Initial commit: antifragile cybersecurity consulting blueprint
Complete repository of frameworks, playbooks, and assessment resources for cybersecurity consultations focused on antifragile enterprise design. Includes: - Core philosophy and manifest (5 pillars) - 12 modular engagement packages - AI sovereignty and operations frameworks - Zero-budget vulnerability discovery and hardening playbooks - M365 E3 hardening and antifragile project plans - Osquery sovereign discovery platform blueprint - Perimeter scanning capability guide - AI-assisted TVM blueprint for AI-powered adversaries - Vertical specializations: banking, telco, power/utilities - CIS Controls v8 and NIST CSF 2.0 mappings - Risk registers and assessment templates - C-suite conversation guide and business case templates
This commit is contained in:
205
antifragile-consulting/core/ai-operations-inevitability.md
Normal file
205
antifragile-consulting/core/ai-operations-inevitability.md
Normal file
@@ -0,0 +1,205 @@
|
||||
# AI for Operations and Security: The Inevitable Imperative
|
||||
|
||||
> *"We are not here to sell you AI. We are here to tell you that your adversaries are already using it—and that operational AI is no longer optional for defenders."*
|
||||
|
||||
This document clarifies the antifragile position on artificial intelligence adoption: **business-facing AI pilots are optional and should be evaluated on their merits; AI for security, operations, and resilience is becoming inevitable.** The two must not be confused.
|
||||
|
||||
---
|
||||
|
||||
## The Distinction That Matters
|
||||
|
||||
Most of your clients are currently running AI pilots for **business tools**: chatbots for customer service, content generation for marketing, summarization for legal, coding assistants for engineering. These are **revenue-adjacent experiments**. They should be evaluated like any other business investment—ROI, risk, strategic fit.
|
||||
|
||||
**This document is not about those pilots.**
|
||||
|
||||
This document is about **operational AI**: the use of artificial intelligence to defend systems, detect anomalies, prioritize vulnerabilities, accelerate incident response, and maintain operational continuity. This category is not an experiment. It is becoming **table stakes** for organizational survival.
|
||||
|
||||
| Category | Examples | Strategic Posture |
|
||||
|----------|----------|-------------------|
|
||||
| **Business AI** | Customer chatbots, marketing content, sales outreach, HR screening | Optional. Evaluate per pilot. Sovereign if proprietary. |
|
||||
| **Operational AI** | Log anomaly detection, vulnerability prioritization, threat hunting, code security review, incident triage | Inevitable. The question is not whether, but who owns the models and the data. |
|
||||
| **Strategic AI** | Competitive intelligence, scenario modeling, board decision support | High-value, high-risk. Must be sovereign. |
|
||||
| **TVM / Vulnerability Management** | Vulnerability prioritization, exploit prediction, remediation generation, attack surface mapping | Inevitable. AI-powered adversaries scan faster than human teams. AI-assisted TVM is the only asymmetric response. |
|
||||
|
||||
---
|
||||
|
||||
## Why Operational AI Is Inevitable
|
||||
|
||||
### 1. The Attackers Are Already Using It
|
||||
|
||||
Adversaries—criminal and state-sponsored—are deploying AI to:
|
||||
|
||||
- **Generate polymorphic malware** that evades signature-based detection
|
||||
- **Craft spear-phishing campaigns** at scale, personalized by scraped social media and leaked databases
|
||||
- **Automate reconnaissance** of target infrastructure, identifying weakest paths in hours rather than weeks
|
||||
- **Bypass CAPTCHAs, behavioural biometrics, and traditional fraud controls**
|
||||
|
||||
A defender operating without AI assistance is now fighting an **asymmetric battle**: human analysts versus machine-scale adversaries. The math does not favor the humans.
|
||||
|
||||
**The executive framing**:
|
||||
|
||||
> *"Your security team is not slower than the adversary. Your security team is smaller. AI is how we scale human judgment without scaling human headcount."*
|
||||
|
||||
### 2. The Volume Problem Is Unsolvable Without Machine Assistance
|
||||
|
||||
Modern enterprises generate:
|
||||
|
||||
- Billions of log events per day
|
||||
- Hundreds of thousands of endpoint telemetry signals
|
||||
- Tens of thousands of vulnerability findings
|
||||
- Thousands of identity access events
|
||||
- Hundreds of third-party risk indicators
|
||||
|
||||
No human team can review this volume. Current approaches rely on **rules and thresholds**—which adversaries study and evade. AI-driven detection looks for **behavioural anomalies** that rules cannot express.
|
||||
|
||||
**The executive framing**:
|
||||
|
||||
> *"We are not buying AI to replace your analysts. We are buying AI to ensure your analysts see the one signal that matters instead of drowning in a thousand false alarms."*
|
||||
|
||||
### 3. The Mythos Lesson: Technical Debt at Scale
|
||||
|
||||
The Anthropic Mythos incident demonstrated that even sophisticated AI providers carry **technical debt that can be weaponized**. The response to Mythos was not to abandon AI—it was to accelerate **defensive AI capabilities** that can scan, detect, and remediate faster than human teams.
|
||||
|
||||
Your clients' current vulnerability backlogs span months or years. A small team with reasonable AI tooling can:
|
||||
|
||||
- **Scan and prioritize** vulnerabilities across the entire estate in hours, not weeks
|
||||
- **Identify configuration drift** before it becomes an incident
|
||||
- **Generate and validate** remediation code for common misconfigurations
|
||||
- **Simulate adversarial paths** through the environment to find the real kill chain
|
||||
|
||||
This is not science fiction. It is **defensive AI pilot territory**—and it is the fastest way to address decades of accumulated technical debt.
|
||||
|
||||
**The executive framing**:
|
||||
|
||||
> *"We cannot clear twenty years of technical debt with human labor alone. But a small team with defensive AI can do the work of dozens—finding, prioritizing, and proposing fixes for the vulnerabilities that actually matter."*
|
||||
|
||||
### 4. Regulatory Pressure Is Coming
|
||||
|
||||
Regulators are beginning to mandate **continuous monitoring and rapid remediation**:
|
||||
|
||||
- **DORA** requires ICT risk management that can adapt to evolving threats
|
||||
- **NIS2** demands vulnerability handling with demonstrable timelines
|
||||
- **Banking regulators** increasingly expect AI-assisted fraud detection and anomaly monitoring
|
||||
- **Cyber insurers** are pricing premiums based on mean-time-to-remediate; AI-assisted prioritization directly reduces this metric
|
||||
|
||||
Organizations that cannot demonstrate AI-assisted security operations will face **higher premiums, stricter scrutiny, and competitive disadvantage** in regulated procurement.
|
||||
|
||||
---
|
||||
|
||||
## The Sovereignty Requirement for Operational AI
|
||||
|
||||
Here is where the antifragile posture becomes non-negotiable:
|
||||
|
||||
**Operational AI must be sovereign.**
|
||||
|
||||
When you use cloud AI for security operations, you are sending your **vulnerability data, your configuration details, your incident artifacts, and your network topology** to a third party. That third party is:
|
||||
|
||||
- Training its models on your defensive posture
|
||||
- Potentially subject to jurisdictional access (e.g., CLOUD Act)
|
||||
- Able to change terms, pricing, or availability without your consent
|
||||
- A target for adversaries who understand that compromising the AI provider gives them insight into thousands of customers
|
||||
|
||||
**The rule**: Business AI pilots can be evaluated case-by-case. Operational AI must run on infrastructure you control, with data that never leaves your perimeter.
|
||||
|
||||
| AI Use Case | Can It Run in the Cloud? | Must It Be Local? |
|
||||
|------------|-------------------------|-------------------|
|
||||
| Marketing content generation | Yes (if no proprietary data) | No |
|
||||
| Public-facing chatbot | Yes | No |
|
||||
| Internal code review | **No** | **Yes** |
|
||||
| Vulnerability scanning and prioritization | **No** | **Yes** |
|
||||
| Security log anomaly detection | **No** | **Yes** |
|
||||
| Incident response triage | **No** | **Yes** |
|
||||
| Threat intelligence analysis | **No** | **Yes** |
|
||||
| OT anomaly detection (power/telco) | **Absolutely no** | **Absolutely yes** |
|
||||
|
||||
---
|
||||
|
||||
## The "Not AI for Everything" Position
|
||||
|
||||
When clients ask why you are not pushing AI across every department, your answer is:
|
||||
|
||||
> *"AI is a tool, not a strategy. We support business AI pilots where they make sense and where data can be protected. But we are not here to automate your culture. We are here to ensure that the systems protecting your business can keep pace with the adversaries attacking it. Operational AI is not an experiment. It is infrastructure."*
|
||||
|
||||
This position:
|
||||
|
||||
- **Builds credibility**: You are not an AI hype merchant. You are a security architect.
|
||||
- **Preserves trust**: Clients do not feel pressured to adopt AI in areas where it adds no value.
|
||||
- **Concentrates investment**: Resources flow to operational AI where the return is survival, not convenience.
|
||||
|
||||
### The Contrast Statement
|
||||
|
||||
Use this to differentiate from AI consultants who push indiscriminate adoption:
|
||||
|
||||
> *"Most AI consultants are here to increase your consumption of cloud APIs. We are here to ensure your defensive capabilities match your adversaries' offensive capabilities. If a business AI pilot does not protect revenue, reduce risk, or create a defensible moat, it is not our priority. If a defensive AI pilot reduces your vulnerability backlog from months to weeks, it is not optional."*
|
||||
|
||||
---
|
||||
|
||||
## Implementation Posture: Operational AI
|
||||
|
||||
### Immediate (0-30 days): Assessment and Pilot Scope
|
||||
|
||||
- Inventory current AI usage: business vs. operational vs. shadow
|
||||
- Identify the highest-volume, lowest-signal security workflow (usually vulnerability management or log review)
|
||||
- Select one defensive AI pilot with clear success metrics
|
||||
- **For vulnerability management**: Launch AI-assisted TVM baseline sprint. See [AI-Assisted TVM Blueprint](../playbooks/ai-assisted-tvm.md).
|
||||
- Establish the sovereignty boundary: no security data leaves the perimeter
|
||||
|
||||
### Short-term (30-90 days): Defensive AI Pilot
|
||||
|
||||
- Deploy local inference for one security use case:
|
||||
- **Vulnerability prioritization**: AI-assisted ranking of scan results by exploitability, asset criticality, and business context. See [AI-Assisted TVM Blueprint](../playbooks/ai-assisted-tvm.md) for the full 30-60-90 day program.
