THE SECURITY BRUTALIST

Starting a Security Program from Scratch: A Brutalist Approach

This guide outlines a plan for establishing a security program from the ground up, incorporating the principles of Security Brutalism. This approach emphasizes simplicity, clarity, and effectiveness, focusing on core security fundamentals while avoiding unnecessary complexity. It also provides a timeline and a runbook for execution.

This is just one approach. There’s no single perfect or universally best solution. You should tailor this guide to fit your organization’s needs, making adjustments as necessary.

Security Brutalism Principles Applied

Here's how we'll apply Security Brutalism to this program:

Guide

Timeline

Here's a high-level timeline:

Phase 1: Assessment and Planning (Weeks 1-4)

Goal: Understand the organization's current state, define security goals, and create a roadmap.

Activities:

  1. Stakeholder Identification and Engagement (Week 1):
  2. Asset Inventory and Risk Assessment (Weeks 1-2):
  3. Define Security Goals and Objectives (Week 2):
  4. Develop a Security Roadmap (Weeks 3-4):

Phase 2: Foundational Security Controls (Months 1-6)

Goal: Implement essential security controls to address the most critical risks.

Activities:

  1. Security Policies and Procedures (Month 1-2):
  2. Access Control (Months 1-3):
  3. Vulnerability Management (Months 2-4):
  4. Incident Response (Months 1-4):
  5. Security Awareness Training (Months 3-6):

Phase 3: Ongoing Security Management (Months 6-12)

Goal: Continuously monitor, improve, and maintain the security program.

Activites:

  1. Security Monitoring and Logging (Months 6-9):
  2. Continuous Improvement (Months 9-12):
  3. Third-Party Risk Management (Months 9-12):

Runbook

This runbook provides step-by-step instructions for implementing the security program. It is designed to be clear, concise, and easy to follow.

Phase 1: Assessment and Planning

Phase 2: Foundational Security Controls

Phase 3: Ongoing Security Management

Key Performance Indicators (KPIs)

These are a few example KPIs that can provide insight into the program’s progress.

To Close

Following this plan and applying the principles of Security Brutalism enables organizations to build a robust and effective security program that safeguards their assets and aligns with their business goals.

After the program is up and running, it’s essential to regularly reassess and guard against unnecessary complexity. Security Brutalism emphasizes lean, efficient, and resilient security.