THE SECURITY BRUTALIST

Brutalist Threat Modeling - Updated

Note: The original Brutalist Threat Model article aimed for brevity and focus. Based on subsequent questions, I have updated the approach a little bit. Same, same, but different?

A threat model styled after a Security Brutalist approach is direct, unadorned, and hyper-focused on identifying the most critical threats to the most valuable assets, driving immediate and practical remediation. It strips away academic complexity to deliver actionable insights. The process is a lean, no-nonsense assessment of security risks. It prioritizes clarity and action over exhaustive detail. Instead of delving into every theoretical attack path, it brutally focuses on:

  1. What's most valuable? (Critical Assets/Data)
  2. Who wants it and why? (Threat Actors & Motivations)
  3. How will they likely get it? (Primary Attack Vectors)
  4. What's the worst outcome?. (Direct Impact)
  5. What's the simplest, most effective fix? (Key Mitigations)

The focus is on building a strong, raw, foundational understanding of risk, much like Brutalist Architecture exposes the raw materials and structural elements. No fluff, no hidden complexities.

Rationale

This approach is ideal for organizations starting from scratch or with failing security programs because it:

A Brutalist Threat Model Template

Note that this is just one template. You'll need to adapt it to your specific organizational needs.

Field Description
Asset/System What specific system or data are we protecting?
Critical Function What is its primary business purpose?
Top 3 Threats Who (actor) and how (method) are the most likely/impactful attacks?
Top 3 Impacts What are the worst direct consequences if a threat materializes?
Key Mitigations What are the simplest, most effective controls to reduce these threats?
Owner Who is directly responsible for this asset's security and its mitigations?

Example: A Brutalist Threat Model for a Customer Login Service

Field Description
Asset/System Customer Login Service
Critical Function Authenticates users to access their accounts and data.
Top 3 Threats 1. External: Credential stuffing/brute-force attacks (automated).
2. External: Phishing to steal credentials (social engineering).
3. Internal: Malicious insider attempting to gain unauthorized access.
Top 3 Impacts 1. Account takeover, leading to data breaches and financial loss.
2. Reputational damage and loss of customer trust.
3. Unauthorized access to sensitive administrative functions (if applicable).
Key Mitigations 1. Implement Multi-Factor Authentication (MFA) for all users.
2. Rate limiting and account lockout mechanisms.
3. Strong password policies and monitoring for compromised credentials.
Owner Engineering Team Lead (owning the service)

This example demonstrates the directness of a Brutalist Threat Model. It quickly identifies the core threats and the most impactful mitigations without getting bogged down in less likely scenarios. It doesn't have to be complicated. The more you apply this, the stronger the basics become, ultimately leading to a more resilient and adaptive security program.