Securing Defense Networks in 2025: Why Zero Trust & AUNP 2.0 Are Critical
Benita Sophia Michael
In 2025, traditional perimeter defense is obsolete. As cyber adversaries grow more sophisticated, the DoD is pivoting toward a Zero Trust paradigm and a Unified Network Plan. Learn how continuous authentication, data-centric encryption, and resilient infrastructure like COE and CTL are becoming the new "survival insurance" for modern multi-domain operations.

If you think of traditional network defence like a medieval castle — high walls, a moat, guarded gates — you’re thinking of the “old way.” But in 2025, that model is already obsolete. Cyber adversaries (whether state-sponsored, mercenaries, or hybrid hackers) don’t always knock on the gate — they slip through back doors, compromise trusted devices, or intercept data mid-transit.
That’s why modern military and government networks are shifting to a new security paradigm: one built around zero trust, data-centric protection, and unified, resilient infrastructure.
Let’s talk about how this shift works — the architecture, the policies, and what “being truly secure” means today.
What is “Zero Trust” for Defence — and why it matters
- Zero trust doesn’t trust. Period. It assumes that once an adversary is inside — maybe via credential theft or a compromised device — they could move laterally, steal data, or disrupt operations. So instead of “network perimeter = safe zone,” zero trust enforces continuous verification of users, devices, data, and services.
- In the defense context, that is critical: leaking mission-data, communications, logistics or intelligence can mean serious compromise of national security or troop safety — especially in contested environments or when working with allies/partners.
- The shift is formal. DoD’s official Zero Trust Strategy and Roadmap envisions a full transformation by fiscal year 2027: replacing legacy “castle-and-moat” models with continuous authentication, data-centric controls, and stricter access policies.
Core Architectural Components: What the New Defence Network Looks Like
Modern defense-grade networks aren’t just “better firewalls.” They lean on a comprehensive, unified design. The architecture discussed in the latest plans includes:
Unified Network Framework
- The new network under Army Unified Network Plan 2.0 (AUNP 2.0) uses a Common Operating Environment (COE), Common Services Infrastructure (CSI), and Common Transport Layer (CTL).
- COE ensures that applications — whether on base, in tactical deployment, or at the command center — follow the same standards, compatible security, and common protocols. That means secure interoperability, wherever soldiers or staff are deployed.
- CSI provides centrally managed compute, storage, data services — blending cloud-, hybrid-, or on-premises infrastructure — to allow secure data access, analytics, and mission-critical services even when connectivity is spotty.
- CTL ensures transport-agnostic connectivity: software-defined networking (SDN), encrypted transport, possibly leveraging 5G / modern comms — enabling secure, resilient global data flow, even in contested or remote environments.
Centralized Delivery of Services (CDS) & Unified Network Operations (UNO)
- Through CDS, the network’s services (communication, authentication, data access, security tools) are delivered centrally, not as disjoint “silos.” That reduces complexity, duplication, and security gaps.
- UNO provides comprehensive visibility and management: network planning, monitoring, configuration, security orchestration — crucial for cyber-defence, incident response, and maintenance across enterprise, tactical and partner networks.
Data-Centric Security Model
- Perhaps the biggest shift: the focus is not just on securing the perimeters or devices — it’s on securing the data itself. Under AUNP 2.0, protection travels with data, not just the network.
- That means object-level encryption, persistent tagging/labeling, role-based & least-privilege access, and strict identity verification — regardless of where data travels (on-base, cloud, allied network, tactical field) — reducing risk even if parts of the network are compromised or shared with partners.
Policies & Strategic Direction: Where Defence Is Headed
- The AUNP 2.0 released in March 2025 charts a roadmap: unify networks, enable multi-domain operations (air, land, sea, cyber, space), adopt zero trust, and modernize continuously.
- The DoD’s own DoD Zero Trust Strategy and Roadmap (from 2022, still being operationalized) defines the shift from network-centric to data-centric posture, laying out “target level” goals to be met by FY2027.
- Implementation is underway: organizations under DoD, including Army Cyber Command (ARCYBER) and network-management units such as Network Enterprise Technology Command (NETCOM), are actively aligning policy, identity-management, and continuous-verification mechanisms to build a unified ZT-based defence.
- The transition also includes open standards, modular architectures, and mission-partner environments — acknowledging that modern operations are joint, coalition-based, and multi-domain, often requiring secure data sharing with allies.
