Gunakala, Kiran Kumar (2025) Zero-trust architecture for secure real-time information sharing in defense and aerospace applications. World Journal of Advanced Engineering Technology and Sciences, 15 (2). pp. 1016-1023. ISSN 2582-8266
![WJAETS-2025-0640.pdf [thumbnail of WJAETS-2025-0640.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJAETS-2025-0640.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
Zero-trust architecture represents a transformative approach to securing defense and aerospace information systems. Traditional security models centered on perimeter defenses fail to address modern threats that often originate from compromised credentials and persist undetected for months. This article explores the implementation of zero-trust principles using SAP Business Technology Platform services to create a comprehensive security framework for defense applications. Based on continuous verification and least privilege access, the zero-trust model delivers substantial improvements in threat detection, response times, and overall security posture. The framework leverages four key components: identity and access management, API security, data protection, and systems integration to address the unique challenges of defense environments, including multi-classification data handling, coalition operations, and disconnected functionality. A case study involving an integrated air defense system demonstrates significant operational improvements, including faster information sharing, enhanced decision cycles, and improved intercept rates. The implementation faces notable challenges related to legacy system integration, bandwidth constraints, cross-domain data handling, and disconnected operations, with specific mitigation strategies proving highly effective across deployment scenarios. This architectural approach offers defense and aerospace organizations a robust foundation for secure information sharing that maintains operational effectiveness while significantly reducing security vulnerabilities.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjaets.2025.15.2.0640 |
Uncontrolled Keywords: | Zero-Trust Architecture; Defense Cybersecurity; Real-Time Information Sharing; SAP Business Technology Platform; Cross-Domain Security |
Depositing User: | Editor Engineering Section |
Date Deposited: | 04 Aug 2025 16:34 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/3658 |