Built on AWS Native Services
Air Gap Recover leverages enterprise-grade AWS services to provide immutable, cross-account disaster recovery without custom infrastructure or third-party dependencies.
Air Gap Recover leverages enterprise-grade AWS services to provide immutable, cross-account disaster recovery without custom infrastructure or third-party dependencies.
Air Gap Recover is a fully AWS-native disaster recovery solution that protects your critical infrastructure by replicating data to an isolated AWS organization. Unlike traditional backup solutions that rely on proprietary agents or third-party storage, we exclusively use native AWS services to ensure maximum reliability, security, and performance.
Key Principle
Every component of Air Gap Recover uses AWS-managed services. This means no custom infrastructure to maintain, no proprietary protocols to trust, and no vendor lock-in beyond AWS itself.
Air Gap Recover operates across two AWS Organizations: your Source Organization (production environment) and a separate Destination Organization (air-gapped vault).
• Production Accounts
• S3 Buckets
• RDS Databases
• EBS Volumes
• Aurora Clusters
Cross-Account
Cross-Region
• Isolated Accounts
• Immutable Copies
• Encrypted at Rest
• Control Tower Gov.
• SCPs Enforced
The destination organization is completely isolated from your production environment. Even if an attacker gains full access to your source organization, they cannot access or modify data in the vault organization without separate credentials and multi-factor authentication.
For S3 buckets, we leverage S3 Cross-Region Replication (CRR) with cross-account replication to continuously sync objects to your vault organization.
Object-Level Live Replication
S3 CRR operates at the object level, automatically replicating new and updated objects from a source bucket to one or more destination buckets in different AWS regions. Unlike snapshots which capture point-in-time state, replication is continuous and near-real-time.
Replication Mechanics
S3 Replication Time Control provides a 15-minute SLA for object replication with a 99.99% guarantee. This feature includes:
15-Minute SLA
99.99% of objects replicated within 15 minutes of upload
Replication Metrics
CloudWatch metrics track replication latency and pending object counts
Event Notifications
S3 Event Notifications trigger on replication completion for workflow automation
S3 Storage Lens
Advanced analytics showing replication status and efficiency metrics
Versioning is MANDATORY
S3 replication requires versioning to be enabled on both source and destination buckets. Without versioning, replication rules cannot be configured. This ensures that:
Delete Marker Replication
When an object is deleted in the source bucket (without specifying a version ID), S3 creates a "delete marker" instead of permanently deleting the object. Delete marker replication behavior can be configured:
For air-gap protection, we typically disable delete marker replication to ensure attackers cannot delete replicated data by deleting source objects.
S3 replication supports multiple encryption methods with automatic re-encryption in the destination bucket:
SSE-S3 (AES-256)
AWS-managed encryption keys, automatically replicated and re-encrypted
SSE-KMS (Customer Keys)
Customer-managed KMS keys with cross-account grants for replication
Dual-Layer KMS
S3 Bucket Keys reduce KMS API calls by 99% for cost efficiency
⚠️ SSE-C Not Supported
Customer-provided encryption keys (SSE-C) cannot be replicated
KMS Re-Encryption for Air-Gap Security
When replicating encrypted objects to the vault account, S3 automatically decrypts with the source KMS key and re-encrypts with the destination KMS key. This ensures:
Fine-grained control over what gets replicated using flexible rule configurations:
CloudWatch Metrics
BytesPendingReplication, OperationsPendingReplication, ReplicationLatency
S3 Storage Lens
Cross-bucket analytics, replication efficiency, cost allocation
S3 Event Notifications
Trigger Lambda, SNS, or SQS on replication completion
Batch Replication
Replicate existing objects created before replication was enabled
End-to-End Replication Process
Incremental Cost Model
S3 CRR only transfers changed data. If you upload a 1GB file, only 1GB is transferred. If you modify 1MB of that file, only the new version is replicated. This dramatically reduces data transfer costs compared to full-copy backup solutions. Combined with S3 Intelligent-Tiering in the destination bucket, long-term storage costs are minimized automatically.
Amazon EFS (Elastic File System) uses continuous replication to protect NFS file systems, providing cross-region disaster recovery for shared file storage workloads.
File-Level Continuous Replication
EFS replication creates and maintains an up-to-date copy of your file system in a different AWS region. Unlike snapshots, EFS replication is continuous and automatic, with changes replicated asynchronously to the destination file system.