What “Zero Trust in Defence” Means on Ground — Practical Implications
Continuous Identity & Access Management (IAM)
Instead of “once you log in, you’re in,” systems require:
- recurring authentication,
- device posture checks,
- least-privilege assignment,
- just-in-time access for sensitive data. This reduces risk of compromised credentials or rogue devices moving laterally.
Data travelling safely — even across networks
Whether data moves from base to HQ, or from cloud to tactical edge — encryption, labeling, and access checks ensure that even if the network is breached, data remains secured and only accessible to authorized entities.
Unified and interoperable network, even under contested conditions
Using COE + CSI + CTL ensures interoperability, even in hybrid or degraded communications (satellite, 5G, mesh networks) — enabling mission continuity when infrastructure is stressed or disrupted.
Centralized visibility & orchestration — faster detection and response
With UNO + CDS + central monitoring, anomalous behavior — suspicious devices, unexpected data flows, unauthorized access attempts — can be detected and isolated quickly, limiting blast radius, improving resilience, and enabling rapid remediation.
Adaptability for coalition, allied, and partner networks
Open standards and data-centric ZT make it easier to securely share information with allies / mission partners, without exposing entire networks. That’s essential in joint operations or multi-domain missions.
Why This Matters — Because Perimeter Defences Are No Longer Enough
- Adversaries today are well-funded, patient, and sophisticated: infiltration via supply-chain, compromised insider devices, credential theft, or cloud misconfigurations are all realistic.
- Once inside, traditional “castle-and-moat” networks give attackers free reign — until detection, which may come too late.
- Data flows across multiple domains (tactical field, enterprise HQ, allied networks, cloud, mobile) — a perimeter that static walls can’t protect.
- In multi-domain operations where communications may traverse insecure or contested links, network-agnostic, resilient, and encrypted transport becomes mission critical.
Hence, zero trust + unified, data-centric architecture + centralized cyber-ops is not optional — it is survival insurance.
Practical Steps and Recommendations — What Defense Organizations Should Do (or Keep Doing)
| Step | What to Do / Focus On |
|---|---|
| 1. Embrace Zero Trust Mindset | Treat every user, every device, every data flow as untrusted until authenticated and authorized. Implement continuous authentication, micro-segmentation, least-privilege, and attribute-based access controls. |
| 2. Build Unified Network Infrastructure | Adopt frameworks like COE / CSI / CTL — infrastructure that works across bases, tactical deployments, cloud, and partner networks. Prioritize encrypted transport, SDN, and interoperability. |
| 3. Secure Data — Not Just Networks | Use data-centric protection: encryption, data tagging/labeling, persistent access controls. Ensure data stays protected even when crossing domains or networks. |
| 4. Centralize Management and Monitoring | Use unified orchestration (UNO/CDS), logging, analytics, anomaly detection, automated response. Maintain visibility across enterprise, tactical, and partner segments. |
| 5. Plan for DDIL (Denied / Disrupted / Intermittent / Limited) Environments | Ensure hybrid-compute, local caching, edge compute, robust transport methods, resilience for bandwidth-constrained or contested areas — especially for field operations. |
| 6. Promote Policy, Standards & Interoperability | Adopt open standards, compatible ZT frameworks (e.g. per DoD ZT Strategy), modular architectures. Ensure that coalition / allied / mission-partner integration does not weaken security. |
| 7. Continuous Training & Cyber Hygiene | Train personnel (not just IT staff) on zero-trust practices, identity hygiene, secure workflows. Emphasize “security-first” culture, because humans remain a weak link. |
Final Thoughts: Security Isn’t a Wall — It’s a Framework & Culture
Defending military or government networks today isn’t about building higher walls and hoping they hold. It’s about architecting trust carefully, managing data consistently, and embracing a zero-trust mindset across all layers — identity, device, network, data, and operations.
For defence organisations (and governments), adopting a unified, data-centric network with zero-trust at its core — like AUNP 2.0 — isn’t just a technical upgrade. It’s a strategic shift.
In a world where operations are joint, global, contested, and hybrid — where threats come from insiders, external adversaries, supply-chain attacks, or stealthy cyber espionage — only agile, resilient, zero-trust networks give a fighting chance.
Continue Reading
Explore more insights on GRC and enterprise risk management