The Laws of Security Brutalism
Security Brutalism demands simple, uncompromising laws that prioritize clarity and strict enforcement over nuance. In high-stakes environments, complexity breeds loopholes and errors ripe for exploitation. By focusing on foundational truths, this approach fosters discipline, predictability, and resilience. With that, here is a set of straightforward laws to begin a brutalist security model.
The Laws
- If it’s not being used, it’s an attack surface.
- Every dependency is a liability.
- Elegant diagrams lie.
- Complexity is camouflage for failure.
- No consequences, no control.
- If it needs training, it failed.
- The attacker doesn’t care about your backlog.
- Every exception becomes the new standard.
- A good policy is one sentence long.
- If you can’t break it, you can’t defend it.
- Every dashboard lies. Trust the logs.
- MFA is the seatbelt. The car still crashes.
- What you expose, they will exploit.
- Security at rest is security asleep.
- Trust is a vulnerability.
- No one reads your risk register.