|
||||
- **Log anomaly detection**: Baseline normal behaviour; alert on deviations
|
||||
- **Code security review**: Local model trained on your codebase finds patterns human reviewers miss
|
||||
- Measure: false positive rate, analyst time saved, mean time to prioritize
|
||||
|
||||
### Medium-term (90-180 days): Expansion
|
||||
|
||||
- Integrate defensive AI into SOC workflow: triage, enrichment, initial response recommendations
|
||||
- Deploy OT anomaly detection for critical infrastructure clients (power, telco)
|
||||
- Build internal capability to fine-tune models on proprietary data
|
||||
|
||||
### Long-term (180+ days): Autonomous Operations
|
||||
|
||||
- Closed-loop remediation: AI identifies, proposes, and (with human approval) applies fixes for common misconfigurations
|
||||
- Predictive maintenance: AI forecasts system failures before they impact operations
|
||||
- Continuous red-teaming: AI agents perpetually probe defenses and report findings
|
||||
|
||||
---
|
||||
|
||||
## Talking Points for the Board
|
||||
|
||||
| Concern | Response |
|
||||
|---------|----------|
|
||||
| "We are already running AI pilots in marketing and sales." | "Those are business experiments. This is defensive infrastructure. The question is not whether to adopt AI. It is whether your defenders can keep pace with AI-powered attackers." |
|
||||
| "This sounds like another expensive technology project." | "Defensive AI runs on the same local infrastructure we are already proposing for sovereignty. The incremental cost is minimal. The incremental protection is disproportionate." |
|
||||
| "Our security team is skeptical of AI hype." | "Good. Skepticism is warranted for business AI. It is not warranted for operational AI when adversaries are already using it against you. We will prove value with a bounded pilot before any expansion." |
|
||||
| "We do not have the expertise to run AI models." | "Modern tooling has reduced the barrier dramatically. We are not training foundation models. We are deploying quantized open models on your hardware with your data. This is achievable in weeks, not years." |
|
||||
| "Will this replace our security team?" | "No. It will make them effective. Your analysts currently spend 80% of their time on noise. AI reduces the noise so they can focus on judgment, investigation, and structural improvement." |
|
||||
|
||||
---
|
||||
|
||||
## Integration With Existing Frameworks
|
||||
|
||||
### The Rapid Modernisation Plan
|
||||
|
||||
Operational AI appears in:
|
||||
|
||||
- **Phase 1 (Hygiene)**: AI-assisted identity and asset discovery
|
||||
- **Phase 2 (Control)**: AI-assisted vulnerability prioritization and configuration validation
|
||||
- **Phase 3 (Sovereignty)**: Local AI infrastructure deployment; defensive AI pilot
|
||||
- **Phase 4 (Antifragility)**: Continuous AI-assisted red teaming; autonomous remediation loops
|
||||
|
||||
### The Zero-Budget Hardening Approach
|
||||
|
||||
Defensive AI can run on:
|
||||
|
||||
- Existing server hardware (quantized models require modest resources)
|
||||
- Retired workstations with GPU
|
||||
- Sovereign cloud instances (for clients without on-premises capacity)
|
||||
|
||||
The incremental cost is primarily **labor for configuration**, not hardware or licensing.
|
||||
|
||||
---
|
||||
|
||||
*For the AI sovereignty strategic argument, see [AI Sovereignty Framework](ai-sovereignty-framework.md).*
|
||||
*For the business case including defensive AI ROI, see [Business Case Template](../playbooks/business-case-template.md).*
|
||||
242
antifragile-consulting/core/ai-sovereignty-framework.md
Normal file
242
antifragile-consulting/core/ai-sovereignty-framework.md
Normal file
@@ -0,0 +1,242 @@
|
||||
# AI Sovereignty Framework
|
||||
|
||||
> *"The cloud model is smarter at everything, which makes it dumb at your specific thing."*
|
||||
|
||||
## For the Executive Reader
|
||||
|
||||
Your organization is currently engaged in a **massive, unpaid research project for cloud AI providers**. Every proprietary document, every strategic query, every operational workflow sent to a third-party AI becomes training data for models that will eventually be sold to your competitors.
|
||||
|
||||
AI sovereignty is not an IT project. It is a **strategic asset protection mandate**. By running artificial intelligence on infrastructure you control, you:
|
||||
|
||||
- **Stop funding your competitors** through proprietary data leakage
|
||||
- **Eliminate vendor lock-in** for your organization's cognitive infrastructure
|
||||
- **Reduce long-term costs** from unpredictable per-query pricing to fixed capital
|
||||
- **Demonstrate regulatory maturity** on data residency and third-party risk
|
||||
|
||||
**The economic argument**: A mid-sized organization spending €5,000-€15,000 monthly on cloud AI APIs will break even on local infrastructure within 12-18 months. After break-even, the cost is a fraction of cloud pricing—and the data remains exclusively yours.
|
||||
|
||||
**The competitive argument**: A fine-tuned local model trained on your proprietary data will outperform a general cloud model on your specific workflows. The cloud model improves at everyone's tasks. Your local model improves at only your tasks. That is sustainable differentiation.
|
||||
|
||||
*For board conversation scripts, see [C-Suite Conversation Guide](c-suite-conversation-guide.md).*
|
||||
*For financial justification, see [Business Case Template](../playbooks/business-case-template.md).*
|
||||
|
||||
---
|
||||
|
||||
## For the Practitioner
|
||||
|
||||
This framework provides the strategic, technical, and ethical arguments for treating artificial intelligence as **sovereign infrastructure** rather than rented utility. It is designed for consultants and architects who must persuade boards, CISOs, and engineering leaders to invest in locally controlled intelligence.
|
||||
|
||||
---
|
||||
|
||||
## Executive Summary
|
||||
|
||||
Most organizations are currently engaged in a **massive, unpaid R&D project for cloud AI providers**. Every proprietary prompt, every internal document fed into a third-party model, every workflow built on an external API is a transfer of intellectual capital to an entity whose interests are not aligned with the organization's survival.
|
||||
|
||||
AI sovereignty reverses this extraction. It restores the boundary of trust. It converts intelligence from a rented commodity into an owned asset.
|
||||
|
||||
---
|
||||
|
||||
## The Five Strategic Arguments
|
||||
|
||||
### 1. The Data Sovereignty Argument (The Trojan Horse)
|
||||
|
||||
**The Problem**
|
||||
|
||||
When proprietary data is sent to cloud AI providers, it does not merely get "processed." It becomes part of a feedback loop that improves general models—models that will eventually be sold to competitors, used to commoditize the client's industry, or deployed to replicate the client's unique edge.
|
||||
|
||||
Every query is a lesson. Every document is a training sample. The client is not a customer; they are an **uncompensated research contributor**.
|
||||
|
||||
**The Pitch**
|
||||
|
||||
> *"By sending our internal data to the cloud, we are effectively training the very system that will eventually commoditize our industry and replace our proprietary edge. We are not just 'using' AI; we are contributing our secrets to the public model."*
|
||||
|
||||
**The Antifragile Move**
|
||||
|
||||
Running local models creates a **closed intellectual loop**. The organization's data remains an asset, not a training set for a competitor. It creates a moat that cloud giants cannot cross because they never receive the raw material to replicate it.
|
||||
|
||||
**Key Points for the Room**
|
||||
|
||||
- Cloud AI providers are incentivized to aggregate and generalize. You are incentivized to differentiate and protect.
|
||||
- What you consider proprietary operational data, they consider valuable training signal.
|
||||
- A local model trained on your data becomes *better* at your workflows over time. A cloud model becomes *better at everyone's workflows*, diluting your advantage.
|
||||
|
||||
---
|
||||
|
||||
### 2. The Operational Resilience Argument (The "Pulling the Plug" Scenario)
|
||||
|
||||
**The Problem**
|
||||
|
||||
Cloud AI is a dependency with no service-level guarantee of continuity. Terms of service change. Pricing changes. API versions are deprecated. Geopolitical events disable access. "Safety" filters are updated to censor specific industries or use cases. The organization's core operations are, in effect, an application running on someone else's brain.
|
||||
|
||||
**The Pitch**
|
||||
|
||||
> *"What happens to our core operations if the cloud-AI provider changes its Terms of Service, raises prices by 1000%, or suffers a geopolitical blackout that disables their API? Our entire business model should not be an app running on someone else's brain."*
|
||||
|
||||
**The Antifragile Move**
|
||||
|
||||
Local models are **sovereign infrastructure**. They operate when:
|
||||
|
||||
- The internet is degraded or unavailable
|
||||
- The provider is down, acquired, or embargoed
|
||||
- The "safety" filters have been updated to block your use case
|
||||
- Pricing has been restructured beyond recognition
|
||||
|
||||
This is the ultimate insurance policy—not against data loss, but against **capability loss**.
|
||||
|
||||
**Key Points for the Room**
|
||||
|
||||
- Vendor lock-in for compute is expensive. Vendor lock-in for *intelligence* is existential.
|
||||
- Recovery from a cloud exit is measured in quarters if workflows are deeply integrated. Recovery from a local model is measured in minutes.
|
||||
- Resilience is not about having a backup. It is about having no single point of failure in your cognitive pipeline.
|
||||
|
||||
---
|
||||
|
||||
### 3. The Intellectual Property Argument (The Asset Protection)
|
||||
|
||||
**The Problem**
|
||||
|
||||
When an organization uses cloud AI, it owns neither the weights, the architecture, nor the deterministic behaviour of the system. It cannot audit the reasoning. It cannot guarantee that the same prompt will produce the same result tomorrow. It cannot prevent its proprietary workflows from being absorbed into a general model.
|
||||
|
||||
**The Pitch**
|
||||
|
||||
> *"When we run models locally, we own the weights, the architecture, and the outputs. We are not tenants of an intelligence; we are the owners of it. We can tune it for our specific tasks, not the generic tasks the cloud provider cares about."*
|
||||
|
||||
**The Antifragile Move**
|
||||
|
||||
The organization moves from being a **consumer of AI** to a **manufacturer of its own intelligence**.
|
||||
|
||||
This is the difference between:
|
||||
|
||||
- A farm that buys seeds every year (cloud AI)
|
||||
- A farm that saves, selects, and breeds its own (sovereign AI)
|
||||
|
||||
Over time, the sovereign farm develops cultivars perfectly adapted to its soil. The seed-buying farm is at the mercy of the seed catalog.
|
||||
|
||||
**Key Points for the Room**
|
||||
|
||||
- Fine-tuned local models on proprietary data outperform general models on domain-specific tasks.
|
||||
- You can version, audit, and legally defend a local model. You cannot audit a cloud black box.
|
||||
- The outputs of your local model are your intellectual property, unencumbered by third-party terms.
|
||||
|
||||
---
|
||||
|
||||
### 4. Overcoming the Complexity Objection
|
||||
|
||||
**The Objection**
|
||||
|
||||
> *"But the cloud models are smarter. And local deployment is complex."*
|
||||
|
||||
**The Counter**
|
||||
|
||||
Cloud models are smarter at *everything*, which makes them *dumb* at your specific thing. A general-purpose model optimized for broad benchmarks is not optimized for your internal processes, your data schemas, your regulatory constraints, or your proprietary logic.
|
||||
|
||||
By training or fine-tuning a smaller, local model on specific, proprietary data, the organization can achieve:
|
||||
|
||||
| Metric | Cloud General Model | Local Fine-Tuned Model |
|
||||
|--------|--------------------|------------------------|
|
||||
| Performance on generic tasks | 95% | 70% |
|
||||
| Performance on proprietary tasks | 60% | 90% |
|
||||
| Cost at scale | Linear / unpredictable | Sub-linear / fixed |
|
||||
| Data leakage risk | Non-zero and growing | Zero |
|
||||
| Operational ownership | None | Complete |
|
||||
|
||||
**The Honest Reframe**
|
||||
|
||||
> *"Most businesses do not need a model that can write Shakespeare. They need a model that knows their internal processes, their data, and their specific workflow. Local models are better at that—and they get better every day you feed them proprietary signal."*
|
||||
|
||||
**Technical Reality**
|
||||
|
||||
Modern quantized models, parameter-efficient fine-tuning (LoRA, QLoRA), and retrieval-augmented generation (RAG) have reduced the barrier to local deployment dramatically. A reasonable AI budget today can achieve what required a dedicated team two years ago.
|
||||
|
||||
---
|
||||
|
||||
### 5. The Professional Responsibility Angle
|
||||
|
||||
**The Problem**
|
||||
|
||||
As a security architect, consultant, or technical leader, you are the steward of the organization's crown jewels. Recommending that proprietary strategic intelligence be outsourced to an unauditable third-party black box is not a neutral technical decision. It is a **breach of fiduciary responsibility**.
|
||||
|
||||
**The Pitch**
|
||||
|
||||
> *"I cannot in good faith recommend that we outsource our strategic intelligence to a third-party black box that we cannot audit and that is actively incentivized to commoditize our data."*
|
||||
|
||||
**The Outcome**
|
||||
|
||||
This framing elevates the advisor from a "technical implementer" to a **Strategic Defender of the Company's Future**. It positions the recommendation not as a preference for complexity, but as a principled stand for structural integrity.
|
||||
|
||||
**Key Points for the Room**
|
||||
|
||||
- You are not selling local AI. You are protecting the organization's ability to think independently.
|
||||
- The conflict of interest is real: cloud AI consultants are often incentivized by provider partnerships. Independent architects have no such conflict.