Replication Mechanics
15-Minute RPO
Most files replicated within 15 minutes under normal conditions
Automatic Sync
No manual intervention required, replication happens continuously
Application Transparent
Applications continue using NFS mount, no configuration changes needed
Monitoring
CloudWatch metrics track replication lag and last sync time
The 15-minute RPO means that in a disaster scenario, you could lose up to 15 minutes of file changes. For most shared file system workloads (home directories, shared application data, media files), this is acceptable. For databases or critical transactional data, use RDS/EBS snapshots instead.
Multi-Layer Encryption
Configuration Options
Important: One-Way Replication Only
EFS replication is one-way only. The destination file system is read-only for replication purposes. If you need to fail back to the original region after recovery, you must configure reverse replication (destination → source) and re-sync all data. Bi-directional replication is NOT supported.
Cost Optimization Strategy
Configure destination file system to use EFS Intelligent-Tiering or lifecycle policies to automatically move files to IA storage class after 30-90 days without access. This can reduce destination storage costs by up to 92% compared to Standard storage, making EFS replication highly cost-effective for disaster recovery.
For databases and block storage, we use AWS-native snapshot capabilities to create point-in-time backups and share them cross-account to your vault organization. Unlike continuous replication, snapshots capture a consistent state at a specific moment in time.
Block-Level Incremental Technology
Amazon EBS snapshots use block-level incremental backup technology stored in AWS-managed S3 infrastructure. After the first full snapshot, subsequent snapshots only store changed blocks since the last snapshot, dramatically reducing storage costs and snapshot creation time.
Snapshot Mechanics
Crash-Consistent (Default)
Captures data in flight to volume at snapshot moment, like pulling power plug - consistent but may require fsck/journal replay
Application-Consistent (Recommended)
Flush application buffers and freeze filesystem before snapshot (using pre-snapshot scripts or VSS on Windows)
For databases running on EBS volumes, application-consistent snapshots require coordination with the database engine to flush buffers and achieve a clean state before snapshot creation. For RDS databases, AWS handles this automatically.
Storage in AWS-Managed S3
EBS snapshots are stored in AWS-managed S3 infrastructure (not accessible via your S3 console) with 11 9's of durability (99.999999999%). AWS handles all redundancy, replication within the region, and storage management automatically. You are charged per GB-month of snapshot data stored (after compression).
Cross-Region Copy Mechanics
When copying an EBS snapshot to another region, AWS performs an incremental copy if:
If these conditions are met, only changed blocks are transferred across regions, significantly reducing data transfer costs. Otherwise, a full snapshot copy is performed.
Storage-Level Volume Snapshot Technology
Amazon RDS snapshots are storage-level volume snapshots of the entire database instance, including data files, transaction logs, and configuration. RDS uses the underlying EBS snapshot technology but handles all coordination with the database engine to ensure consistent backups.
Automated vs Manual Snapshots
Single-AZ Instance
Brief I/O suspension during snapshot (seconds to minutes), affects production workload
Multi-AZ Instance
Snapshot taken from standby replica, NO performance impact on primary database
For production databases, Multi-AZ deployment is strongly recommended not only for high availability but also to eliminate snapshot performance impact. Automated backups and manual snapshots are taken from the standby replica without affecting primary workload.
Transaction Log-Based Recovery
RDS continuously backs up transaction logs to S3 every 5 minutes, enabling point-in-time recovery to any second within the retention period (1-35 days). PITR works by:
This is critical for recovering from logical errors (e.g., accidental DELETE query) where you need to restore to the moment before the error occurred.
Retention Policies
KMS Encryption Requirements
RDS snapshots inherit encryption from the source DB instance. If the instance uses KMS encryption, all snapshots are automatically encrypted with the same KMS key. For cross-account snapshot sharing:
Automated Backups
Multi-AZ: No impact (from standby). Single-AZ: Brief I/O pause during daily backup window
Manual Snapshots
Same as automated: Multi-AZ no impact, Single-AZ brief pause
Transaction Logs
Continuous every 5 minutes, no perceptible impact on database performance
Snapshot Restore
Creates new DB instance, no impact on existing instance during restore
Automated and manual snapshots of RDS databases (MySQL, PostgreSQL, MariaDB, Oracle, SQL Server)
Cluster snapshots for Aurora MySQL and Aurora PostgreSQL
Block-level snapshots of EBS volumes attached to EC2 instances
EBS and RDS snapshots can be shared across AWS accounts to provide true air-gap protection. Unlike S3 replication which operates continuously, snapshots are point-in-time copies that are shared and copied to your vault organization.
