, mapping services, real-time data feeds. For those, a different segmentation model applies: isolate the components that need external access and treat them as a separate trust zone.
The Architecture in One Sentence
The cluster is a one-way mirror: the internet can see its reflection in the frontend, but cannot see through it — and nothing inside can look out.
This series
- Part 1 — IAM Complexity Is a Vulnerability, Not a Feature
- Part 2 — The Economics of Cloud Repatriation
- Part 3 — Sovereign AI Infrastructure: An Operational Blueprint
- Part 4 — Egress Air Gap: How to Serve the Internet Without Trusting It (this article)
Catalin Dobrita is the founder of Sugau, a consultancy specialising in bare-metal Kubernetes, cloud repatriation, and private AI infrastructure. sugau.com