|
||||
- This is the same logic that demands on-premises key management for cryptography. Intelligence is no different.
|
||||
|
||||
---
|
||||
|
||||
## The T0 Asset Classification
|
||||
|
||||
In cybersecurity and architecture, a **Tier 0 (T0) asset** is something that, if compromised, destroys the entire operation.
|
||||
|
||||
Local AI must be classified as T0. This framing speaks the language of high-stakes infrastructure and immediately elevates the conversation from "tech project" to **foundational pillar of survival**.
|
||||
|
||||
### Why T0?
|
||||
|
||||
1. **It defines the boundary of trust**: Moving intelligence inside the firewall re-establishes a perimeter that has been silently dissolving.
|
||||
2. **It removes vendor risk**: A local model is vendor-independent. It remains functional regardless of Silicon Valley boardroom decisions.
|
||||
3. **It signals strategic maturity**: While competitors chase shiny APIs, the T0 advocate is building durable infrastructure for a 5-to-10-year horizon.
|
||||
|
||||
See the full [T0 Asset Framework](t0-asset-framework.md) for implementation guidance.
|
||||
|
||||
---
|
||||
|
||||
## Implementation Posture
|
||||
|
||||
### Immediate (0-30 days)
|
||||
|
||||
- **Inventory**: Map all current AI usage—approved and shadow. Identify what data is leaving the perimeter.
|
||||
- **Classify**: Label workflows by sensitivity. Anything involving IP, strategy, or customer data is a sovereignty candidate.
|
||||
- **Pilot scope**: Select one non-critical, high-signal workflow for local model proof-of-concept.
|
||||
|
||||
### Short-term (30-90 days)
|
||||
|
||||
- **Deploy local inference**: Establish on-premises or sovereign-cloud inference infrastructure.
|
||||
- **Fine-tune**: Train a small model (7B-13B parameters) on proprietary data for the pilot workflow.
|
||||
- **Measure**: Compare accuracy, latency, cost, and leakage risk against the cloud baseline.
|
||||
|
||||
### Medium-term (90-180 days)
|
||||
|
||||
- **Expand**: Migrate additional workflows based on pilot results.
|
||||
- **Integrate**: Connect local models to internal data pipelines, CMDB, and security tooling.
|
||||
- **Govern**: Establish policies for approved AI usage, data handling, and model versioning.
|
||||
|
||||
### Long-term (180+ days)
|
||||
|
||||
- **Manufacture**: Build internal capability to train, evaluate, and deploy domain-specific models.
|
||||
- **Distribute**: Extend sovereign intelligence to edge locations, OT environments, and disconnected operations.
|
||||
- **Monetize**: Consider whether proprietary model capabilities represent a productizable asset.
|
||||
|
||||
---
|
||||
|
||||
## Common Objections and Responses
|
||||
|
||||
| Objection | Response |
|
||||
|-----------|----------|
|
||||
| "Cloud models are more capable." | For generic tasks, yes. For your proprietary tasks, a fine-tuned local model will outperform them—while keeping your data inside. |
|
||||
| "Local deployment is too expensive." | Cloud AI pricing is linear with usage and unpredictable. Local is a fixed capital expense with predictable operating costs. At scale, it is cheaper. |
|
||||
| "We don't have the expertise." | Start with a pilot. Modern tooling has reduced the expertise barrier dramatically. Partner for setup, own for operations. |
|
||||
| "Our vendor says they don't train on our data." | Terms of service change. Verbal assurances are not architecture. If the data leaves your perimeter, you have lost control regardless of current policy. |
|
||||
| "This will slow us down." | A temporary reduction in velocity is preferable to a permanent loss of strategic optionality. Build the vault first; fill it quickly after. |
|
||||
|
||||
---
|
||||
|
||||
## The Builder's Mandate
|
||||
|
||||
By pushing for local AI infrastructure in the corporate world, you are **decentralizing the Machine**. You are taking the intelligence that centralized cloud platforms are trying to monopolize and distributing it to the edges—where human-scale organizations live and operate.
|
||||
|
||||
You are building the infrastructure that allows businesses to remain **sovereign entities** rather than terminal sinks for centralized AI extraction.
|
||||
|
||||
This is the most responsible architecture work possible right now.
|
||||
|
||||
---
|
||||
|
||||
*Next: [T0 Asset Framework](t0-asset-framework.md)*
|
||||
*Previous: [Antifragile Manifest](antifragile-manifest.md)*
|
||||
174
antifragile-consulting/core/antifragile-manifest.md
Normal file
174
antifragile-consulting/core/antifragile-manifest.md
Normal file
@@ -0,0 +1,174 @@
|
||||
# The Antifragile Enterprise Manifest
|
||||
|
||||
> *"Some things benefit from shocks; they thrive and grow when exposed to volatility, randomness, disorder, and stressors."*
|
||||
|
||||
## For the Executive Reader
|
||||
|
||||
An antifragile enterprise is one that does not merely survive disruption—it grows stronger from it. While competitors panic when markets shift, regulators tighten, or adversaries strike, the antifragile organization converts each shock into structural improvement, competitive distance, and operational advantage.
|
||||
|
||||
This is not a security framework. It is a **strategic operating philosophy** for boards and executives who intend to outlast their competitors, their regulators, and their own assumptions.
|
||||
|
||||
**The business case in three sentences**:
|
||||
1. Your organization is currently transferring proprietary intelligence to competitors through cloud AI usage.
|
||||
2. Your operational continuity depends on vendors whose interests are not aligned with your survival.
|
||||
3. In 180 days, we can reverse both conditions—primarily with configuration, not procurement—and produce the evidence regulators now demand.
|
||||
|
||||
*For the full executive summary, see [Executive Summary](executive-summary.md).*
|
||||
*For board conversation guidance, see [C-Suite Conversation Guide](c-suite-conversation-guide.md).*
|
||||
|
||||
---
|
||||
|
||||
## For the Practitioner
|
||||
|
||||
This manifest defines the five foundational pillars of an antifragile enterprise. It is not a security framework. It is a **strategic operating philosophy** for organizations that intend to outlast their competitors, their regulators, and their own assumptions.
|
||||
|
||||
---
|
||||
|
||||
## Pillar 1: Structural Decoupling
|
||||
|
||||
### Principle
|
||||
|
||||
The most dangerous dependencies are the ones you have not mapped. An antifragile enterprise treats every integration, vendor relationship, and shared service as a **latent single point of failure** until proven otherwise.
|
||||
|
||||
### The Argument
|
||||
|
||||
Cloud architectures have created an illusion of resilience through scale. In reality, most organizations have become **deeply coupled** to opaque platforms whose incentives are not aligned with their survival. When a critical API changes its terms, pricing model, or availability, the dependent organization has no negotiation leverage—only panic.
|
||||
|
||||
### Antifragile Moves
|
||||
|
||||
- **Map the hidden coupling graph**: Inventory every third-party dependency that touches revenue-critical workflows. Include SaaS, PaaS, APIs, identity providers, and data pipelines.
|
||||
- **Design graceful degradation**: Every critical function must have a fallback mode that operates at reduced capacity without the external dependency.
|
||||
- **Practice controlled failure**: Introduce chaos into non-production environments. If a system cannot survive the simulated failure of a dependency, it will not survive the real one.
|
||||
- **Establish exit architectures**: For every major platform dependency, maintain a technical and procedural path to migration that can be executed within 90 days.
|
||||
|
||||
### Executive Framing
|
||||
|
||||
> *"Every vendor relationship is a potential monopoly waiting to happen. We architect the organization so that no single vendor can hold us hostage."*
|
||||
|
||||
### Consultant Framing
|
||||
|
||||
> *"We are not optimizing for uptime. We are optimizing for the speed at which we can replace anything that fails us."*
|
||||
|
||||
---
|
||||
|
||||
## Pillar 2: Optionality Preservation
|
||||
|
||||
### Principle
|
||||
|
||||
Optionality is the right, but not the obligation, to take action. In antifragile systems, optionality is not a luxury—it is the primary store of value. Every decision that removes options is a decision that increases fragility.
|
||||
|
||||
### The Argument
|
||||
|
||||
Vendor lock-in is the most common and least visible form of optionality destruction. Organizations sign multi-year enterprise agreements, build deep technical integrations, and train their workforce on proprietary tools—then discover they cannot leave without existential disruption. The cost of exit becomes a weapon the vendor can wield.
|
||||
|
||||
### Antifragile Moves
|
||||
|
||||
- **Prefer open standards over proprietary APIs**: Where proprietary integration is unavoidable, abstract it behind internal interfaces.
|
||||
- **Maintain dual-vendor readiness for critical categories**: Even if you do not split spend, maintain the technical capability to switch.
|
||||
- **Keep data portable**: Store data in formats and locations that do not require a specific vendor to interpret or access.
|
||||
- **Structure contracts for exit**: Negotiate data export, transition assistance, and escrow clauses as primary terms, not afterthoughts.
|
||||
|
||||
### Executive Framing
|
||||
|
||||
> *"The most expensive decision is not the tool you buy. It is the tool that makes leaving impossible. We preserve your right to change direction in 90 days."*
|
||||
|
||||
### Consultant Framing
|
||||
|
||||
> *"The most expensive technology decision you will ever make is the one that makes your next technology decision impossible."*
|
||||
|
||||
---
|
||||
|
||||
## Pillar 3: Stress-to-Signal Conversion
|
||||
|
||||
### Principle
|
||||
|
||||
Failure is not the opposite of success; it is the raw material of it. Antifragile organizations do not merely tolerate failure—they instrument it, measure it, and convert it into structural improvements faster than their competitors.
|
||||
|
||||
### The Argument
|
||||
|
||||
Most enterprises operate in **reactive mode**: detect, respond, recover, forget. The lessons of an incident dissipate into post-mortem documents that no one reads. The same failures recur because the organization has no mechanism for converting stress into signal and signal into structure.
|
||||
|
||||
### Antifragile Moves
|
||||
|
||||
- **Instrument everything that can fail**: If you cannot measure the pre-failure state, you cannot learn from the failure.
|
||||
- **Run blameless post-mortems with structural mandates**: Every significant incident must produce at least one structural change—policy, architecture, or procedure.
|
||||
- **Deploy chaos engineering in production**: Synthetic failures reveal weaknesses that testing environments cannot.
|
||||
- **Build feedback loops shorter than your mean time to recovery**: If your feedback loop is slower than your recovery, you are learning too late.
|
||||
|
||||
### Executive Framing
|
||||
|
||||
> *"Every failure is free intelligence. The organizations that learn fastest from setbacks outperform those that merely prevent them."*
|
||||
|
||||
### Consultant Framing
|
||||
|
||||
> *"We do not want fewer incidents. We want incidents that teach us something we could not have learned any other way."*
|
||||
|
||||
---
|
||||
|
||||
## Pillar 4: Sovereign Intelligence
|
||||
|
||||
### Principle
|
||||
|
||||
An organization that outsources its cognition outsources its future. Sovereign intelligence means owning the models, data, and reasoning infrastructure that drive strategic and operational decisions.
|
||||
|
||||
### The Argument
|
||||
|
||||
The current AI paradigm is extractive. Every prompt sent to a cloud AI is a contribution to a competitor's training set. Every workflow built on a third-party model is a dependency on an intelligence you do not control, cannot audit, and cannot guarantee will serve your interests tomorrow. This is not a privacy concern. It is a **survival concern**.
|
||||
|
||||
Sovereign intelligence is the antifragile response: local models, proprietary data loops, and owned reasoning infrastructure that improves with use rather than leaking value to external platforms.
|
||||
|
||||
### Antifragile Moves
|
||||
|
||||
- **Classify intelligence as a Tier 0 asset**: Treat proprietary models, fine-tuned weights, and reasoning pipelines with the same protective rigor as cryptographic keys.
|
||||
- **Deploy local AI infrastructure for sensitive workflows**: Run models on hardware you control, behind your own perimeter.
