Modular Open Systems Architecture (MOSA) is now foundational to Army aviation modernization. It promises faster upgrades, reduced vendor lock-in, and systems that can evolve at the speed of mission need.
But MOSA also introduces a hard reality: modularity fundamentally changes the cybersecurity problem.
More connectivity, more software components, and more third-party integration dramatically expand the attack surface. For aviation platforms operating under strict real-time, safety, and airworthiness constraints, this creates risk that traditional cybersecurity approaches are not designed to handle.
The question is no longer whether MOSA is the right direction.
The question is how to secure MOSA without slowing it down.

Why Traditional Cybersecurity Doesn’t Scale to Aviation MOSA
Most enterprise cybersecurity solutions assume general-purpose operating systems, abundant resources, flexible software-operation requirements, and the ability to patch frequently.
Aviation systems live in a very different world.
In avionics:
- Software changes can trigger lengthy recertification cycles
- Systems are highly constrained and safety-critical
- Each MOSA module may come from a different vendor, with different security assumptions
As MOSA accelerates integration and reuse, these realities can turn cybersecurity into a bottleneck. The result is slower response to emerging threats, precisely when speed matters most.
Secure MOSA: Security as an Enabler, not a Constraint
The Secure MOSA approach starts with a simple premise: security must be embedded into the architecture, not bolted on afterward.
Rather than forcing avionics systems to conform to enterprise IT models, Secure MOSA integrates modern security techniques in a way that:
- Preserves modularity
- Minimizes recertification impact
- Enables continuous visibility and control
This aligns directly with the Department of War’s Zero Trust mandate, not as policy language, but as executable system design. This is where platforms like LYNX MOSA.ic™ play a critical role, providing a safety-certifiable, MOSA-aligned hypervisor foundation where security services can operate consistently across heterogeneous workloads.
Why Unikernels Change the Equation
A key insight from Secure MOSA work is that reducing the attack surface matters as much as defending it. Simply put: you can’t exploit code that doesn’t exist.
Unikernels are highly specialized software images that combine an application with only the minimal operating system components required to run it, nothing more. There is no general-purpose OS, no unused services, and no runtime mutability.
For aviation MOSA systems, this delivers meaningful advantages:
- Dramatically smaller attack surfaces
- Fewer components to certify and verify
- Strong isolation between modular services
DESE Research and Lynx have demonstrated that modularity, safety, and security can coexist in a single architecture by deploying avionics microservices as Unikernels on LYNX MOSA.ic operated alongside more traditional, Linux-based components.
Zero Trust at Runtime, Not Just on Paper
Secure MOSA goes beyond design theory. Demonstrations of a Zero Trust Operating Stack showed:
- Continuous introspection and telemetry across software modules, including Lynx “shadow layer” telemetry, provides the behavioral visibility needed to understand not just what software is running, but how it is behaving during mission execution. This runtime awareness is essential to achieving continuous verification in aviation systems.
- Detection of live cyber-attacks, including memory corruption and denial-of-service.
- Automated recovery through reset-based mitigation.
Importantly, these capabilities operated at runtime, enabling continuous verification, a core Zero Trust principle that traditional avionics architectures struggle to achieve. While other types of cybersecurity technologies are geared towards protecting against known attack signatures, this type of health and behavioral monitoring is specifically designed to detect zero-day attacks, software supply chain attacks, or advanced persistent threats where the adversary may already be present in the technology stack of weapon systems.
“Never Trust, Always Verify”
Security That Also Buys Down Cost and Schedule
Security is often viewed as a cost driver. DESE and Lynx have found the opposite can be true.
By minimizing software scope, isolating services, and enabling modular updates, a Secure MOSA approach can reduce:
- Onboarding difficulty
- Debugging complexity
- Deployment effort
- Migration and integration cost
For programs under pressure to modernize faster and deliver more capability, this combination of improved security and velocity is transformative.
Looking Ahead
MOSA is the backbone of future Army aviation. But MOSA without security is a liability.
Secure MOSA, built on Zero Trust principles and enabled by technologies like Hypervisors, Unikernels, introspection, and telemetry analysis, offers a path where systems can evolve rapidly without sacrificing trust, safety, or mission assurance.
In an era where cyber threats evolve as fast as software itself, rapid, yet secure adaptation may be MOSA’s most important capability.
Get in Touch
Partner with Lynx to embed Zero Trust directly into your avionics architecture with LYNX MOSA.ic, delivering certifiable isolation, runtime enforcement, and secure modularity without compromising performance or certification timelines.
www.lynx.com
Engage DESE Research to collaborate on next-generation approaches to modular security, runtime cyber resilience, and high-assurance system design for defense platforms.