The study explores the risks and tradeoffs when adapting enterprise-IT security and zero trust principles to weapon systems.