Identity and Access Management (IAM) in air-gapped environments is not abstraction—it is survival. When your infrastructure is sealed from the internet, every authentication, every permission, every role exists in a closed loop. There is no relying on remote verification. There is no calling home.
Air-gapped IAM demands absolute control over your identity store. Credentials never leave the physical boundary. Multi-factor authentication must be rooted in local factors—smart cards, HSMs, offline token generators. Role-based access control becomes your primary shield. Privilege escalation paths must be mapped, locked, and tested without ever touching an external service.
Policy enforcement in air-gapped IAM cannot depend on cloud-based identity providers. Directory services run on internal servers. Password rotation scripts must execute within the perimeter. Audit logs need to be immutable, stored locally, and reviewed with a cadence that matches your threat model.
One of the hardest parts is secure onboarding and offboarding. User provisioning must occur through an internal workflow that never crosses the gap. Access revocation should be immediate and verifiable on the same isolated network. No endpoint should linger with stale credentials.