SECURITY BRUTALISM

The Brutalist Great Unveiling

Purpose: To systematically identify critical assets, expose the invisible, and build a foundational understanding for threat modeling and the implementation of a brutalist approach to security.

This is one approach to Phase 1 of the Runbook. Phase 1 can be achieved in various ways, depending on the size, needs, and context of each organization.

The approach: Start "top-down" (engage with leaders), then "bottom-up" (perform scans for discovery) and meet in the middle. Connect the dots and expose the invisible.

Guiding Principles

  1. Visibility First: Focus relentlessly on making everything visible, even the forgotten and the unsanctioned.
  2. Functionality Over Finesse: Prioritize identifying what keeps the business running above all else. Detailed technical specifications come later.
  3. Directness and Honesty: No sugarcoating. If something is critical and undocumented, acknowledge the risk directly.
  4. Iterative and Pragmatic: Start with broad scans and refine. Don't get bogged down in perfecting the details at the start.
  5. Small Team Focus: Leverage the strengths of a small team for rapid communication and execution.




The Great Unveiling Method

  1. Email blast to gather essentials: Directly query senior leaders on each department or business unit for their absolute must-have systems, data, and processes.
  2. Technical sweep and scan: Scan networks and enumerate systems, users, and cloud assets to get a raw inventory of what's running.
  3. Find the "Huh?": Compare business input with technical findings to expose undocumented or forgotten assets, the "invisible".
  4. Deep dive on the critical: Investigate the function, basic connections, and data flow of systems deemed critical. Create a working graph and connect the dots.
  5. Assess everything: Assign a simple criticality level (High, Medium, Low, Discard) to all identified assets.
  6. Map key dependencies: For critical assets, identify the immediate technical components they rely on, who owns the systems, main function, and what would happen if any of the dependencies fail or crash.
  7. Chart the backbone: Visually map the highest-criticality assets and their direct dependencies. Keep it simple, two levels of depth max.
  8. Brainstorm obvious threats: Briefly identify the most likely ways critical assets could fail and the impact. Begin the threat model.
  9. Act on the invisible: Decide whether to integrate, secure, or retire shadow IT and forgotten systems.




The Playbook

This is a simplified approach that provides clear, actionable steps for a small team to systematically identify critical assets, expose the invisible, and build a foundational understanding for threat modeling, leading to a completion of Phase 1 of the Runboook.

The timeframe is six-month or more depending on the organization and level of engagement.

Phase 0: The Buy-In

Objective: Obtain buy-in from Executive and Senior Leadership by providing a clear understanding of the target outcome: A more resilient organization with significant cost savings through this process.

Phase 1: The Great Unveiling

Objective: Broad discovery and initial criticality sweep via targeted emails and technical scans.

  1. Run the "Business Essentials" email campaign.
  2. Execute initial technical visibility recon.
  3. Perform "Huh?" analysis with the initial correlation.

Phase 2: Criticality Hardening and Dependency Mapping

Objective: Assign clear criticality and map basic dependencies.

  1. Conduct focused system deep dives.
  2. Investigate "Huh?" systems.
  3. Assign brutal criticality levels (bring in the sledgehammer!).
  4. Map basic system dependencies.

Phase 3: Charting and Initial Threat Vectors

Objective: Visualize critical paths and identify obvious threats - the Brutal Threat Model!

  1. Construct a "Business Continuity Backbone" chart.
  2. Conduct a brutalist threat model. *
  3. Execute the Brutalist “Shadow IT/Forgotten System” action plan (need a cool name).




Brutalist Documentation Principles



* Here's an example of a Brutalist Threat Model approach.