THE SECURITY BRUTALIST

Security Brutalist Program: Building from Zero

This guide is designed for organizations looking to build a security function from the ground up or overhaul one that's underperforming. Based on the principles of Security Brutalism, it emphasizes strength, simplicity, and an uncompromising focus on core fundamentals. The goal is to establish a solid foundation that can support future growth and development.

For a deeper dive, check Starting a Security Program from Scratch, Implementing Security Brutalism Without Breaking the Business, and Security Brutalism 3-Year Implementation.

Finally, check the A Lightweight Brutalist Security Playbook to stay on track with maintaining and evolving the program.

Core Principles

The Brutalist Security Team

A small, agile team focused solely on establishing and maintaining the core security functions.

Roles:

Characteristics:

The Brutalist Security Program: The 6 Fundamentals

  1. Risk Management
  2. Asset Management
  3. Identity and Access Management (IAM)
  4. Vulnerability Management
  5. Incident Response
  6. Security Awareness

Brutalist Security Tools

Brutalist Security Metrics

  1. Track only the essential metrics:
  2. Use these metrics to drive continuous improvement.

Once the program is underway and more mature, you switch to more advanced metrics.

To Close

By adhering to these principles and focusing on the fundamentals, organizations can establish a security program that is lean, effective, and resilient. This program will not only protect the organization's assets but also enable it to achieve its business objectives with confidence.