On Fri, Aug 25, 2017 at 9:42 AM, James Fournie <james.four...@gmail.com> wrote:
> Hi Sarah, > > I think what you are asking about is an "air gap". > https://en.wikipedia.org/wiki/Air_gap_(networking) > > Here's a blog entry from Bruce Schneier with some best practices: > > https://www.schneier.com/blog/archives/2013/10/air_gaps.html This strikes me the way to go. Be aware that unless the system is encrypted and the files are encrypted at rest, they will be more vulnerable than they would being stored in a services specifically designed to protect confidential data (even then, they might be). Also, you need robust key management and data protection or you could lose everything in the blink of an eye. kyle