Glossary

Disconnected Access

Identity Access Management

What is Disconnected Access?


Disconnected Access is a secure remote access model that allows users to interact with critical systems without establishing a direct network connection between the user’s endpoint and the target asset. Instead of tunneling or bridging the user into the network, disconnected access leverages protocol isolation, session proxying, or air-gap emulation to create an indirect, monitored path for interaction. This model eliminates traditional network pathways, making it impossible for malware, lateral movement, or endpoint-based attacks to reach critical infrastructure systems, even during active sessions.


Why is Disconnected Access Important?


Traditional access solutions like VPNs, jump servers, or bastion hosts create a “connect then control” architecture, placing user endpoints directly on the same network as Operational Technology (OT) or Industrial Control Systems (ICS). This approach introduces serious risks, especially when users connect from unmanaged or compromised devices.

Disconnected access inverts the model by enabling “control without connection.” It prevents network-level exposure by acting as a secure intermediary between the user and the target system. This eliminates the risk of ransomware spread, unauthorized lateral movement, and accidental or malicious tampering from compromised endpoints.

For organizations in critical infrastructure sectors, disconnected access supports compliance with NERC CIP, IEC 62443, TSA SD02E, NIS2, and Saudi OTCC-1:2022, which mandate segmentation, session isolation, and controlled access to high-value assets. It also aligns with zero trust architecture, where trust is never granted based on network location or device.


How Does Xona Help with Disconnected Access?


Xona is purpose-built to deliver true disconnected access for critical infrastructure environments. The platform uses protocol isolation to proxy RDP, SSH, VNC, and browser-based sessions through a hardened gateway, ensuring that user endpoints never connect directly to OT or IT systems.

Unlike VPNs or cloud-tunneled solutions, Xona’s architecture physically and logically separates users from the critical infrastructure environment. Even if a user device is infected or compromised, the threat cannot traverse into the network because there’s no network path to exploit. This architectural “air gap by design” is a powerful safeguard against cyber threats, insider misuse, and regulatory violations.

Xona also integrates multi-factor authentication, role- and time-based access, and credential injection, all within the disconnected session. Every session is recorded, monitored, and fully auditable, giving organizations real-time control and historical evidence to support operational and compliance needs. Disconnected access is not just a security advantage; it’s the foundation of Xona’s SAFe-CI platform.

Frequently Asked Questions

How does disconnected access differ from traditional remote access methods like VPNs?

Disconnected access avoids direct network connections by proxying sessions through an intermediary gateway, while VPNs extend the network perimeter and expose internal systems to endpoint risks.

What security risks does disconnected access help mitigate?

It prevents lateral movement, ransomware propagation, and endpoint-based attacks by eliminating the possibility of direct communication between untrusted devices and critical systems.

Is disconnected access suitable for Operational Technology (OT) environments?

Yes, disconnected access is particularly effective in OT environments where system integrity, network segmentation, and minimal exposure are essential for safety and reliability.

What protocols can be supported through a disconnected access model?

Disconnected access platforms commonly support RDP, SSH, VNC, HTTPS, and other standard protocols via session proxying or protocol isolation, without requiring changes to the target systems.

Does disconnected access help meet cybersecurity compliance requirements?

Yes, it supports compliance with standards such as NERC CIP, IEC 62443, and TSA SD02E by enforcing network segmentation, access isolation, and session logging requirements.

How does Xona implement disconnected access for secure remote operations?

Xona uses a hardened gateway to proxy user sessions, isolating endpoints from critical infrastructure and enforcing authentication, access controls, and session monitoring without creating direct network paths.