|
||||
- **Close the data loop**: Ensure proprietary data used for training or inference never leaves your environment.
|
||||
- **Build internal model manufacturing capability**: Move from consuming AI to producing intelligence tailored to your domain.
|
||||
|
||||
### Executive Framing
|
||||
|
||||
> *"You would not store your physical cash in a bank that lends it to competitors and reserves the right to change the currency. Your intellectual capital deserves the same protection. Local AI is the vault."*
|
||||
|
||||
### Consultant Framing
|
||||
|
||||
> *"If our company's intelligence were a physical pile of cash, would we store it in a public bank that takes a 'training fee' off every dollar and reserves the right to change the currency? Or would we keep it in our own vault?"*
|
||||
|
||||
See the full [AI Sovereignty Framework](ai-sovereignty-framework.md) for detailed arguments, counter-objections, and implementation guidance.
|
||||
|
||||
For the distinction between optional business AI and inevitable operational AI, see [AI Operations Inevitability](ai-operations-inevitability.md).
|
||||
|
||||
---
|
||||
|
||||
## Pillar 5: Asymmetric Payoff Design
|
||||
|
||||
### Principle
|
||||
|
||||
Antifragile systems are engineered so that small investments in protection yield disproportionately large reductions in catastrophic risk. The goal is not to eliminate all risk—it is to ensure that the remaining risks are **convex**: limited downside, unlimited upside from learning.
|
||||
|
||||
### The Argument
|
||||
|
||||
Traditional risk management treats all risks as equally worth mitigating. This is inefficient. An antifragile enterprise identifies the **small number of decisions and dependencies** whose failure would be existential, and concentrates disproportionate investment there. Everything else is managed with optionality and rapid recovery.
|
||||
|
||||
### Antifragile Moves
|
||||
|
||||
- **Identify your "kill chain"**: Map the shortest sequence of failures that would end the organization. Protect those nodes above all others.
|
||||
- **Invest in recovery over prevention**: For complex systems, perfect prevention is impossible. Sub-second detection and minute-level recovery are achievable and more valuable.
|
||||
- **Create convex experiments**: Run small, bounded-risk pilots that expose asymmetric upside—new capabilities discovered through controlled stress.
|
||||
- **Never spend more preventing a risk than the risk would cost if realized**: Except at the kill chain, where the cost is existential.
|
||||
|
||||
### Executive Framing
|
||||
|
||||
> *"We are not buying insurance. We are engineering the geometry of risk so that market volatility, regulatory pressure, and competitive threats strengthen our position rather than weaken it."*
|
||||
|
||||
### Consultant Framing
|
||||
|
||||
> *"We are not buying insurance. We are engineering the geometry of our risk so that volatility makes us richer, not poorer."*
|
||||
|
||||
---
|
||||
|
||||
## Living Document
|
||||
|
||||
This manifest is a living framework. Each engagement will surface new stressors, new patterns, and new refinements. Update it. Challenge it. Make it stronger.
|
||||
|
||||
---
|
||||
|
||||
*Next: [AI Sovereignty Framework](ai-sovereignty-framework.md)*
|
||||
215
antifragile-consulting/core/azure-openai-sovereignty-bridge.md
Normal file
215
antifragile-consulting/core/azure-openai-sovereignty-bridge.md
Normal file
@@ -0,0 +1,215 @@
|
||||
# Azure OpenAI / Foundry: The Sovereignty Bridge
|
||||
|
||||
> *"Full sovereignty tomorrow is impossible if you refuse to move today. Azure OpenAI is not the destination. It is the bridge that gets your organization walking in the right direction."*
|
||||
|
||||
This document provides the strategic framing, technical positioning, and migration pathway for consultants who want to move clients **away from public cloud AI APIs** and **toward controlled, resident AI infrastructure**—using Microsoft Azure OpenAI Service and Azure AI Foundry as the pragmatic intermediate step.
|
||||
|
||||
It is designed for M365/Azure consultancies whose clients are not ready for on-premises GPU clusters but must stop leaking proprietary data to public AI models.
|
||||
|
||||
---
|
||||
|
||||
## The Executive Summary
|
||||
|
||||
Your clients are likely using ChatGPT, Claude, or Gemini via public APIs and consumer accounts. Every prompt leaves their perimeter, and the terms of service allow model improvement using that data. This is the worst possible posture.
|
||||
|
||||
**Azure OpenAI Service is not fully sovereign.** Microsoft operates the infrastructure. The underlying models are shared. But it offers something critical that public APIs do not:
|
||||
|
||||
- **Your data does not train foundation models.** Microsoft's data processing agreement explicitly states that Azure OpenAI Service data is not used to train OpenAI's models.
|
||||
- **Data residency.** Prompts and completions remain in your Azure region (EU, US, etc.).
|
||||
- **Network isolation.** Private endpoints, VNet integration, and no public internet exposure.
|
||||
- **Encryption with customer-managed keys.** You control the keys that encrypt your data at rest.
|
||||
- **Audit and governance.** Full logging through Azure Monitor, diagnostic settings, and Microsoft Purview.
|
||||
- **Path to future sovereignty.** Fine-tuned models, custom datasets, and embeddings remain portable assets that can migrate to local inference later.
|
||||
|
||||
**The argument**: Azure OpenAI is the **sovereignty bridge**. It is not the vault. But it moves the client from the public street into a **leased apartment in their own building**—and from there, they can build their own vault when ready.
|
||||
|
||||
---
|
||||
|
||||
## The Public API vs. Azure OpenAI vs. Local Spectrum
|
||||
|
||||
| Dimension | Public API (ChatGPT, Claude, etc.) | Azure OpenAI / Foundry | Local / Sovereign AI |
|
||||
|-----------|-----------------------------------|------------------------|---------------------|
|
||||
| **Data trains foundation models?** | Yes (check current terms; subject to change) | **No** (Microsoft DPA) | No |
|
||||
| **Data residency** | Unknown / US-centric | **Customer's Azure region** | Your data centre |
|
||||
| **Network exposure** | Public internet | **Private endpoints / VNet** | Air-gapped possible |
|
||||
| **Encryption control** | Provider-managed | **Customer-managed keys (CMK)** | Full control |
|
||||
| **Model customization** | Limited (prompt engineering) | **Fine-tuning, embeddings, RAG** | Full weights, architecture, training |
|
||||
| **Auditability** | None | **Full Azure logging** | Complete |
|
||||
| **Vendor lock-in** | Extreme | **Moderate (portable models)** | Minimal |
|
||||
| **Operational cost** | Variable, unpredictable | **Predictable, metered** | Fixed capital |
|
||||
| **Setup complexity** | Low | **Medium** | Higher |
|
||||
| **Sovereignty maturity** | 0% | **60-70%** | 100% |
|
||||
|
||||
**The pitch**:
|
||||
|
||||
> *"Public APIs are a taxi: convenient, but you do not own the car, the driver works for someone else, and everything you say in the back seat becomes part of the driver's training. Azure OpenAI is a leased car in your garage: you control the keys, the trips stay in your neighborhood, and the driver does not learn from your conversations. Local AI is building your own car. We start with the leased car because it stops the bleeding today, and it keeps your options open for building your own tomorrow."*
|
||||
|
||||
---
|
||||
|
||||
## The Three Arguments for Azure OpenAI as a Bridge
|
||||
|
||||
### 1. Stop the Hemorrhage Now
|
||||
|
||||
**The Problem**: Shadow AI usage is rampant. Employees use personal ChatGPT accounts for code review, contract analysis, strategy documents, and customer data. This data is leaving the perimeter continuously.
|
||||
|
||||
**The Bridge**: Azure OpenAI Service deployed with private endpoints and conditional access gives employees a **sanctioned, governed alternative** that stops the shadow usage.
|
||||
|
||||
**The Metrics**:
|
||||
- Week 1: Inventory shadow AI usage via proxy logs and surveys
|
||||
- Week 2: Deploy Azure OpenAI with restricted access
|
||||
- Week 4: Measure reduction in public API traffic; measure increase in sanctioned usage
|
||||
|
||||
**The executive framing**:
|
||||
|
||||
> *"We cannot achieve full sovereignty in 30 days. But we can stop funding your competitors' R&D in 30 days. Azure OpenAI gives your teams a better tool than the public API, with the guarantee that your data is not training anyone else's model."*
|
||||
|
||||
---
|
||||
|
||||
### 2. Build Portable Assets
|
||||
|
||||
**The Problem**: When a client uses public APIs, they own nothing. No models, no weights, no training data, no embeddings. They are pure consumers.
|
||||
|
||||
**The Bridge**: Azure AI Foundry (formerly Azure AI Studio) allows clients to:
|
||||
|
||||
- Create **custom fine-tuned models** on proprietary data
|
||||
- Build **vector indexes and embeddings** from internal documents
|
||||
- Develop **RAG pipelines** that combine retrieval with generation
|
||||
- Export **model weights and datasets** for future migration
|
||||
|
||||
These are **assets**, not expenses. A fine-tuned model trained on a client's proprietary data is intellectual property that improves over time and can be moved to local infrastructure later.
|
||||
|
||||
**The executive framing**:
|
||||
|
||||
> *"With Azure Foundry, every prompt improves your internal capabilities. You build vector stores of your documents, fine-tuned models of your domain, and RAG pipelines of your workflows. When you are ready to move fully on-premises, you pack these assets and migrate them. You are not renting intelligence. You are building it—and storing it in a Microsoft warehouse until your own vault is ready."*
|
||||
|
||||
---
|
||||
|
||||
### 3. Maintain Optionality for Full Sovereignty
|
||||
|
||||
**The Problem**: Clients fear that choosing Azure OpenAI now will lock them into Microsoft forever, preventing a future move to local AI.
|
||||
|
||||
**The Bridge**: Azure OpenAI actually **preserves optionality** compared to public APIs because:
|
||||
|
||||
- Fine-tuned models can be exported and converted to ONNX or other formats
|
||||
- Embeddings and vector stores are standard formats (OpenAI embeddings are compatible with local vector databases)
|
||||
- RAG pipelines built on LangChain or Semantic Kernel are portable across inference backends
|
||||
- Prompt templates and evaluation datasets are vendor-agnostic
|
||||
|
||||
**The Migration Path**:
|
||||
|
||||
```
|
||||
Month 0-3: Azure OpenAI Service (sanctioned replacement for public APIs)
|
||||
→ Private endpoints, CMK, conditional access, Purview governance
|
||||
|
||||
Month 3-6: Azure AI Foundry (customization)
|
||||
→ Fine-tuning on proprietary data, RAG pipelines, vector stores
|
||||
|
||||
Month 6-12: Hybrid architecture
|
||||
→ Sensitive workloads on local inference (Ollama, vLLM)
|
||||
→ General workloads on Azure OpenAI
|
||||
|
||||
Month 12-24: Full sovereignty (if justified)
|
||||
→ Local inference cluster for all proprietary workloads
|
||||
→ Azure OpenAI retained only for non-sensitive, generic tasks
|
||||
```
|
||||
|
||||
**The executive framing**:
|
||||
|
||||
> *"We are not betting on Microsoft forever. We are using Microsoft to stop the bleeding, build portable assets, and train your team on AI operations. When your local infrastructure is ready, your models, your embeddings, and your pipelines move with you. That is optionality preservation."*
|
||||
|
||||
---
|
||||
|
||||
## Technical Positioning for Security-Conscious Clients
|
||||
|
||||
### Data Protection Architecture
|
||||
|
||||
| Control | Azure OpenAI Capability | Configuration Required |
|
||||
|---------|------------------------|------------------------|
|
||||
| **Data residency** | Regional deployment | Deploy to client's primary Azure region (e.g., West Europe, Germany West Central) |
|
||||
| **Network isolation** | Private Link / Private Endpoints | Disable public network access; route all traffic through VNet |
|
||||
| **Encryption at rest** | Microsoft-managed or CMK | Enable customer-managed keys in Azure Key Vault |
|
||||
| **Encryption in transit** | TLS 1.2+ | Enforce minimum TLS version |
|
||||
| **Access control** | Azure RBAC | Role-based access with least privilege; no standing admin access |
|
||||
| **Audit logging** | Azure Monitor, Diagnostic Settings | Enable all diagnostic logs; forward to SIEM |
|
||||
| **Data loss prevention** | Microsoft Purview | Classify data; block high-sensitivity data from AI endpoints if required |
|
||||
| **Retention** | Configurable | Set retention policies aligned with data governance |
|
||||
|
||||
### The Foundry / AI Studio Value Proposition
|
||||
|
||||
Azure AI Foundry provides:
|
||||
|
||||
- **Model catalog**: GPT-4, GPT-3.5, Embeddings, DALL-E, plus open models (Llama, Mistral, Phi) deployable in your Azure tenant
|
||||
- **Prompt flow**: Visual pipeline builder for RAG and agent workflows
|
||||
- **Evaluation tools**: Built-in evaluation for model performance, safety, and groundedness
|
||||
- **Content safety**: Built-in filtering for harmful content, PII detection
|
||||
- **Tracing and observability**: Full lineage of prompts, responses, and intermediate steps
|
||||
|
||||
**The security argument**: Foundry gives you **governance tooling that public APIs lack**. You can see who is asking what, evaluate whether responses are grounded in your data, and enforce content policies.
