Back to Knowledge Vault
Explainer10 July 20254 min read
OSI Model: Everything You Need to Know
Updated July 2025 | Estimated read time: 9 minutes | Published by Firevault Contents What Is the OSI Model? The 7 Layers Explained Modern Threats Across the…

Mark Fermor
Director & Co-Founder, Firevault

Updated July 2025 | Estimated read time: 9 minutes | Published by Firevault
Contents
- What Is the OSI Model?
- The 7 Layers Explained
- Modern Threats Across the OSI Stack
- Where Firevault Fits
- CSPaaS: Securing All 7 Layers
- Compliance & Security Frameworks
- Frequently Asked Questions
- Firevault’s Verdict
What Is the OSI Model?
The Open Systems Interconnection (OSI) Model is a universal reference model used to describe how data moves through a digital network. Created by the International Organisation for Standardization (ISO), it divides digital communication into seven layers, from the physical transmission of bits to human-facing applications. It remains foundational for designing secure systems, troubleshooting connectivity, and defending against multi-layered attacks.The 7 Layers Explained
Layer Name Function 7 Application User-facing software, protocols (HTTPS, FTP, DNS) 6 Presentation Data formatting, encryption, translation (SSL, TLS) 5 Session Connection setup, management, termination 4 Transport Reliable transmission (TCP/UDP, ports) 3 Network Routing, addressing (IP, routers) 2 Data Link MAC addressing, switching (Ethernet, VLANs) 1 Physical Cables, NICs, voltage, RF signalsModern Threats Across the OSI Stack
Each OSI layer presents a unique attack surface. Cybercriminals don’t just operate at one level, they move laterally and vertically:- Physical (L1): Cable tapping, electromagnetic leaks, fault injection, rogue hardware
- Data Link (L2): ARP spoofing, MAC flooding, switch hijacks
- Network (L3): IP spoofing, route hijacking, DDoS
- Transport (L4): Port scans, SYN floods, DoS via TCP manipulation
- Session (L5): Session hijacking, token theft, connection abuse
- Presentation (L6): Protocol downgrade attacks, SSL stripping, malformed payloads
- Application (L7): SQL injection, phishing, credential stuffing, XSS
Where Firevault Fits
Firevault – Offline Digital Vault
Firevault avoids the OSI stack entirely. It stores data in a physically disconnected environment with no broadcast, no route, and no exposure. This means:- No Layer 1 risk: No signal = no interception, fault injection, or rogue hardware threats.
- No Layer 2–4 exposure: MAC spoofing, IP hijacking, port-based threats are impossible.
- No Layer 5–7 vulnerabilities: Apps can’t exploit what isn’t online. Firevault is invisible by design.
CSPaaS: Securing All 7 Layers
Firevault CSPaaS extends this model. It offers forensic-grade, modular security controls that align with each OSI layer:- Layer 1 – Lock: Electrically isolates ports and power paths. Controls device visibility at the physical layer.
- Layer 2 – Fracture: Performs segmentation at the hardware and MAC level, no VLAN bypass risk.
- Layer 3 – Relay: Breaks the route chain for sensitive communications. DNS and routing rules applied at gateway level.
- Layer 4 – Execute: Limits transport-layer exposure using closed command rules and protocol isolation.
- Layer 5–7 – Vault: Handles data session, format, and access in a controlled, timed, and identity-locked space. No live sessions are allowed beyond defined rulesets.
Compliance & Security Frameworks
By isolating from the OSI model and selectively controlling interaction points, Firevault strengthens compliance posture against:- ISO/IEC 27001: Access control, asset protection, audit readiness
- NIST CSF: Aligns with “Protect” and “Recover” functions by eliminating lateral risk
- NIS2 & GDPR: Segmenting critical data, ensuring data minimisation, and demonstrating integrity
- IEC 62443: Ideal for OT and industrial environments, vaults operate without converging IT/OT risk
Frequently Asked Questions
Is Firevault a network security tool? No. Firevault works below and outside the network stack. It removes the most sensitive assets from the digital path altogether. Can I use Firevault alongside traditional OSI-based tools? Yes. Think of Firevault as an offline escape hatch for your crown-jewel data, used alongside but outside your live infrastructure. Does CSPaaS replace my firewall or endpoint tools? No, it integrates with them, applying policy at a lower, disconnected, or segmented layer that traditional tools can’t reach. How does this help in ransomware protection? Ransomware operates across L3–L7. Firevault eliminates the attack surface entirely by making target files unreachable and undetectable.Firevault’s Verdict
The OSI model remains essential to understanding how systems connect, and how attackers move. But Firevault offers something OSI never accounted for: total disconnection. When your most valuable files don’t participate in digital conversations, they don’t risk interception, corruption, or encryption. Firevault Offline Vaults make security physical. CSPaaS turns that philosophy into a scalable platform, protecting the layers attackers live in, and eliminating the ones they need. ↑ Back to topSuggested Reading
- What is Offline Secure StorageThe foundation of physical disconnection
- Why Offline Secure StorageThe case for physical control
- Ransomware DefenceHold gold copies offline
- Firevault ControlPhysical path control for IT and OT
- Knowledge VaultAll articles, guides and whitepapers
- Book a DemoSee Firevault in action





