As modern military operations increasingly rely on multinational partnerships, coalition forces need secure, agile ways to share information. The Department of Defense (DoD) has developed frameworks like Mission Partner Environments (MPEs) and Combined Joint All-Domain Command and Control (CJADC2) to support collaboration across domains—air, land, sea, cyber, and space. CJADC2 integrates capabilities across allies, enabling them to communicate and coordinate in real time.
To support these objectives, a Zero Trust architecture is fundamental to empowering warfighters with immediate access to the data and intelligence they need to make informed decisions that will determine mission success or failure and advance the CJADC2 vision. Zero Trust safeguards the data from adversaries, reinforcing operational resilience.
The Imperative for Secure, Cross-Domain Coalition Collaboration
Effective and secure data sharing lies at the heart of coalition operations. Zero Trust supports CJADC2 by establishing secure “Cyber Lines of Communication” (CLOCs) that don’t rely on a single, monolithic network architecture. Securing Lines of Communication is fundamental for military success in every warfighting domain. As documented by Karl von Clausewitz during the Napoleonic Wars, military strategists use LOCs to move critical resources around the battlefield, and in the cyber domain, that critical resource is information. By verifying every access request based on identity and context, Zero Trust enables real-time, secure data sharing across coalition partners. This approach eliminates implicit trust in network location and shifts security to the user and data level, aligning with CJADC2’s need for decentralized, responsive command and control
How Zero Trust Enables Mission Partner Environments within CJADC2
Zero Trust is also critical for MPEs, facilitating rapidly deployed, secure, and flexible access for CJADC2 operations across diverse coalition network requirements. CJADC2’s global scope requires MPEs to operate seamlessly across different infrastructures without relying on full network control. With Zero Trust, coalition forces securely exchange sensitive information through each partner’s infrastructure while minimizing risks associated with legacy, network-centric models.
Zero Trust enhances MPEs for CJADC2 in key ways:
- Enhanced Security Across Coalition Networks: By enabling identity- and policy-based access controls, Zero Trust reduces risks from unauthorized users and lateral movement within coalition networks. This approach meets CJADC2’s requirements for cross-domain information sharing, ensuring only verified coalition members can access specific data or applications.
- Greater Agility and Responsiveness: Zero Trust enables CLOCs, providing real-time access to critical applications and data. This flexibility supports CJADC2’s mission for agile, adaptable command structures, enabling coalition forces to respond effectively to changing conditions.
- Simplified Infrastructure and Reduced Costs: Zero Trust removes the need for extensive cross-domain solutions and network-specific security hardware, minimizing costs. Its transport-agnostic approach allows MPEs to use any network, including commercial internet, 5G, or satellite, empowering coalition forces to connect securely over available channels without complex network requirements.
Lessons from the Afghanistan Mission Network and SABRE
The DoD’s experience with the Afghanistan Mission Network (AMN) revealed the limitations of traditional, network-centric coalition environments. AMN’s federated architecture allowed coalition members access to a central NATO network but will struggle with scalability and agility for future conflicts. Building on these lessons, the DoD is developing the Secret and Below Releasable Environment (SABRE) program to support MPEs. Through Zero Trust principles, SABRE can enable coalition partners to use their own infrastructures while still securing access to shared applications and data. This approach aligns with CJADC2’s goal of flexible, unified command and control across coalition networks.
Balancing Security, Accessibility, and Agility in CJADC2
Zero Trust offers an effective model for balancing the three core requirements—security, accessibility, and agility – that coalition information sharing in CJADC2 demands:
- Security: Zero Trust enforces identity- and context-based controls at every interaction, reducing the risk of unauthorized access and lateral movement, even if a network is compromised. This principle strengthens MPEs supporting CJADC2, where data must be secured at each access point to protect sensitive, mission-critical information.
- Accessibility: By enabling secure access over any network, Zero Trust enhances connectivity across coalition forces, allowing for seamless data flow and collaboration regardless of infrastructure constraints. This ensures effective communication across all domains.
- Agility: Zero Trust allows MPEs to adjust access controls dynamically, delivering the agility CJADC2 requires to meet diverse mission demands. Coalition forces can respond quickly to real-time threats or operational changes without extensive network reconfigurations.
Balancing these factors ensures CJADC2 can deliver on its promise of unified, agile command and control across coalition forces, whether for peacekeeping, humanitarian relief, or combat operations.
Moving Forward: Zero Trust as a Key Enabler of CJADC2
CJADC2 requires secure, responsive information sharing across multiple domains, and Zero Trust provides the means to create CLOCs that adapt to coalition forces’ needs. As CJADC2 initiatives like SABRE progress, Zero Trust will play an essential role in creating a secure, interconnected command and control system that supports complex, multi-domain operations. In an era where military readiness depends on speed, security, and access, Zero Trust establishes the foundation for a responsive and secure coalition network, supporting both immediate mission success and long-term strategic objectives.
About the Author
Russ Smith is a Field CTO supporting Zscaler’s DoD Team. He joined Zscaler after a 30-year Air Force career culminating as the Deputy Chief Information Officer at the United States Special Operations Command. During his post-military career, he was a research analyst with the Institute for Defense Analyses, the vice president of the cyber practice at SAIC, and a security account lead at Accenture Federal Systems. Smith holds master’s degrees in Systems Technology (Joint Command, Control, Communications and Computers) from the Naval Postgraduate School and in Military Operational Art and Science from Air University, and a B.S. in Computer Information Science from Bloomsburg University of Pennsylvania. He is also certified as an Information Systems Security Professional, Project Management Professional, Chief Information Officer, and Chief Information Security Officer.