|
||||
|
||||
---
|
||||
|
||||
## When Azure OpenAI Is NOT Enough
|
||||
|
||||
Be honest with clients. Azure OpenAI has limits:
|
||||
|
||||
| Limitation | Implication | When to Escalate to Local |
|
||||
|-----------|-------------|---------------------------|
|
||||
| Microsoft still operates the infrastructure | Subpoena risk, geopolitical access | When handling classified, state-secret, or criminal-defense data |
|
||||
| Shared model weights (for base models) | Other tenants use the same underlying model | When model behaviour must be fully deterministic and auditable |
|
||||
| Requires internet connectivity (even with private endpoints) | Azure backbone dependency | For fully air-gapped environments (submarines, defense, some OT) |
|
||||
| Per-token pricing for inference | Cost scales with usage | At very high volume, local inference becomes cheaper |
|
||||
| Limited to Azure regions | Some nations require domestic cloud | When data sovereignty laws mandate in-country infrastructure not served by Azure |
|
||||
|
||||
**The honest pitch**:
|
||||
|
||||
> *"Azure OpenAI is not perfect sovereignty. It is 70% sovereignty. For most organizations, that is the right starting point because it stops the worst leakage immediately while you build toward 100%. If you handle state secrets or operate in fully air-gapped environments, we skip this step and go straight to local. For everyone else, the bridge is the fastest path to safety."*
|
||||
|
||||
---
|
||||
|
||||
## Integration With Existing Frameworks
|
||||
|
||||
### The AI Sovereignty Framework
|
||||
|
||||
Azure OpenAI maps to the sovereignty framework as **Phase 1** of the journey:
|
||||
|
||||
| Sovereignty Phase | Implementation |
|
||||
|-------------------|----------------|
|
||||
| **Phase 0 (Current)** | Public APIs, consumer accounts, shadow AI |
|
||||
| **Phase 1 (Azure OpenAI)** | Sanctioned, governed, resident AI with data protection guarantees |
|
||||
| **Phase 2 (Hybrid)** | Sensitive workloads local; general workloads on Azure |
|
||||
| **Phase 3 (Full Sovereign)** | All proprietary workloads on local inference; Azure retained for generic tasks only |
|
||||
|
||||
### The Rapid Modernisation Plan
|
||||
|
||||
| Rapid Modernisation Phase | Azure OpenAI Integration |
|
||||
|--------------------------|-------------------------|
|
||||
| **Hygiene (Days 0-30)** | Inventory shadow AI; deploy Azure OpenAI as sanctioned alternative |
|
||||
| **Control (Days 30-60)** | Private endpoints, CMK, RBAC, conditional access, Purview governance |
|
||||
| **Sovereignty (Days 60-90)** | Foundry pilot: fine-tuning, RAG, vector store on proprietary data |
|
||||
| **Antifragility (Days 90-180)** | Evaluate migration of high-sensitivity workloads to local inference; retain Azure for lower-sensitivity use cases |
|
||||
|
||||
### The M365 E3 Hardening Playbook
|
||||
|
||||
For E3 clients, Azure OpenAI is a **separate Azure subscription**—it does not require E5. The key integration points:
|
||||
|
||||
- **Entra ID conditional access**: Restrict Azure OpenAI access to compliant devices, trusted locations, and specific user groups
|
||||
- **Microsoft Purview**: Classify documents before they enter RAG pipelines (requires Purview licensing)
|
||||
- **Defender for Cloud Apps**: Monitor and control shadow AI usage alongside sanctioned Azure OpenAI usage
|
||||
|
||||
---
|
||||
|
||||
## Talking Points for the C-Suite
|
||||
|
||||
| Concern | Response |
|
||||
|---------|----------|
|
||||
| "Is this just another Microsoft lock-in?" | "It reduces lock-in compared to public APIs because your fine-tuned models, embeddings, and RAG pipelines are portable assets. When you are ready for full local AI, you migrate them. We are using Azure as a warehouse, not a prison." |
|
||||
| "Why not go straight to local AI?" | "Local AI requires hardware procurement, infrastructure setup, and expertise development—typically 3-6 months. Azure OpenAI stops the data leakage in 2 weeks while we build the local capability in parallel." |
|
||||
| "How is this different from just using ChatGPT?" | "ChatGPT trains on your data. Azure OpenAI explicitly does not. ChatGPT has no audit trail. Azure OpenAI logs every prompt. ChatGPT offers no data residency guarantee. Azure OpenAI keeps your data in your region. The difference is governance, not capability." |
|
||||
| "What if Microsoft changes the terms?" | "The data processing agreement is contractually binding. More importantly, the assets we build in Foundry are portable. If terms change unfavorably, we exercise the exit option we have been building toward all along." |
|
||||
| "Will this slow down our AI adoption?" | "It will accelerate safe adoption. Employees currently use unauthorized AI because there is no sanctioned alternative. Azure OpenAI gives them a better, safer tool. Adoption goes up; risk goes down." |
|
||||
|
||||
---
|
||||
|
||||
*For the full AI sovereignty argument, see [AI Sovereignty Framework](ai-sovereignty-framework.md).*
|
||||
*For the operational AI inevitability argument, see [AI Operations Inevitability](ai-operations-inevitability.md).*
|
||||
*For the M365 integration specifics, see [M365 Antifragile Project](../playbooks/m365-antifragile-project.md).*
|
||||
335
antifragile-consulting/core/blue-purple-team-foundation.md
Normal file
335
antifragile-consulting/core/blue-purple-team-foundation.md
Normal file
@@ -0,0 +1,335 @@
|
||||
# Blue / Purple Team Foundation
|
||||
|
||||
> *"Most organizations own a Ferrari-grade security stack and drive it like a rental car. The tools are not the problem. The team's ability to use them is."*
|
||||
|
||||
This document defines an engagement model for building **sustainable defensive capability**—not by selling more tools, but by operationalizing what the client already owns. It is designed for Heads of Security who feel they are not in control despite owning Microsoft Defender, Sentinel, and other advanced security platforms.
|
||||
|
||||
The focus is on **Defender Exposure Management** (formerly Microsoft Defender Threat & Vulnerability Management / Secure Score), **Sentinel** (if deployed), and the **people and processes** required to turn telemetry into action.
|
||||
|
||||
---
|
||||
|
||||
## The "Tools-Without-Capability" Trap
|
||||
|
||||
Many organizations have purchased or inherited an impressive security stack:
|
||||
|
||||
| Tool | Typical Ownership State | What the Head of Security Feels |
|
||||
|------|------------------------|--------------------------------|
|
||||
| **Microsoft Defender for Endpoint** (E5) | Installed on 60% of endpoints; ASR rules in audit mode; alerts ignored | "We have EDR but nobody hunts" |
|
||||
| **Microsoft Sentinel** | Log ingestion configured; 47 built-in analytic rules active; 200 alerts/day; 2 analysts | "Sentinel generates noise, not intelligence" |
|
||||
| **Defender for Office 365** | Safe Links enabled; 10,000 quarantined emails/month; no review process | "We catch threats but do not learn from them" |
|
||||
| **Defender for Cloud / Exposure Management** | Secure Score visible; recommendations listed; remediation rate < 20% | "We know what is wrong but cannot fix it fast enough" |
|
||||
| **Entra ID Identity Protection** | Risk detections logged; no automated response; manual review weekly | "We detect risky sign-ins but respond too slowly" |
|
||||
|
||||
**The pattern**: They own the tools. They lack the **operating rhythm**.
|
||||
|
||||
- No tiered alert triage (everything is "P1" or nothing is)
|
||||
- No hunt hypothesis (analysts wait for alerts, they do not seek anomalies)
|
||||
- No metrics that matter (SOC reports ticket volume, not mean-time-to-contain)
|
||||
- No purple team culture (offence and defence never talk)
|
||||
- No continuous improvement loop (findings do not produce structural change)
|
||||
|
||||
---
|
||||
|
||||
## The Engagement Model: From Tool Ownership to Operational Capability
|
||||
|
||||
### Phase 1: Capability Audit (Week 1-2)
|
||||
|
||||
**Objective**: Assess not the tools, but the **team's ability to use them**.
|
||||
|
||||
> **Critical distinction for outsourced SOCs**: If the client uses an MSSP, the capability audit must assess the **MSSP's detection coverage in the client's environment**, not just the client's internal team. See [Retained Capability](retained-capability.md) for the full MSSP co-management model.
|
||||
|
||||
**Tool Capability Assessment**:
|
||||
|
||||
| Capability | Maturity Question | Score (1-5) |
|
||||
|-----------|-------------------|-------------|
|
||||
| **Alert Triage** | Can a Tier-1 analyst correctly prioritize a Defender alert without escalating? | |
|
||||
| **Threat Hunting** | Has the team run a proactive hunt in the last 30 days? | |
|
||||
| **Incident Response** | Is there a documented, tested IR playbook for M365 compromise? | |
|
||||
| **Vulnerability Management** | Is there an SLA for critical vulnerability remediation? | |
|
||||
| **Exposure Management** | Is Secure Score reviewed weekly with ownership assignments? | |
|
||||
| **Metrics & Reporting** | Does the SOC report mean-time-to-detect and mean-time-to-contain? | |
|
||||
| **Purple Team** | Have red and blue teams collaborated in the last 90 days? | |
|
||||
| **Automation** | Are repeatable tasks automated (isolation, disable account, enrich alert)? | |
|
||||
| **MSSP Detection Coverage** | If using an MSSP: have they detected >70% of emulated TTPs in your environment? | |
|
||||
|
||||
**Deliverable**: Capability Gap Report
|
||||
- Current maturity score per capability
|
||||
- Target maturity score (realistic 12-month goal)
|
||||
- Priority gaps: which missing capabilities create the most risk?
|
||||
- Tool utilization heatmap: which purchased features are unused?
