In an air-gapped deployment, trust is built differently. No public Certificate Authority. No internet validation. No automated renewal. Every byte of TLS configuration must be handled inside the sealed environment — correctly, the first time.
Air-gapped TLS starts with a clear chain of trust. You control the root CA. You generate intermediate CAs if needed. You issue and sign every certificate locally. Nothing leaves the network. This means there’s no fallback if you mess up the subject names, SANs, validity, or key sizes. There’s no quick fix with Let’s Encrypt. Every decision has to be intentional.
To configure TLS in an air-gapped environment, choose a strong key algorithm (2048-bit RSA or better, or elliptic curve with P-256). Set reasonable validity periods — long enough to reduce maintenance risk, short enough to keep the attack window small. Include all required SANs for every service endpoint, even internal ones. If your nodes need mutual TLS, build and distribute the client certs with the same care as the server certs.