Cyber situational awareness (CyberSA) is the ability of commanders and security operators to perceive, comprehend, and project the current state of the cyber environment as it affects military operations. It is a command function, not merely a security operations function — the distinction matters because it drives a fundamentally different design philosophy for the tools and dashboards that support it.
A traditional Security Operations Center dashboard is optimized for security analysts: high-density alert queues, detailed event timelines, investigation workflows. A CyberSA dashboard for commanders must present synthesized, actionable status: which systems are at risk, what actions are underway, and what the operational impact of ongoing cyber activity is — all in a format consumable by an officer under time pressure who is simultaneously managing other operational domains.
What Cyber Situational Awareness Means for Commanders
The Endsley model of situational awareness — perception, comprehension, projection — maps directly onto the CyberSA problem. Perception is the collection of raw data: network telemetry, endpoint events, SIEM alerts, vulnerability scan results, threat intelligence feeds. Comprehension is the synthesis of those raw signals into a coherent picture of the current security state: what is normal, what is anomalous, what is known-bad. Projection is the forward estimate: based on the current state, what is likely to happen in the next 15 minutes, next hour, next day?
Commanders need comprehension and projection. Analysts need perception as well. The CyberSA dashboard must serve both, and the data pipeline underneath must support both levels of abstraction simultaneously.
The operational dimensions that matter most for commanders are: availability (are the systems I depend on operational?), integrity (have any systems been compromised in ways that might affect the reliability of the information they provide?), and offensive activity (are adversaries actively targeting my force's cyber infrastructure, and at what intensity?). These three dimensions map directly onto dashboard design: a persistent status layer showing system health, an incident layer showing active compromises, and a threat activity layer showing adversary actions directed at the force.
Data Sources: Building the Sensor Stack
Network telemetry is the highest-fidelity real-time data source for CyberSA. Full packet capture at chokepoints, NetFlow/IPFIX records from network infrastructure, and DNS query logs together provide a comprehensive view of what is communicating with what. Network telemetry is the ground truth for detecting lateral movement, data exfiltration, and command-and-control communications — all high-priority signals for a CyberSA platform.
CTI feed integration adds the context layer: known bad infrastructure, known threat actor TTP patterns, recent campaign indicators. A CyberSA platform that can automatically correlate network telemetry against a live CTI feed and surface matches in real time provides qualitatively better situational awareness than one operating on telemetry alone. The correlation lag matters: a CTI match that takes 45 seconds to surface is far more valuable than one that takes 45 minutes.
SIEM alerts provide the processed detection layer: events that have already passed through correlation rules and are above the alerting threshold. SIEM alerts are not real-time in the same way that telemetry is — there is processing and enrichment latency of 30 seconds to several minutes — but they carry much higher signal-to-noise ratios and are appropriate for the commander-level dashboard layer.
Vulnerability scan results from continuous vulnerability management infrastructure (Tenable, Qualys, or open-source tools like OpenVAS) feed the attack surface layer: which systems have known unpatched vulnerabilities, ranked by exploitability and criticality. This layer is not real-time but is essential for the projection function — a commander can see that their key command-and-control infrastructure carries three unpatched critical vulnerabilities that are actively being exploited in the wild.
Dashboard Architecture: Stream Processing and Aggregation
The data volumes involved in real-time CyberSA require a stream processing architecture, not a batch processing one. Kafka is the standard message broker for this type of architecture: log sources publish events to Kafka topics, and stream processing engines (Kafka Streams for simpler transformations; Apache Flink for complex event processing and stateful operations) consume those topics, apply enrichment and aggregation logic, and publish results to downstream consumers.
The alerting layer uses threshold-based and anomaly-based triggers on the stream. Threshold triggers fire when a metric crosses a predefined value (e.g., DNS query rate to a specific domain exceeds 100/minute). Anomaly triggers fire when a metric deviates significantly from its statistical baseline (e.g., outbound byte count from a server that normally generates 10 MB/hour is now generating 2 GB/hour). Both trigger types publish to the incident management layer and optionally to the SOAR automation layer.
The aggregation layer produces the summary metrics that populate the command dashboard: count of active high-severity alerts, number of systems in incident status, threat activity index (a composite score derived from CTI and telemetry), and availability status per system category. These aggregations run on sliding time windows (last 5 minutes, last hour, last 24 hours) to support both real-time and trending views.
Physical and Cyber Integration: Overlaying Incidents on the Operational Map
The highest-value feature of a military CyberSA platform — and the one that most clearly differentiates it from a commercial SOC — is the ability to overlay cyber incidents on the operational map. A cyber intrusion affecting a logistics management system is more or less serious depending on which units it supports. A denial-of-service attack against a communications relay is more or less serious depending on which operational elements depend on that relay.
Physical-cyber integration requires two capabilities: geolocation of cyber assets (mapping each system to its physical location and associated operational unit), and operational impact assessment (mapping each system to the operational functions it supports). With these two data layers, a commander can see a CyberSA overlay on their common operational picture: systems in incident status shown at their physical locations, connected by dependency lines to the units they support.
The technical implementation requires maintaining a Configuration Management Database (CMDB) that stores both the cyber attributes of each asset (IP address, system function, software inventory, vulnerability status) and its physical-operational attributes (location, supporting unit, operational criticality). This CMDB becomes the authoritative data source for both the CyberSA platform and the broader operational planning process.
Alert Triage UX: Design for Time-Pressed Operators
Alert fatigue is the primary failure mode of security dashboards in operational environments. When the alert queue contains hundreds of items and all of them are displayed with equal visual weight, operators stop reading the queue. CyberSA dashboard design must be opinionated about severity ranking and must make the highest-severity items impossible to miss.
Severity classification must be automated and based on operational impact, not just technical severity. A medium-severity vulnerability on a battle management system is operationally more critical than a high-severity vulnerability on an administrative workstation. The severity ranking algorithm must incorporate the asset's operational criticality from the CMDB, not just the CVSS score of the associated vulnerability or alert.
One-click response actions reduce the cognitive load for time-pressed operators by pre-computing the appropriate response for each alert type and presenting it as a single button. The operator reviews the alert context and the recommended action, approves it, and the SOAR automation layer executes the response — isolating the affected system, blocking the malicious IP, escalating to the incident management workflow. The alternative — requiring the operator to navigate to a separate SOAR console, find the relevant playbook, manually configure the response parameters, and execute — adds 5–10 minutes to the response time and introduces decision-making overhead under pressure.
Key insight: The biggest failure mode in CyberSA platform design is building a system optimized for the tool implementers rather than for the commanders who must use it. Technical teams building security platforms tend to maximize information density. Commanders under operational pressure need information reduction — the platform must surface the three things that matter right now, not the three hundred things that might matter.