|
||||
|
||||
**The conversation (in-house SOC)**:
|
||||
|
||||
> *"Your Defender Secure Score is 42 out of 100. But the score itself is not the problem. The problem is that you have 38 open recommendations, 12 of them critical, and no one owns the remediation of any of them. We are not here to raise your score. We are here to build the operating rhythm that keeps your score rising without consultant dependency."*
|
||||
|
||||
**The conversation (outsourced SOC / MSSP)**:
|
||||
|
||||
> *"Your MSSP generates 200 tickets per month and meets every SLA. But when we emulated five common attack techniques last week, the MSSP detected only two. The other three—lateral movement via RDP, data staging in unusual locations, and exfiltration via personal cloud storage—were invisible to them. Not because they are incompetent, but because their generic rules do not know your environment. We do not replace the MSSP. We build the 1.5-person detection engineering cell that writes custom rules for your environment and makes the MSSP actually effective."*
|
||||
|
||||
---
|
||||
|
||||
### Phase 2: Quick Wins & Operating Rhythm (Week 3-6)
|
||||
|
||||
**Objective**: Build the basic operating rhythm that makes the tools useful.
|
||||
|
||||
#### 2A: Defender Exposure Management Operationalization
|
||||
|
||||
**The tool**: Defender Exposure Management (formerly TVM / Secure Score) provides:
|
||||
- Vulnerability inventory across endpoints
|
||||
- Misconfiguration detection (Secure Score)
|
||||
- Attack surface reduction recommendations
|
||||
- Threat analytics and vulnerability exploitation intelligence
|
||||
|
||||
**What most organizations do**: Look at the dashboard once a quarter.
|
||||
|
||||
**What we implement**:
|
||||
|
||||
| Activity | Frequency | Owner | Output |
|
||||
|----------|-----------|-------|--------|
|
||||
| Secure Score review | Weekly | Security lead + IT owner | 3 prioritized remediation actions |
|
||||
| Vulnerability prioritization | Weekly | Vuln management analyst | Risk-ranked list: exploitability × asset criticality |
|
||||
| Exposure remediation sprint | Bi-weekly | IT + Security | Closed vulnerabilities, validated |
|
||||
| Threat intelligence brief | Weekly | Threat intel analyst | New CVEs affecting our estate; hunting hypotheses |
|
||||
| ASR rule review | Monthly | Endpoint security admin | Audit-mode hits analyzed; block-mode rules justified |
|
||||
|
||||
**The key discipline**: Every open recommendation must have an owner and a due date. No orphaned findings.
|
||||
|
||||
#### 2B: Alert Triage & Enrichment
|
||||
|
||||
**What most organizations do**: Alert arrives → analyst reads it → creates ticket → waits for senior analyst.
|
||||
|
||||
**What we implement**:
|
||||
|
||||
- **Tier-1 triage playbook**: Decision tree for common Defender alerts (suspicious PowerShell, credential dumping, lateral movement)
|
||||
- **Automated enrichment**: Logic App or Power Automate flow that enriches alerts with user info, device info, recent sign-ins, geo-location
|
||||
- **Auto-response for high-confidence alerts**: Isolate device, disable user, block IP for confirmed malicious indicators
|
||||
- **Alert tuning**: Disable or suppress noisy rules; customize thresholds per client environment
|
||||
|
||||
#### 2C: The First Hunt
|
||||
|
||||
**What most organizations do**: "We would hunt if we had time."
|
||||
|
||||
**What we implement**:
|
||||
|
||||
- **Hunt hypothesis workshop**: 2-hour session where blue team proposes 3 hypotheses based on recent threat intelligence
|
||||
- **Guided first hunt**: Consultant and blue team analyst pair on one hypothesis
|
||||
- Example: "We believe an adversary might be using living-off-the-land binaries (LOLBin) for reconnaissance. Let us hunt for unusual WMIC, net.exe, or nltest usage."
|
||||
- **Hunt report template**: Documented findings, evidence, and structural improvements (not just "found nothing")
|
||||
- **Hunt calendar**: Commit to one hunt per month for the next quarter
|
||||
|
||||
**For MSSP clients**: The first hunt often reveals gaps in MSSP detection coverage. These gaps become the first custom detection rules the retained capability cell writes and deploys.
|
||||
|
||||
**Deliverable**: Operating Rhythm Playbook
|
||||
- Weekly, bi-weekly, and monthly cadence definitions
|
||||
- RACI matrix for each activity
|
||||
- Dashboard definitions and data sources
|
||||
- Automated enrichment and response runbooks
|
||||
|
||||
---
|
||||
|
||||
### Phase 3: Purple Team Foundation (Week 7-10)
|
||||
|
||||
**Objective**: Break the silo between offence and defence. Build collaborative muscle.
|
||||
|
||||
#### The Purple Team Exercise
|
||||
|
||||
Unlike a red team (adversarial, stealthy) or a blue team (defensive, reactive), a purple team is **collaborative and educational**:
|
||||
|
||||
| Phase | Red Team Action | Blue Team Action | Purple Team Outcome |
|
||||
|-------|---------------|------------------|---------------------|
|
||||
| **Plan** | Propose 3 TTPs to test | Evaluate detection coverage for each TTP | Agreed scope: which TTPs, which tools, which metrics |
|
||||
| **Execute** | Attempt TTP in controlled manner | Observe and document what their tools see | Real-time comparison: what was expected vs. what was detected |
|
||||
| **Analyze** | Explain technique and evasion methods | Explain detection logic and gaps | Shared understanding of why something was missed |
|
||||
| **Improve** | Suggest additional TTPs for future | Implement detection rules, tuning, or architectural changes | Closed-loop: every missed detection becomes a structural fix |
|
||||
|
||||
#### First Purple Team Exercise (Example)
|
||||
|
||||
**Scope**: M365 identity compromise simulation
|
||||
|
||||
| TTP | Red Team Action | Blue Team Detection Target | Outcome |
|
||||
|-----|---------------|---------------------------|---------|
|
||||
| Password spray | Attempt 50 logins against 10 accounts | Entra ID Identity Protection risky sign-in alert | Did alert fire? Was it tuned? Was response automated? |
|
||||
| OAuth consent grant | Create malicious enterprise app; trick user into consent | Defender for Cloud Apps anomaly alert | Is user consent blocked? Is app inventory current? |
|
||||
| Mailbox rule manipulation | Create forwarding rule to external address | Defender for Office 365 alert | Is alert enabled? Who responds? How fast? |
|
||||
| Lateral movement via Teams | Exfiltrate files via Teams external share | DLP / sharing anomaly alert | Are sharing policies enforced? Is external sharing monitored? |
|
||||
|
||||
**Duration**: One day (not a month-long red team)
|
||||
**Audience**: Blue team analysts, IT admins, security architect
|
||||
**Output**: Detection gap matrix; prioritized improvements; next exercise scheduled
|
||||
|
||||
#### Building the Purple Team Habit
|
||||
|
||||
| Cadence | Activity | Participants |
|
||||
|---------|----------|--------------|
|
||||
| Monthly | Purple team exercise (half-day) | 1 red teamer + 2-3 blue teamers + observer |
|
||||
| Monthly | Threat intel brief + hunt hypothesis | Threat intel + SOC + IT |
|
||||
| Quarterly | Tabletop exercise (ransomware, BEC, insider threat) | Security + IT + Legal + Comms + Executive |
|
||||
| Quarterly | Detection engineering sprint | SOC + IT + Consultant |
|
||||
|
||||
**Deliverable**: Purple Team Charter
|
||||
- Scope rules (what is in-bounds, what is out-of-bounds)
|
||||
- Cadence calendar
|
||||
- Metrics: detection rate, mean-time-to-detect, false positive rate, improvement closure rate
|
||||
|
||||
---
|
||||
|
||||
### Phase 4: Roadmap & Handover (Week 11-12)
|
||||
|
||||
**Objective**: The team owns the capability. The consultant provides advisory oversight only.
|
||||
|
||||
**Activities**:
|
||||
- **12-month roadmap**: Prioritized capability improvements with timelines and resource estimates
|
||||
- Month 1-3: Operating rhythm stabilized; weekly Secure Score reviews; monthly hunts
|
||||
- Month 4-6: Automated response for tier-1 alerts; SOAR playbooks (or Logic Apps)
|
||||
- Month 7-9: Advanced hunting training; custom KQL detection rules
|
||||
- Month 10-12: Full purple team program; quarterly adversarial simulation; threat-led penetration testing (DORA)
|
||||
- **Knowledge transfer**: Document every custom query, playbook, and tuning decision
|
||||
- **Metrics baseline**: Establish the metrics dashboard the team will use to self-assess
|
||||
- **Advisory retainer**: Optional monthly 4-hour check-in for escalation support and advanced scenarios
|
||||
|
||||
**Deliverable**: Blue Team Capability Roadmap
|
||||
- Maturity targets per capability
|
||||
- Resource requirements (headcount, training, tooling)
|
||||
- Quarterly milestones and validation criteria
|
||||
- RACI for ongoing operations
|
||||
|
||||
---
|
||||
|
||||
## Specific Tool Deep-Dives
|
||||
|
||||
### Defender Exposure Management (Secure Score + TVM)
|
||||
|
||||
**Current state at most clients**: Secure Score is a number they see but do not act on.
|
||||
|
||||
**Operationalization**:
|
||||
|
||||
1. **Weekly Secure Score standup** (15 minutes):
|
||||
- What changed since last week?
|
||||
- What are the top 3 easiest wins?
|
||||
- What is blocked and needs escalation?
|
||||
|
||||
2. **Vulnerability SLA**:
|
||||
- Critical (exploited in the wild): 48 hours
|
||||
- High (exploit available): 7 days
|
||||
- Medium: 30 days
|
||||
- Low: 90 days
|
||||
|
||||
3. **Exposure-based prioritization**:
|
||||
- Do not patch everything. Patch the vulnerabilities on the assets that are:
|
||||
- Internet-facing
|
||||
- Privileged access
|
||||
- Unprotected by compensating controls
|
||||
|
||||
4. **Threat analytics integration**:
