Skip to content

Operational Scenarios

Scenarios are solution-agnostic problem definitions for data-centric security in coalition environments. Each includes actors, operational flow, constraints, technical challenges, and measurable acceptance criteria.

Use these to understand what DCS needs to solve, evaluate coverage gaps, or scope a demonstration.


By theme

Coalition intelligence and strategic sharing

Sharing classified intelligence across national boundaries with different classification systems, clearance levels, and trust relationships.

# Scenario Coverage Key Challenge
01 Coalition Strategic Sharing High Multi-nation intelligence sharing with federated key management
05 Mission-Based Coalition Sharing Partial Time-limited, mission-scoped data access
06 Intelligence Fusion Centre Partial Multi-source intelligence fusion with provenance
12 Cyber Threat Intelligence Sharing None Multi-level CTI with machine-speed automated sharing
15 Counter-Hybrid Threat Intelligence None Civil-military fusion and disinformation response

Tactical and real-time operations

Time-critical data sharing where latency matters, connectivity is unreliable, and safety-of-life decisions depend on data access.

# Scenario Coverage Key Challenge
02 Tactical Unit-to-Unit None DDIL environments without strategic infrastructure
07 Coalition Air Operations Minimal Real-time data with safety-critical overrides
08 Maritime Domain Awareness Minimal Sensor fusion with compartmentalized access
10 Sensor-to-Shooter Data Chain None Automated classification downgrade and kill chain latency

Emerging and specialist domains

Newer operational areas where DCS intersects with AI, space, industrial partnerships, and military messaging systems.

# Scenario Coverage Key Challenge
11 Military Messaging (STANAG 4406) None Paragraph-level classification within military messages
13 Space Domain Awareness None Federated space data sharing across 17+ nations
14 AI/ML Data Sharing None Federated learning with data sovereignty and provenance

Enterprise, lifecycle, and legacy systems

Retrofitting existing systems, managing data across its lifecycle, and protecting industrial supply chains.

# Scenario Coverage Key Challenge
03 Legacy System Retrofit None Adding DCS to existing applications
04 Cross-Domain Sanitisation None Automated content redaction across classification domains
09 Disaster Recovery and Backup Partial Backup lifecycle with encrypted data
16 Defence Industrial Base None Export control enforcement (ITAR/EAR) and through-life support
17 Multinational Logistics None Aggregation sensitivity and DDIL-resilient forward logistics

DCS Level Scenarios

These define the acceptance criteria for each DCS protection level -- use them to validate an architecture against a specific level.

Level Scenario Key Focus
1 Basic Labelling Mandatory classification and releasability labels (STANAG 4774)
2 Enhanced Labelling Minimum Essential Metadata and ABAC policy enforcement
3 Cryptographic Protection Envelope encryption with per-classification keys and HMAC integrity

Coverage column

Coverage indicates how well the current reference architectures address each scenario. See the gap analysis for details on what's missing.