THE SECURITY BRUTALIST

Brutalist Security Rapid Decision Making (RDM)

Introduction

This model blends the efficiency and decisiveness of military decision-making frameworks with rapid risk analysis principles. It aims at keeping the structure lean, clear, and highly actionable. It is a practical and straightforward model that allows for rapid decision-making in high-pressure, security-related situations.

The Model - RDM

1. Identify and Define the Problem (Clarity Above All)

What’s the threat? Directly state the problem without ambiguity.

What’s at stake? Clearly define the immediate security risk or situation.

Who is affected? Identify the primary and secondary stakeholders (people, systems, assets, etc.).

Goal: Eliminate ambiguity and ensure a shared understanding of the situation across the team.

2. Assess the Context

Who are the decision-makers? Identify key personnel and their roles (don’t waste time).

Time Pressure. How much time do you have? Is this a matter of minutes, hours, or days?

Resource Availability. What assets, people, or tools can be used immediately? What are the resource limitations?

Goal: Quickly assess the environment and limitations to make an informed decision.

3. Rapid Risk Analysis

Use the Risk-Impact-Response (RIR) model to evaluate potential outcomes.

Goal: Prioritize risks and responses in a clear, structured way—ensuring resources are allocated to address the highest-risk scenarios first.

4. Develop Alternatives (The 3-Pronged Response)

Option 1: Immediate mitigation or defensive action (Reactive).

Option 2: Long-term strategic shift or proactive measure (Preventative).

Option 3: Neutral or passive response (Minimal intervention).

Each option should be evaluated on:

Goal: Limit options to the most feasible, actionable responses. Evaluate them quickly under pressure.

5. Execute and Adapt (Rapid Execution with Real-time Feedback)

Execution: Choose the best option from the alternatives and act immediately. Focus on speed, simplicity, and clarity in the execution process.

Adaptation: Set up a feedback loop (real-time intel, communication channels) to track changes and make adjustments if necessary.

Goal: Decisive action combined with flexibility. Respond to changes in real-time with minimal hesitation.

6. Post-Action Review and Optimization (Iterate and Improve)

Evaluate: Once the action is taken, assess the outcome against expectations. Did it reduce the risk? Did it cause new problems?

Learn: Document lessons learned in a concise, no-frills manner and quickly integrate them into the next decision-making cycle.

Goal: Continuous improvement, even in high-stakes environments.

Quick Reference Summary - Decision-Making Steps

  1. Define the Problem — What’s at stake? (Clear, direct)
  2. Assess Context — Time, resources, decision-makers (Fast)
  3. Risk Analysis (RRA) — Risk x Impact x Response (Quick priorities)
  4. Develop Alternatives — 3 options (Immediate, Long-Term, Neutral)
  5. Execute & Adapt — Act decisively, track feedback (Speed + flexibility)
  6. Review & Optimize — Learn, adapt for next time (Continuous loop)

Example Application (Real-World Scenario)

Situation: Security Breach

Key Features of the Brutalist Approach

To Close

This model emphasizes clarity, speed, and adaptability, with a heavy focus on ensuring high-stakes decisions are made quickly, without overcomplicating the process.

Make sure you adapt it to your specific environment.