THE SECURITY BRUTALIST

Security Brutalism 3-Year Implementation - Booklet

I recently gave a presentation introducing the concept of Security Brutalism and handed out a companion booklet to the attendees. I initially included the booklet at the end of my post about the presentation, but a few readers requested that I share it separately — so here it is.

The Booklet

This plan outlines a 3-year strategy for implementing Security Brutalism principles within an organization. It provides a roadmap for gradually transitioning from a potentially complex and costly security approach to a more streamlined, resilient, and efficient one.

Vision: To establish a security posture that is robust, resilient, and cost-effective, aligned with the principles of Security Brutalism, and that effectively protects the organization's assets while enabling business objectives.

Please note that the timelines presented are based on an ideal scenario. To make them realistic for your specific context, you'll need to adjust them based on factors such as your organization's size, the dedicated team resources, and the level of leadership support for this program.

Guiding Principles:

Year 1: Assessment and Foundation

Phase 1: Security Assessment and Gap Analysis (3 Months)

Phase 2: Establish Brutalism Principles and Governance (3 Months)

Phase 3: Pilot Project Implementation (6 Months)

Year 2: Broadening Implementation

Phase 4: Expand Brutalism Implementation (12 Months)

Year 3: Optimization and Refinement

Phase 5: Optimize and Mature (12 Months)

Security Brutalism Runbook

This runbook provides detailed, step-by-step instructions for implementing specific Security Brutalism principles within the organization. It is a living document that will be updated and expanded as the implementation progresses.

Core Principle: Simplicity

Example:
System: Vulnerability Management
Complexity Driver: Using three different scanning tools with overlapping functionality.
Solution: Consolidate to a single, comprehensive vulnerability management platform, and automate scanning and reporting.

Core Principle: Resilience

Example:
System: Authentication System
Resilience Measures: Implement a redundant authentication server setup with automatic failover, and use multi-factor authentication (MFA) to reduce the impact of compromised credentials.

Core Principle: Transparency

Example:
System: Firewall Rules
Transparency Improvements: Document each firewall rule with a clear description of its purpose, the systems it applies to, and the justification for its existence. Use a centralized firewall management system with audit trails.

Core Principle: Functionality

Example:
Threat: Phishing Attacks
Functional Security Measure: Implement a multi-layered approach that includes employee training and awareness programs focused on recognizing phishing emails, email filtering to block known phishing attempts, and technical controls to prevent users from clicking on malicious links or downloading malicious attachments.

Core Principle: Efficiency

Example:
Inefficient Process: Manually reviewing firewall logs.
Efficiency Improvement: Implement a SIEM system to automate log analysis and alert on suspicious activity.

Core Principle: Defense in Depth (Simplicity Focused)

Example:
Asset: Customer Database
Security Layers: Perimeter Security: A simple, well-configured firewall with only essential ports open. Network Security: Network segmentation to isolate the database server, and intrusion detection/prevention. Host Security: A hardened operating system with only necessary services running, and host-based intrusion detection. Application Security: Secure coding practices, input validation, and output sanitization in the database application. Data Security: Encryption of the database at rest and in transit, and strict access controls.

Closing

This 3-year plan and runbook provide a comprehensive framework for implementing Security Brutalism. Remember that this is an iterative process, and the plan and runbook should be regularly reviewed and updated as needed.