Amazon EBS snapshots support unlimited cross-account sharing with powerful features for enterprise disaster recovery.
Unlimited Accounts
Share snapshots with any number of AWS accounts simultaneously
Cross-Region Support
Copy snapshots to any AWS region for geographic redundancy
DLM Automation
Data Lifecycle Manager automates snapshot creation and sharing schedules
Customer-Managed KMS
Use your own KMS keys for encryption sovereignty and compliance
EBS Snapshot Workflow
Amazon RDS snapshots have different constraints compared to EBS, requiring careful architecture for cross-account protection.
RDS Snapshot Limitations
RDS Snapshot Workflow
Why the Two-Step Copy?
RDS doesn't support direct cross-region sharing. The shared snapshot must first be copied within the same region to transfer ownership to the vault account. Only after the vault account owns the snapshot can it be copied cross-region. This ensures true air-gap isolation since the vault account has independent ownership.
Both EBS and RDS snapshots support customer-managed KMS keys, providing encryption sovereignty critical for regulatory compliance.
Key Isolation
Vault account uses separate KMS keys that source account cannot access
Automated Rotation
KMS automatic key rotation enabled without disrupting snapshots
CloudTrail Audit
All KMS key usage logged for compliance and forensics
Zero-Knowledge
Only you control encryption keys - MSP cannot decrypt your data
When sharing encrypted snapshots, specific KMS key permissions are required. Air Gap Recover handles this automatically.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowVaultAccountToUseKey",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::VAULT-ACCOUNT-ID:root"
},
"Action": [
"kms:DescribeKey",
"kms:CreateGrant"
],
"Resource": "*",
"Condition": {
"StringEquals": {
"kms:ViaService": [
"ec2.us-east-1.amazonaws.com",
"rds.us-east-1.amazonaws.com"
]
}
}
}
]
} Example KMS key policy for encrypted snapshot sharing (source account)
For EBS volumes, AWS Data Lifecycle Manager (DLM) provides enterprise-grade automation for snapshot creation and cross-account sharing.
Tag-Based Discovery
Customers control exactly what gets protected by adding AWS resource tags. Simply tag an EBS volume or RDS database with DisasterRecovery:Protection=true and it will automatically be included in the next snapshot cycle. No manual configuration required.
Restore from any snapshot in your retention window
Launch infrastructure in alternate AWS region from snapshots
Launch snapshots in isolated environment for malware scanning
The vault organization is secured using AWS Control Tower, Service Control Policies (SCPs), and strict IAM policies to ensure data cannot be tampered with or deleted.
Your vault organization is governed by AWS Control Tower, which provides:
Account Factory
Automated provisioning of vault accounts with pre-configured security guardrails
Guardrails
Preventive and detective controls enforced across all accounts
Centralized Logging
CloudTrail and Config logs aggregated in a secure log archive account
Compliance Dashboard
Real-time visibility into compliance status and drift detection
SCPs enforce organization-wide restrictions that cannot be overridden, even by the account root user:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Deny",
"Action": [
"s3:DeleteObject",
"s3:DeleteObjectVersion",
"s3:PutLifecycleConfiguration"
],
"Resource": "arn:aws:s3:::vault-*/*",
"Condition": {
"StringNotEquals": {
"aws:PrincipalOrgID": "o-vaultorgid"
}
}
},
{
"Effect": "Deny",
"Action": [
"rds:DeleteDBSnapshot",
"rds:DeleteDBClusterSnapshot",
"ec2:DeleteSnapshot"
],
"Resource": "*"
}
]
} Example SCP preventing deletion of vault objects and snapshots
Access to the vault organization requires:
Air Gap Recover exclusively uses AWS-managed services. Here's the complete list of AWS services that power the solution:
Storage & Data
Security & Governance
Automation & Orchestration
Monitoring & Alerting
Zero Custom Infrastructure
Notice what's NOT on this list: No EC2 instances, no custom databases, no third-party agents, no proprietary storage systems. Every component is a fully-managed AWS service with AWS SLAs.
Service Support Matrix
| Service | Protection Method | Cross-Account |
|---|---|---|
| Amazon S3 | Cross-Region Replication | ✓ |
| Amazon RDS | Automated Snapshots | ✓ |
| Amazon Aurora | Cluster Snapshots | ✓ |
| Amazon EBS | Volume Snapshots | ✓ |
| Amazon EFS | EFS Replication | ✓ |
| FSx for Windows/Lustre | FSx Backups | ✓ |
Talk to our team and see how easy AWS-native disaster recovery can be.