THE SECURITY BRUTALIST

Brutalist Security Architecture: Part 3 - The Program

(Part 3 of 4)

This program is built on the core tenets of brutalist security and the fundamentals of security in general: Fundamentals Controls, Automation-First, Transparency, Assume Breach, Continuous Validation, Minimalist Tooling, and Focus on Outcomes.

The aim is to make security architecture a non-negotiable part of how the company operates, not a suggestion, essentially become part of the integral fabric of a company, one that is unambiguous and actionable. This approach represents one possible implementation; there are many others. Finding what works for your specific organization is crucial.

Establish the "Security Architecture Mandate" (the brutalist policy)

  1. Formal Document: Create a concise, one-page document titled "Security Architecture Mandate." This is the company's official position on security architecture. Needs the signature and OK from all executive leadership.
  2. Core Principles (unambiguous language is a must):
  3. Leadership Endorsement: This mandate must be signed by the CEO or equivalent top-level executive to signify its authority.
  4. Distribution: The mandate is distributed to all employees, especially those in engineering, development, and product management, and is a required reading for new technical hires. Functions that develop business processes that manipulate or distribute sensitive information are also expected to know and abide by the mandate.

Mandatory Security Architecture Integration Points

  1. Project Inception (The Security Architecture Gate):
  2. Software Development Lifecycle (SDLC) Enforcement:
  3. Vendor and Third-Party Onboarding (The Security Vetting Process):

Empowerment and Accountability

  1. Security Architecture Team Authority: The security architecture team has the authority to enforce the Security Architecture Mandate. They are not advisors; they are enforcers of the company's security principles.
  2. Developer and Engineer Responsibility: Developers and engineers are accountable for implementing security controls as defined by the security architects. This is part of their performance evaluation.
  3. Leadership Accountability: Project managers and product owners are accountable for ensuring that projects adhere to the Security Architecture Mandate. They cannot bypass the security architecture gate.

Continuous Improvement and Brutalist Metrics

  1. Regular Audits (Automated): Automate regular audits of security controls to ensure compliance with the Security Architecture Mandate.
  2. Brutalist Security Metrics: Track metrics that align with the brutalist principles, for example:
  3. Mandate Review: The Security Architecture Mandate is reviewed and updated at least annually to ensure it remains relevant and effective.

In Short

This approach makes security architecture a fundamental, unavoidable, and clearly defined aspect of the company's operations. It's designed to be simple enough for everyone to understand and too important to ignore.