SECURITY BRUTALISM

A Brutalist Threat Model Approach

A brutalist threat model is straightforward, focused on impact, and avoids unnecessary complexity. It's about quickly identifying the most damaging problems for the most critical assets. This provides a rapid understanding of the most significant risks to the most critical business functions, allowing for quick prioritization of security efforts. More detailed threat modeling can follow later, focusing on the areas identified as most critical here.

What

High-criticality assets identified in the "Business Continuity Backbone" chart from the Phase 1.

Approach:

Output - A simple list or table for each critical asset, outlining:

How

  1. Target the core: Take the "Business Continuity Backbone" chart. Focus only on the High-criticality nodes.
  2. Brainstorm “obvious” badness: For each High-criticality asset, ask: "What's the simplest, most direct way this (the badness) could really hurt us?" Think in terms of common attacks and failures. Keep it high-level, no need for detailed attack paths yet.
  3. State the pain: For each "Obvious Badness" clearly and concisely describe the worst-case business impact. Use plain language. Think CEO, CFO, COO.
  4. Think basic fix or control: For each threat, jot down one or two very basic security measures that could give some immediate protection or reduce the damage. Don't overthink this stage. Minimize blast radius.
  5. Document simply and brutally: Record the asset, threat, impact, and basic mitigation in a straightforward list or table. No complex diagrams or lengthy reports.

A Brutalist Threat Model Template

Obvious Badness Brutal Impact Initial Mitigation
Ransomware on finance server Inability to process payments for weeks Implement regular, offsite backups
Loss of Customer Database Loss of all customer order and payment history Automated database backups