|
||||
- Review Defender Threat Analytics weekly
|
||||
- Map active threat actor TTPs to your environment
|
||||
- Generate hunt hypotheses from threat intelligence
|
||||
|
||||
### Microsoft Sentinel (If Deployed)
|
||||
|
||||
**Current state at most clients**: Ingesting logs; generating alerts; drowning in noise.
|
||||
|
||||
**Operationalization**:
|
||||
|
||||
1. **Alert quality audit**:
|
||||
- Review last 30 days of alerts
|
||||
- Categorize: true positive, false positive, benign positive
|
||||
- Target: >70% true positive rate before adding new rules
|
||||
|
||||
2. **Tiered response model**:
|
||||
- Tier 1 (L1): Triage, enrichment, initial containment
|
||||
- Tier 2 (L2): Investigation, deeper analysis, escalation
|
||||
- Tier 3 (L3): Threat hunting, detection engineering, purple team
|
||||
|
||||
3. **Automation first**:
|
||||
- Automate enrichment before human sees alert
|
||||
- Automate containment for high-confidence indicators
|
||||
- Automate closure documentation
|
||||
|
||||
4. **Custom detection rules**:
|
||||
- Start with 3-5 high-value custom KQL rules based on your environment
|
||||
- Example: "Detect login from impossible travel + sensitive file download"
|
||||
- Validate with purple team exercise
|
||||
|
||||
---
|
||||
|
||||
## Talking Points for the Head of Security
|
||||
|
||||
**When they say**: *"We have all these tools but I still do not feel in control."*
|
||||
|
||||
**You respond**:
|
||||
|
||||
> *"That is because tools do not create control. Operating rhythm creates control. You have a Ferrari but no one taught your team to drive it. I help you build the weekly cadence, the tiered response, the hunt discipline, and the purple team culture that turns telemetry into action. In 12 weeks, your team will not just own the tools. They will own the capability."*
|
||||
|
||||
**When they say**: *"My analysts are overwhelmed."*
|
||||
|
||||
**You respond**:
|
||||
|
||||
> *"Overwhelmed analysts are usually drowning in noise. We tune the alerts, automate the enrichment, and build a triage playbook so your Tier-1 analysts know exactly what to do with the 20 alerts they see each morning. The goal is not fewer alerts. It is more actionable alerts."*
|
||||
|
||||
**When they say**: *"We cannot afford a 24/7 SOC."*
|
||||
|
||||
**You respond**:
|
||||
|
||||
> *"Most organizations do not need a 24/7 SOC. They need a team that can detect, contain, and recover during business hours—and automated response for the hours they are not watching. We design for your reality, not for a Gartner ideal."*
|
||||
|
||||
**When they say**: *"We have never done threat hunting."*
|
||||
|
||||
**You respond**:
|
||||
|
||||
> *"Perfect. We start with one guided hunt. A 4-hour session with a hypothesis, a search, and a finding. Most teams discover something they did not know within the first two hours. Hunting is not magic. It is structured curiosity. We teach the structure."*
|
||||
|
||||
**When they say**: *"Our red team and blue team do not talk."*
|
||||
|
||||
**You respond**:
|
||||
|
||||
> *"That is the norm, and it is destructive. Red team thinks blue team is incompetent. Blue team thinks red team is reckless. Purple team fixes both: red team teaches technique; blue team learns to detect; both improve. We run your first purple team exercise in Week 7. It is usually the most productive security meeting the organization has had all year."*
|
||||
|
||||
**When they say**: *"Our outsourced SOC underperforms."*
|
||||
|
||||
**You respond**:
|
||||
|
||||
> *"Your MSSP is not failing you. You are failing to give them the context and custom detection rules they need to succeed in your environment. They run generic rules for 200 clients. Generic rules catch generic threats. Your adversaries are not generic. We do not fire the MSSP. We build a 2-person detection engineering cell inside your organization that writes custom rules for your environment, audits the MSSP's coverage quarterly, and makes your existing €600K SOC spend actually work. For the cost of one senior analyst, you transform insurance theater into actual protection."*
|
||||
|
||||
---
|
||||
|
||||
## Metrics That Prove Capability
|
||||
|
||||
| Before | After | What It Measures |
|
||||
|--------|-------|-----------------|
|
||||
| "We have 200 Sentinel alerts per day" | "We have 12 actionable alerts per day; 88% are true positives" | Alert quality |
|
||||
| "Mean time to respond: 4 hours" | "Mean time to contain: 15 minutes for high-confidence alerts" | Response speed |
|
||||
| "We have never hunted" | "We run one hunt per month; last hunt found 3 dormant accounts" | Proactive defence |
|
||||
| "Secure Score is 42 and falling" | "Secure Score is 72 and rising; remediation SLA is 90%" | Exposure management |
|
||||
| "Red team findings sit in a PDF" | "Red team findings become detection rules within 2 weeks" | Closed-loop improvement |
|
||||
| "Analyst turnover is high" | "Analysts report higher satisfaction; they feel effective" | Team health |
|
||||
|
||||
---
|
||||
|
||||
## Integration With Modular Engagements
|
||||
|
||||
This module naturally connects to technical hardening and validation:
|
||||
|
||||
```
|
||||
Module 3 (M365 Security Hardening) or Module 6 (On-Premise AD Hardening)
|
||||
↓ Tools deployed but underutilized
|
||||
Module 12 (Blue/Purple Team Foundation)
|
||||
↓ Team learns to operationalize tools; builds sustainable capability
|
||||
Module 10 (Red Team & Validation)
|
||||
↓ Independent validation proves the capability works
|
||||
```
|
||||
|
||||
It can also follow endpoint management:
|
||||
|
||||
```
|
||||
Module 1 (Endpoint Management)
|
||||
↓ Devices visible and compliant
|
||||
Module 12 (Blue/Purple Team Foundation)
|
||||
↓ EDR alerts now actionable; hunt on endpoint telemetry
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
*For the modular engagement menu, see [Modular Engagements](modular-engagements.md).*
|
||||
*For embedded process assurance, see [Embedded Quality & Process Assurance](quality-management-engagement.md).*
|
||||
*For organizational structure transformation, see [Organizational Resilience](organizational-resilience.md).*
|
||||
294
antifragile-consulting/core/c-suite-conversation-guide.md
Normal file
294
antifragile-consulting/core/c-suite-conversation-guide.md
Normal file
@@ -0,0 +1,294 @@
|
||||
# C-Suite Conversation Guide
|
||||
|
||||
> *"You are not selling security. You are selling survival, speed, and strategic optionality."*
|
||||
|
||||
This guide prepares consultants for conversations with CEOs, CFOs, COOs, board members, and divisional presidents. It translates every technical control into a business decision and provides scripts, objection handling, and psychological framing tested in regulated, high-stakes environments.
|
||||
|
||||
---
|
||||
|
||||
## The Golden Rule of Executive Communication
|
||||
|
||||
**Never lead with technology. Always lead with consequence.**
|
||||
|
||||
| Bad Opening | Good Opening |
|
||||
|------------|-------------|
|
||||
| "We need to deploy ASR rules and enable PIM." | "There are currently 12 administrator accounts that, if compromised, would allow an attacker to delete our entire digital operation in under an hour. We can eliminate that exposure in two weeks with tools you already own." |
|
||||
| "We should implement local AI inference." | "Every strategic document your teams paste into ChatGPT is training data for a model that will eventually be sold to your competitors. We can stop that leakage this quarter for less than the cost of one mid-level hire." |
|
||||
| "Your CIS Controls gap is significant." | "Regulators now treat cybersecurity gaps as governance failures. The board's personal liability exposure under NIS2 and DORA begins the day an incident is proven preventable." |
|
||||
|
||||
---
|
||||
|
||||
## Know Your Audience
|
||||
|
||||
### The CEO
|
||||
|
||||
**Primary concern**: Reputation, competitive position, speed of execution.
|
||||
|
||||
**Frame**: This is not an IT project. It is a **strategic repositioning** that makes the organization faster, more independent, and harder to replicate.
|
||||
|
||||
**Key messages**:
|
||||
- "Your competitors are building on cloud AI. You are feeding it. Reversing that creates a moat."
|
||||
- "We can demonstrate measurable risk reduction in 30 days. Most consultants need 90 days to produce a report."
|
||||
- "This positions you as the strategic defender of the company's future, not just its perimeter."
|
||||
|
||||
**What to avoid**: Technical jargon, long timelines, requests for blanket budget approval.
|
||||
|
||||
**The ask**: Executive sponsorship, authority to make disruptive changes in the first 30 days, and a weekly 30-minute steering committee slot.
|
||||
|
||||
---
|
||||
|
||||
### The CFO
|
||||
|
||||
**Primary concern**: Cost, ROI, predictability of spend, regulatory liability.
|
||||
|
||||
**Frame**: This is **the highest-return risk reduction available** because it leverages existing investments before requesting new ones.
|
||||
|
||||
**Key messages**:
|
||||
- "We start with configuration, not procurement. Most of the value comes from turning on what you have already paid for."
|
||||
- "Cloud AI pricing is linear and unpredictable. Local AI is a fixed capital expense with zero per-query leakage risk."
|
||||
- "DORA fines reach 2% of global turnover. NIS2 exposes board members to personal liability. The cost of this program is a fraction of one regulatory penalty."
|
||||
- "We will produce a before-and-after risk quantification in 60 days. You will see the financial equivalent of what we have fixed."
|
||||
|
||||
**What to avoid**: Vague security promises, unlimited budgets, multi-year commitments without phase gates.
|
||||
|
||||
**The ask**: Approval for a 90-day pilot with a hard stop for financial review before any significant capital expenditure.
|
||||
|
||||
---
|
||||
|
||||
### The COO / Operations Director
|
||||
|
||||
**Primary concern**: Uptime, operational disruption, supply chain stability, workforce impact.
|
||||
|
||||
**Frame**: This reduces operational fragility and ensures the organization can continue functioning even when primary systems or vendors fail.
|
||||
|
||||
**Key messages**:
|
||||
- "We are not adding complexity. We are removing hidden dependencies that currently threaten continuity."
|
||||
- "If your primary cloud AI provider raises prices 500% tomorrow, what happens to the workflows built on it? We eliminate that single point of failure."
|
||||
- "In the first 30 days, we will test your ability to recover one critical system from backup. Most organizations discover they cannot. We fix that before it matters."
|
||||
- "OT and IT separation is not bureaucracy. It is what keeps a malware infection in accounting from reaching the control room."
|
||||
|
||||
**What to avoid**: Technical depth on endpoint policies, abstract risk discussions without operational context.
|
||||
|
||||
**The ask**: Authority to run a controlled recovery drill, permission to temporarily disable unused accounts and access paths, and operations team participation in the 30-day sprint.
|
||||
|
||||
---
|
||||
|
||||
### The Board / Audit Committee
|
||||
|
||||
**Primary concern**: Governance, liability, regulatory compliance, shareholder value.
|
||||
|
||||
**Frame**: This is **governance enhancement** with evidence-based risk reduction and full regulatory alignment.
|
||||
|
||||
**Key messages**:
|
||||
- "The board's duty of care now explicitly includes cybersecurity under NIS2 and DORA. This program produces the evidence that duty is being met."
|
||||
- "We classify intelligence as a Tier 0 asset—the same category as domain controllers and root certificate authorities. That classification elevates the conversation from IT to strategic asset protection."
|
||||
- "Our 180-day roadmap maps directly to CIS Controls, NIST CSF, and DORA requirements. At each phase gate, we produce auditable evidence."
|
||||
- "We conduct quarterly antifragility assessments that trend the organization's resilience over time. The board receives a single-page dashboard."
|
||||
|
||||
**What to avoid**: Operational detail, tool-specific discussions, anything that sounds like IT outsourcing.
|
||||
|
||||
**The ask**: Board-level endorsement of the antifragile mandate, quarterly 15-minute briefings, and support for the executive sponsor's authority.
|
||||
|
||||
---
|
||||
|
||||
## The Seven Strategic Arguments
|
||||
|
||||
### 1. The Competitive Moat Argument
|
||||
|
||||
**The Frame**: Your data is your only sustainable advantage. Giving it to cloud AI providers is arming your competitors.
|
||||
|
||||
**The Script**:
|
||||
|
||||
> *"When your engineering team sends proprietary code to a cloud AI for review, that code improves a model that will eventually be sold to your competitors. When your strategy team asks an AI to analyze market positioning, that reasoning becomes training signal for a general model. You are not using AI. You are contributing to a public good that erodes your private advantage. Local AI closes that loop. Your data improves only your model. That is a moat no competitor can cross."*
|
||||
|
||||
**Who it moves**: CEOs, CTOs, heads of strategy, product leaders.
|
||||
|
||||
---
|
||||
|
||||
### 2. The Regulatory License Argument
|
||||
|
||||
**The Frame**: Compliance is no longer about paperwork. It is about demonstrable resilience. Regulators are now empowered to fine boards personally.
