Back to Knowledge Vault
Explainer10 July 20254 min read
OSI Model: Everything You Need to Know
Updated July 2025 | Estimated read time: 9 minutes | Published by Firevault Contents What Is the OSI Model? The 7 Layers Explained Modern Threats Across the…

Mark Fermor
Director & Co-Founder, Firevault

Updated July 2025 | Estimated read time: 9 minutes | Published by Firevault
Contents
- What Is the OSI Model?
- The 7 Layers Explained
- Modern Threats Across the OSI Stack
- Where Firevault Fits
- CSPaaS: Securing All 7 Layers
- Compliance & Security Frameworks
- Frequently Asked Questions
- Firevault’s Verdict
What Is the OSI Model?
The Open Systems Interconnection (OSI) Model is a universal reference model used to describe how data moves through a digital network. Created by the International Organisation for Standardization (ISO), it divides digital communication into seven layers, from the physical transmission of bits to human-facing applications. It remains foundational for designing secure systems, troubleshooting connectivity, and defending against multi-layered attacks.The 7 Layers Explained
Layer Name Function 7 Application User-facing software, protocols (HTTPS, FTP, DNS) 6 Presentation Data formatting, encryption, translation (SSL, TLS) 5 Session Connection setup, management, termination 4 Transport Reliable transmission (TCP/UDP, ports) 3 Network Routing, addressing (IP, routers) 2 Data Link MAC addressing, switching (Ethernet, VLANs) 1 Physical Cables, NICs, voltage, RF signalsModern Threats Across the OSI Stack
Each OSI layer presents a unique attack surface. Cybercriminals don’t just operate at one level, they move laterally and vertically:- Physical (L1): Cable tapping, electromagnetic leaks, fault injection, rogue hardware
- Data Link (L2): ARP spoofing, MAC flooding, switch hijacks
- Network (L3): IP spoofing, route hijacking, DDoS
- Transport (L4): Port scans, SYN floods, DoS via TCP manipulation
- Session (L5): Session hijacking, token theft, connection abuse
- Presentation (L6): Protocol downgrade attacks, SSL stripping, malformed payloads
- Application (L7): SQL injection, phishing, credential stuffing, XSS
Where Firevault Fits
Firevault – Offline Digital Vault
Firevault avoids the OSI stack entirely. It stores data in a physically disconnected environment with no broadcast, no route, and no exposure. This means:- No Layer 1 risk: No signal = no interception, fault injection, or rogue hardware threats.
- No Layer 2–4 exposure: MAC spoofing, IP hijacking, port-based threats are impossible.
- No Layer 5–7 vulnerabilities: Apps can’t exploit what isn’t online. Firevault is invisible by design.
CSPaaS: Securing All 7 Layers
Firevault CSPaaS extends this model. It offers forensic-grade, modular security controls that align with each OSI layer:- Layer 1 – Lock: Electrically isolates ports and power paths. Controls device visibility at the physical layer.
- Layer 2 – Fracture: Performs segmentation at the hardware and MAC level, no VLAN bypass risk.
- Layer 3 – Relay: Breaks the route chain for sensitive communications. DNS and routing rules applied at gateway level.
- Layer 4 – Execute: Limits transport-layer exposure using closed command rules and protocol isolation.
- Layer 5–7 – Vault: Handles data session, format, and access in a controlled, timed, and identity-locked space. No live sessions are allowed beyond defined rulesets.
Compliance & Security Frameworks
By isolating from the OSI model and selectively controlling interaction points, Firevault strengthens compliance posture against:- ISO/IEC 27001: Access control, asset protection, audit readiness
- NIST CSF: Aligns with “Protect” and “Recover” functions by eliminating lateral risk
- NIS2 & GDPR: Segmenting critical data, ensuring data minimisation, and demonstrating integrity
- IEC 62443: Ideal for OT and industrial environments, vaults operate without converging IT/OT risk


