THE SECURITY BRUTALIST

The Security Brutalist Checker Tool

The Security Brutalist Checker tool is a simple, checkbox-based assessment built around the minimal and essential controls defined in The Basics: A Brutalist Security Program Stripped to the Essentials. It offers a clear way to evaluate the current state of security from a Security Brutalism perspective, focusing on whether the foundational controls are truly in place.

Refer to it as a guide for aligning work with core security principles. While the areas, controls, and expected outcomes may not align perfectly with every organization, their purpose is to drive attention toward core security fundamentals that are often overlooked or neglected.

The Score

For each of the nine areas you can get an "Implemented ", "Partially Implemented ", or "Not Implemented". Assign two points for the areas implemented, one point for partially implemented, and zero for not implemented. Maximum score is 18 points:

Checking the Boxes

This is a reality checklist, not a maturity model. If something isn’t enforced, tested, and measurable, it doesn’t count. Check a box only if the control is real, consistently enforced, and hardened. If it’s aspirational, informal, or applied inconsistently, consider it "not implemented."

Be brutal. Be honest. Be secure.

When using the tool, mark a control as implemented only if it is:

What Each Section Means

Each section defines an expected outcome—there is no room for interpretation. A control is either fully implemented as described, or it is not. The following outlines the required state for each control or fundamental. Partial, informal, or inconsistent implementations do not meet the standard and must not be marked as complete.


1. Minimize Attack Surface

Goal: Reduce what can be attacked and harden what remains.


2. Strong Identity & Access Management

Goal: Control who can access what, and limit the blast radius.


3. Data Security

Goal: Protect the actual target — your data.


4. Patch & Vulnerability Management

Goal: Close the doors attackers use.


5. Incident Response

Goal: Be ready when things go wrong — because they will.


6. Continuous Assessment

Goal: Stay sharp, adapt fast, and remove risk over time.


7. Cloud Security

Goal: Harden your cloud use like you would your infrastructure.


8. Email Security

Goal: Stop the most common attack vector: phishing.


9. Security Education & Awareness

Goal: Make security culture real, not just training slides.


Next

Go to the Security Brutalist Checker tool and assess your current posture.