SECURITY BRUTALISM

A Brutalist Security Maturity Checklist

The Brutalist Security Maturity Checklist is practical, unapologetic, and focused on core resilience. It's divided into four tiers of maturity, each grounded in real control impact, not security theater. This can be used as a scorecard for executive reporting or internal program benchmarking.

Note: This list is not all-inclusive. This is an example.

Legend: X = Not yet started, P = In progress, I = Implemented

Tier 0: Security Theater (Baseline Risk)

Things look secure, but they’re not.

Control Brutalist Standard Status
MFA Not enforced universally X
Identity and Access Admin access is not audited or limited X
Cloud No asset inventory; unknown exposure X
Code Security Secrets sometimes hardcoded in repos X
Logging Logging is partial or decentralized X
Patching Ad hoc, non-automated patching X
Monitoring No alerting or triage process X
Incident Response No tested IR plan X

Tier 1: Foundations in Place

The building has walls. Still vulnerable, but finally taking shape.

Control Brutalist Standard Status
MFA Enforced for all users, no exceptions I / P
Identity and Access Least privilege by role, unused accounts auto-expire I / P
Cloud Asset inventory auto-populated; no public S3 buckets I / P
Code Security Secrets scanning in CI/CD, enforced checks I / P
Infra as Code Baseline configs codified, peer reviewed I / P
Logging Centralized log storage, 7+ day retention I / P
Monitoring Critical alerts go to humans, false positive tuning started I / P
Patching Mostly automated patching, some exceptions I / P
Incident Response IR plan exists, team roles assigned I / P

Tier 2: Brutalist Core

Security is rigid, minimal, and effective. Controls are unforgiving but functional.

Control Brutalist Standard Status
MFA Required for all internal systems (SSH, Git, etc.) I
Identity and Access All permissions reviewed quarterly; role-based access only I
Build Pipelines CI/CD fully automated; production access via automation only I
Secrets in Code Centralized secret mgmt (e.g., Vault/KMS), no plaintext anywhere I
Security Testing Static/Dynamic scans on every build; fail pipeline on findings I
Logging Immutable logs (WORM); tamper detection alerts enabled I
Monitoring Logs + endpoint detection feeding into SIEM with real-time response I
Patching Automated patching I
Incident Response and Drills Quarterly incident simulations; lessons documented I

Tier 3: Ruthless Simplicity + Continuous Verification

Core controls and processes are automated. Security is boring! And that’s the point.

Control Brutalist Standard Status
Access Reviews Continuous access validation (Just-in-Time provisioning) I / P
Configuration Drift Daily drift detection + rollback automation I / P
Continuous Monitoring Behavioral analytics + anomaly detection enabled I / P
Zero Trust Full Zero Trust posture across cloud and internal services I / P
Chaos Engineering Simulated attacks regularly run (insider, supply chain, lateral movement) I / P
Metrics Security scorecard shared monthly with leadership (MFA % use, open risks, mean time to detect/respond) I / P
AI Use AI-assisted threat hunting or behavioral analytics (Wait... What?) I / P
Supply Chain Security SBOM maintained; dependencies scanned at ingest & build I / P

Final Maturity Outcome

This is it!

Tier Description Security Culture
Tier 0 Superficial security; breach is inevitable Firefighting
Tier 1 Security has a seat at the table Growing Awareness
Tier 2 Defensible architecture, audit-ready Intentional Discipline
Tier 3 Resilient, automated, and provable Security-First DNA



Back or Next: Bonus - Brutalist Security: A Field Guide for Security Pros.