THE SECURITY BRUTALIST

Security Brutalist Guide

TL;DR

Operate security through fundamentals that reliably reduce real risk. Favor simple, enforceable controls. Understand systems as they exist. Focus effort where attacks actually succeed. Maintain constant pressure on identity, access, exposure, and recovery.

Introduction

This document defines the Security Brutalist operating posture. It reflects a pragmatic approach to protecting high impact systems under real constraints, with small teams and limited budgets. It is intended to be used as an operational reference and default way of working, not as a conceptual framework.

Purpose and Worldview of Security

Security exists to protect systems that matter by increasing the effort, time, and uncertainty required to successfully compromise them. Attacks are expected. Failure is defined by impact, not by attempted intrusion. Security is effective when common attack paths are disrupted early, repeatedly, and predictably.

The worldview of Security Brutalism starts from reality rather than abstraction. Systems are imperfect, environments change constantly, and people optimize for getting work done. Attackers exploit the simplest available weakness, not the most sophisticated one. Most incidents follow familiar patterns such as excessive access, exposed services, weak authentication, unpatched software, and lack of visibility.

Security Brutalism rejects complexity as a default response. Complex controls fail quietly, degrade quickly, and require more coordination than small teams can sustain. Controls must survive operational pressure, staff turnover, and continuous change. Anything that cannot be enforced consistently becomes latent risk. Anything that does not influence decisions, access, or system behavior is noise.

Security succeeds when fundamentals are visible, enforced, and boring. When access is deliberately constrained. When exposure is intentional. When recovery is predictable. This worldview treats security as an operational discipline focused on durable risk reduction rather than theoretical coverage or framework alignment.

Brutalist Security Program and Teams

A security program exists to reduce known and repeatable failure modes in systems that matter. Work begins with understanding the current environment as it actually operates. Teams maintain a practical model of critical systems, data flows, trust boundaries, identity paths, and external exposure. This understanding is sufficient to explain where an attacker would start, how they would move, and which failures would cause real damage.

Planning and solutioning favor reduction before addition. Removing access, privileges, services, network paths, and dependencies is treated as progress. Security effort prioritizes narrowing what can be attacked and who can cause impact over introducing new tools or processes. Defaults are hardened, exceptions are rare, and reversibility is preferred over permanent expansion.

The program operates continuously rather than as a series of projects. Controls are assumed to decay through system change, configuration drift, and human behavior. Enforcement is routine and visible. Teams work in short cycles, identifying the most likely and most damaging attack paths and applying controls that directly interrupt those paths. Effectiveness is verified through observation, testing, and operational feedback rather than policy alignment.

Work is sequenced deliberately. Visibility comes first so decisions reflect reality. Control follows to reduce exposure and privilege. Monitoring supports those controls by making misuse and failure observable. Testing validates assumptions already enforced. Advanced detection, automation, and red team activity are deferred until fundamentals are stable and consistently applied.

Parallel initiatives are avoided. One control is implemented, enforced, and stabilized before another begins. Partial implementation is treated as unresolved risk. Decisions are written down with context, clear ownership, and explicit actions. Reviews focus on what reduced risk, what failed under pressure, and what degraded since the last cycle.

Security leadership owns prioritization and capacity. Work that does not reduce material risk is declined. Risk is expressed in operational terms such as downtime, data loss, recovery time, and blast radius. Program effectiveness is measured through outcomes such as reduced exposure, fewer privileged identities, faster detection, and predictable recovery. Team sustainability is protected deliberately, as exhausted teams miss fundamentals and fundamental failures cause incidents.

The program assumes pressure, constraint, and imperfect conditions. Success is defined by durability. Controls that continue to work during outages, incidents, and rapid change are favored over controls that require ideal conditions.

Fundamental Controls and Operational Hygiene

Identity is the primary security control and receives first priority. All access is tied to a known identity. Strong authentication is enforced wherever technically possible. Identity is centralized to the extent required to maintain visibility and control. Standing administrative access is eliminated in favor of time-bound or task-bound elevation. Access is reviewed regularly and removed when no longer justified. Dormant, shared, and orphaned accounts are treated as defects.

Asset awareness is maintained at a level sufficient for decision making. Systems that process sensitive data, provide external access, or support critical operations are always known and tracked. Ownership is explicit. Systems without owners are corrected or removed. Unknown systems are assumed insecure until proven otherwise.

Exposure is intentional. Internet-facing services are minimized and continuously reviewed. Network paths exist only when required for business function. Segmentation protects critical systems from general access. Unused services, ports, and protocols are disabled. Default deny is preferred wherever it can be enforced without breaking operations.

Vulnerability management focuses on what attackers exploit in practice. Patching is prioritized for identity infrastructure, internet-facing systems, endpoints, and widely used platforms. Exceptions are explicit, time-bound, and reviewed. Configuration weaknesses that enable common attack paths are treated with the same urgency as missing patches.

Backups are treated as production systems. Critical data is backed up in a way that prevents unauthorized modification and deletion. Restoration is tested regularly and recovery time is known. Backup failure is considered a security incident, not a maintenance issue. Logging supports detection, investigation, and recovery. Authentication events, privilege use, administrative actions, endpoint activity, and relevant network access are collected where feasible. Logs are protected from tampering and retained long enough to support incident response. Alerts are few, reliable, and tied to clear response actions.

Operational hygiene is enforced continuously. Unused access is removed. Secrets exposed through code, configuration, or logs are rotated. Configuration drift is corrected rather than documented. Alerts are reviewed and closed. Findings are resolved rather than accumulated. Temporary workarounds are tracked until eliminated.

Training is practical and role-specific. Engineers, operators, and administrators are trained on how failures actually occur in the environment and how controls are expected to be used. Broad awareness activities that do not change behavior are deprioritized. These controls are non-negotiable. They are reviewed routinely and enforced even when inconvenient. Security debt is surfaced explicitly rather than normalized.

Closing Doctrine

Security is a system under constant pressure. Simplicity survives pressure better than complexity. Fundamentals outperform novelty. Controls that work every day matter more than strategies that impress once.

Operate with clarity. Reduce relentlessly. Enforce the basics.



Reference Posts

Reference posts on the blog to go deeper into this guide: