Recent Breaches
Breaches
View All →
Back to Knowledge Vault
Explainer10 July 20254 min read

OSI Model: Everything You Need to Know

Updated July 2025 | Estimated read time: 9 minutes | Published by Firevault Contents What Is the OSI Model? The 7 Layers Explained Modern Threats Across the…

Mark Fermor

Mark Fermor

Director & Co-Founder, Firevault

Share
Layered network cabling in a structured patch panel with blue and green indicator lights
Updated July 2025 | Estimated read time: 9 minutes | Published by Firevault

Contents

  1. What Is the OSI Model?
  2. The 7 Layers Explained
  3. Modern Threats Across the OSI Stack
  4. Where Firevault Fits
  5. CSPaaS: Securing All 7 Layers
  6. Compliance & Security Frameworks
  7. Frequently Asked Questions
  8. Firevault’s Verdict

What Is the OSI Model?

The Open Systems Interconnection (OSI) Model is a universal reference model used to describe how data moves through a digital network. Created by the International Organisation for Standardization (ISO), it divides digital communication into seven layers, from the physical transmission of bits to human-facing applications. It remains foundational for designing secure systems, troubleshooting connectivity, and defending against multi-layered attacks.

The 7 Layers Explained

Layer Name Function 7 Application User-facing software, protocols (HTTPS, FTP, DNS) 6 Presentation Data formatting, encryption, translation (SSL, TLS) 5 Session Connection setup, management, termination 4 Transport Reliable transmission (TCP/UDP, ports) 3 Network Routing, addressing (IP, routers) 2 Data Link MAC addressing, switching (Ethernet, VLANs) 1 Physical Cables, NICs, voltage, RF signals

Modern Threats Across the OSI Stack

Each OSI layer presents a unique attack surface. Cybercriminals don’t just operate at one level, they move laterally and vertically:
  • Physical (L1): Cable tapping, electromagnetic leaks, fault injection, rogue hardware
  • Data Link (L2): ARP spoofing, MAC flooding, switch hijacks
  • Network (L3): IP spoofing, route hijacking, DDoS
  • Transport (L4): Port scans, SYN floods, DoS via TCP manipulation
  • Session (L5): Session hijacking, token theft, connection abuse
  • Presentation (L6): Protocol downgrade attacks, SSL stripping, malformed payloads
  • Application (L7): SQL injection, phishing, credential stuffing, XSS
Traditional tools focus on firewalls, AV, or network monitoring. But attackers bypass or overwhelm those controls by targeting multiple layers at once.

Where Firevault Fits

Firevault – Offline Digital Vault

Firevault avoids the OSI stack entirely. It stores data in a physically disconnected environment with no broadcast, no route, and no exposure. This means:
  • No Layer 1 risk: No signal = no interception, fault injection, or rogue hardware threats.
  • No Layer 2–4 exposure: MAC spoofing, IP hijacking, port-based threats are impossible.
  • No Layer 5–7 vulnerabilities: Apps can’t exploit what isn’t online. Firevault is invisible by design.
Every time you place files inside Firevault, they drop out of the OSI model. You’re not encrypting risk, you’re removing it entirely.

CSPaaS: Securing All 7 Layers

Firevault CSPaaS extends this model. It offers forensic-grade, modular security controls that align with each OSI layer:
  • Layer 1 – Lock: Electrically isolates ports and power paths. Controls device visibility at the physical layer.
  • Layer 2 – Fracture: Performs segmentation at the hardware and MAC level, no VLAN bypass risk.
  • Layer 3 – Relay: Breaks the route chain for sensitive communications. DNS and routing rules applied at gateway level.
  • Layer 4 – Execute: Limits transport-layer exposure using closed command rules and protocol isolation.
  • Layer 5–7 – Vault: Handles data session, format, and access in a controlled, timed, and identity-locked space. No live sessions are allowed beyond defined rulesets.
CSPaaS doesn’t just defend every layer, it asserts policy across them, even in disconnected or hybrid environments.

Compliance & Security Frameworks

By isolating from the OSI model and selectively controlling interaction points, Firevault strengthens compliance posture against:
  • ISO/IEC 27001: Access control, asset protection, audit readiness
  • NIST CSF: Aligns with “Protect” and “Recover” functions by eliminating lateral risk
  • NIS2 & GDPR: Segmenting critical data, ensuring data minimisation, and demonstrating integrity
  • IEC 62443: Ideal for OT and industrial environments, vaults operate without converging IT/OT risk

Frequently Asked Questions

Is Firevault a network security tool? No. Firevault works below and outside the network stack. It removes the most sensitive assets from the digital path altogether. Can I use Firevault alongside traditional OSI-based tools? Yes. Think of Firevault as an offline escape hatch for your crown-jewel data, used alongside but outside your live infrastructure. Does CSPaaS replace my firewall or endpoint tools? No, it integrates with them, applying policy at a lower, disconnected, or segmented layer that traditional tools can’t reach. How does this help in ransomware protection? Ransomware operates across L3–L7. Firevault eliminates the attack surface entirely by making target files unreachable and undetectable.

Firevault’s Verdict

The OSI model remains essential to understanding how systems connect, and how attackers move. But Firevault offers something OSI never accounted for: total disconnection. When your most valuable files don’t participate in digital conversations, they don’t risk interception, corruption, or encryption. Firevault Offline Vaults make security physical. CSPaaS turns that philosophy into a scalable platform, protecting the layers attackers live in, and eliminating the ones they need. ↑ Back to top

About the author

Mark Fermor

Mark Fermor

Director & Co-Founder

The driving force behind Firevault's market presence, combining commercial vision with deep tech insight.

Share this article

Explainer10 July 20254 min read

OSI Model: Everything You Need to Know

Updated July 2025 | Estimated read time: 9 minutes | Published by Firevault Contents What Is the OSI Model? The 7 Layers Explained Modern Threats Across the…

OSI Model: Everything You Need to Know
Mark Fermor
Published by Mark Fermor, Director & Co-Founder