|
||||
|
||||
**The Script**:
|
||||
|
||||
> *"DORA, NIS2, and national critical infrastructure laws have changed the game. A preventable incident is now a governance failure, not a technical one. The board's personal liability is on the line. Our program does not produce policies. It produces evidence: recovery drills, chaos experiments, tested backups, and vendor exit architectures. When the regulator asks, you show them proof—not promises."*
|
||||
|
||||
**Who it moves**: Board members, general counsel, chief risk officers, compliance heads.
|
||||
|
||||
---
|
||||
|
||||
### 3. The Insurance Policy Argument
|
||||
|
||||
**The Frame**: This is not an upgrade. It is an insurance policy against the obsolescence of your own company.
|
||||
|
||||
**The Script**:
|
||||
|
||||
> *"Think of local AI as a vault. Yes, it costs something to build. But if your company's intelligence were physical cash, would you store it in a public bank that charges a training fee on every deposit and reserves the right to change the currency overnight? Or would you keep it in your own vault, where you control the security, the access, and the value? We are building the vault."*
|
||||
|
||||
**Who it moves**: CFOs, risk committees, conservative boards.
|
||||
|
||||
---
|
||||
|
||||
### 4. The Speed Argument
|
||||
|
||||
**The Frame**: The organizations that survive are not the most protected. They are the fastest to adapt.
|
||||
|
||||
**The Script**:
|
||||
|
||||
> *"Your industry is being disrupted by companies that can reorient in weeks while their competitors need quarters. Antifragility is not about preventing change. It is about engineering systems that improve when change happens. Every incident becomes a lesson. Every vendor failure becomes an opportunity to switch. Every regulatory demand becomes a competitive differentiator. We make you the company that moves faster than the disruption."*
|
||||
|
||||
**Who it moves**: CEOs, COOs, digital transformation leaders.
|
||||
|
||||
---
|
||||
|
||||
### 5. The Cost-of-Inaction Argument
|
||||
|
||||
**The Frame**: The price of doing nothing is no longer hypothetical. It is quantifiable and catastrophic.
|
||||
|
||||
**The Script**:
|
||||
|
||||
> *"The average ransomware recovery cost in Europe is now €4.5 million. That does not include regulatory fines, customer churn, or litigation. A single DORA fine can reach 2% of global turnover. One compromised cloud AI workflow can leak your entire product roadmap. The question is not whether you can afford this program. The question is whether you can afford to discover your vulnerabilities the way most companies do: at 3 AM, during an active breach, with no recovery plan."*
|
||||
|
||||
**Who it moves**: CFOs, boards, risk committees.
|
||||
|
||||
---
|
||||
|
||||
### 6. The Talent Argument
|
||||
|
||||
**The Frame**: The best security and engineering talent wants to work for organizations that take resilience seriously.
|
||||
|
||||
**The Script**:
|
||||
|
||||
> *"Engineers and security professionals have choices. They want to work where their work matters, where systems are designed intelligently, and where they are not fighting fires caused by decades of neglect. An antifragile posture is a recruiting advantage. It signals that this organization respects craft, invests in durability, and operates at a strategic level—not a reactive one."*
|
||||
|
||||
**Who it moves**: CHROs, CTOs, CEOs in competitive labor markets.
|
||||
|
||||
---
|
||||
|
||||
### 7. The Professional Responsibility Argument
|
||||
|
||||
**The Frame**: As advisors, we cannot in good conscience recommend that you outsource your strategic intelligence to unauditable third parties.
|
||||
|
||||
**The Script**:
|
||||
|
||||
> *"I am not a reseller. I am an independent architect. My fiduciary responsibility is to your organization's survival. I cannot recommend that you continue sending proprietary strategy to a black box you cannot audit, that is actively incentivized to commoditize your data, and that can change its terms overnight. That is not technology adoption. That is strategic self-harm. My recommendation is to own your intelligence. I will show you exactly how."*
|
||||
|
||||
**Who it moves**: CEOs, boards, anyone who has been burned by vendor lock-in before.
|
||||
|
||||
---
|
||||
|
||||
## Objection Handling for the C-Suite
|
||||
|
||||
| Objection | Response | Follow-Up |
|
||||
|-----------|----------|-----------|
|
||||
| "We already have a security team." | "This does not replace them. It accelerates them. Most internal teams are underwater with incidents. We provide focus, methodology, and executive air cover for 180 days." | "Let us meet your CISO and identify the one project they have been trying to get approved for six months. We will deliver it in 30 days." |
|
||||
| "Our auditors just signed off." | "Auditors verify that controls exist. We verify that they work under stress. Compliance is the floor. Resilience is the ceiling." | "When was your last live recovery drill? When did you last test a vendor exit?" |
|
||||
| "This sounds expensive." | "The first 30 days are primarily configuration of existing tools. We extract value you have already paid for before recommending any purchase." | "Let us run a 30-day sprint. If you do not see measurable risk reduction, we stop." |
|
||||
| "We are in the middle of a cloud migration." | "Perfect. Security should be architected in, not bolted on. We embed antifragile principles into the migration so you do not recreate the same dependencies in the cloud." | "Let us review your cloud architecture for hidden single points of failure." |
|
||||
| "Our industry is different." | "The principles are universal. The implementation is tailored. We have specific playbooks for telco, power, and banking—regulatory alignment included." | "Which regulation keeps you awake at night? DORA? NIS2? SWIFT CSP? We map directly to all of them." |
|
||||
| "We tried a security program before and it failed." | "Most programs fail because they are indefinite, untethered from business outcomes, and measured in compliance checkboxes. Ours is 180 days, phase-gated, and measured in risk reduction." | "What failed last time? Timeline? Budget? Executive support? We design specifically to avoid those failure modes." |
|
||||
| "The board will never approve this." | "The board will approve evidence. We produce a one-page risk dashboard in 30 days. That dashboard is your approval mechanism." | "Let us schedule a 20-minute briefing. I will show you what other boards have seen—and approved." |
|
||||
|
||||
---
|
||||
|
||||
## The 20-Minute Board Briefing Structure
|
||||
|
||||
When you get 20 minutes with the board, use this structure:
|
||||
|
||||
**Minutes 0-3: The Threat**
|
||||
- One sentence: "Your proprietary intelligence is currently training your competitors."
|
||||
- One statistic: "The average ransomware recovery is €4.5M, and that does not include regulatory fines."
|
||||
- One story: A comparable organization that suffered a preventable failure.
|
||||
|
||||
**Minutes 3-8: The Alternative**
|
||||
- Introduce antifragility: "Systems that grow stronger from disruption."
|
||||
- The five pillars in business language (see table above).
|
||||
- AI sovereignty as the strategic differentiator.
|
||||
|
||||
**Minutes 8-13: The Program**
|
||||
- 180 days, four phases, measurable outcomes.
|
||||
- Existing tools first, purchases only if justified.
|
||||
- Regulatory alignment: DORA, NIS2, CIS, NIST.
|
||||
- **Modularity**: "We do not require a 180-day commitment upfront. We offer specific, bounded modules. You choose the one that solves your most urgent pain. If it works, we add the next one."
|
||||
|
||||
**Minutes 13-17: The Evidence**
|
||||
- Week 1: Kill chain identified.
|
||||
- Week 4: First recovery drill completed.
|
||||
- Week 12: Local AI pilot operational.
|
||||
- Week 24: Board dashboard with trending resilience metrics.
|
||||
|
||||
**Minutes 17-20: The Ask**
|
||||
- Executive sponsor with authority.
|
||||
- Weekly 30-minute steering committee.
|
||||
- Tolerance for temporary disruption in days 1-30.
|
||||
- Phase-gated budget: approve one module at a time.
|
||||
|
||||
**Leave behind**: The [Executive Summary](executive-summary.md) printed on one page. **And**: The [Modular Engagements](modular-engagements.md) module menu.
|
||||
|
||||
---
|
||||
|
||||
## The One-Page Dashboard (Week 30)
|
||||
|
||||
After the first month, produce a single-page dashboard for the executive sponsor and board:
|
||||
|
||||
```
|
||||
ANTIFRAGILE DASHBOARD — [Client Name] — Month 1
|
||||
|
||||
RISK REDUCTION
|
||||
├─ Critical identities secured: [X] of [Y] (target: 100%)
|
||||
├─ Public-facing assets mapped: [X] of [Y]
|
||||
├─ T0 assets identified: [X]
|
||||
├─ Mean time to recover (tested): [X] hours (target: < 4)
|
||||
└─ Vendor dependencies without exit plan: [X] (target: 0)
|
||||
|
||||
REGULATORY EVIDENCE
|
||||
├─ CIS IG1 safeguards implemented: [X] of 56
|
||||
├─ Recovery drill completed: [Yes / No]
|
||||
├─ Incident response runbook tested: [Yes / No]
|
||||
└─ AI sovereignty pilot operational: [Yes / No]
|
||||
|
||||
INVESTMENT
|
||||
├─ New tooling purchased: €0 (Month 1)
|
||||
├─ Existing tools activated: [X] capabilities
|
||||
└─ Next phase budget required: €[X] (if any)
|
||||
|
||||
TOP 3 RISKS REMAINING
|
||||
1. [Risk] — Mitigation timeline: [Date]
|
||||
2. [Risk] — Mitigation timeline: [Date]
|
||||
3. [Risk] — Mitigation timeline: [Date]
|
||||
|
||||
RECOMMENDATION: [Proceed to Month 2 / Pause and remediate / Escalate]
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Psychological Framing
|
||||
|
||||
### Loss Aversion
|
||||
|
||||
Executives feel losses more acutely than equivalent gains. Frame inaction as a loss:
|
||||
|
||||
> *"Every day you continue sending proprietary data to cloud AI, you are transferring intellectual capital to entities that will eventually compete with you. That is not a future risk. That is a current hemorrhage."*
|
||||
|
||||
### Social Proof
|
||||
|
||||
Use comparable organizations (anonymized if necessary):
|
||||
|
||||
> *"The power utility we worked with last quarter discovered they could not recover their Active Directory from backup. Their €50,000 program fixed that in 14 days. The test alone was worth the engagement."*
|
||||
|
||||
### Authority and Independence
|
||||
|
||||
Differentiate from vendor-aligned consultants:
|
||||
|
||||
> *"I do not represent Microsoft, AWS, or any AI provider. My only incentive is your resilience. If I recommend a purchase, it is because the gap genuinely requires it—not because I have a quota."*
|
||||
|
||||
### Urgency Without Panic
|
||||
|
||||
Create bounded urgency:
|
||||
|
||||
> *"We do not need to fix everything this quarter. We need to fix the kill chain this month. The rest can wait. But the kill chain cannot."*
|
||||
|
||||
---
|
||||
|
||||
*For the financial justification, see [Business Case Template](../playbooks/business-case-template.md).*
|
||||
*For the strategic foundation, see [The Antifragile Manifest](antifragile-manifest.md).*
|
||||
75
antifragile-consulting/core/executive-summary.md
Normal file
75
antifragile-consulting/core/executive-summary.md
Normal file
@@ -0,0 +1,75 @@
|
||||
# Executive Summary: The Antifragile Enterprise
|
||||
|
||||
> *For the Board, the CEO, and the Executive Committee. One page. Five minutes. A decision that determines whether the organization survives its next disruption.*
|
||||
|
||||
---
|
||||
|
||||
## The Problem in One Sentence
|
||||
|
||||
Your organization is currently engaged in a **massive, unpaid research project for its competitors**—sending proprietary data, strategic reasoning, and operational intelligence to cloud platforms that are incentivized to commoditize your industry.
|
||||
|
||||
## What Is at Stake
|
||||
|
||||
| Asset Category | Current Risk | If Compromised or Extracted |
|
||||
|---------------|-------------|----------------------------|
|
||||
| Strategic intelligence | Rented from cloud AI providers | Competitors replicate your edge; your strategy becomes public model training data |
|
||||
| Customer trust | Protected by compliance theater | Regulatory fines, class-action liability, irreversible reputational damage |
|
||||
| Operational continuity | Dependent on vendor stability | Single API change or geopolitical event halts revenue-critical workflows |
|
||||
| Technical talent | Wasted on maintenance of fragile systems | Burnout, attrition, inability to attract security-conscious engineers |
|
||||
| Regulatory license | Assumed, not proven | DORA, NIS2, PSD2, and national regulators now demand demonstrable resilience—not paperwork |
|
||||
|
||||
## The Antifragile Alternative
|
||||
|
||||
An antifragile organization does not merely survive shocks. It **grows stronger from them**. Every incident produces structural improvement. Every competitor's failure creates market opportunity. Every regulatory demand is met with evidence, not promises.
|
||||
|
||||
### The Five Pillars (Business Translation)
|
||||
|
||||
| Pillar | What the Board Hears |
|
||||
|--------|---------------------|
|
||||
| **Structural Decoupling** | "We will never again be held hostage by a single vendor's pricing, terms, or existence." |
|
||||
| **Optionality Preservation** | "We maintain the right to change direction in 90 days, not 9 months." |
|
||||
| **Stress-to-Signal Conversion** | "Every failure makes us smarter and structurally stronger." |
|
||||
| **Sovereign Intelligence** | "Our proprietary data improves our own models, not our competitors'." |
|
||||
| **Asymmetric Payoff Design** | "Small, focused investments protect us against existential risks." |
|
||||
|
||||
## The Strategic Mandate: AI Sovereignty
|
||||
|
||||
The current AI paradigm is **extractive**. Every prompt sent to a cloud AI teaches that system how to replace you. By running artificial intelligence on infrastructure you control, you:
|
||||
|
||||
- **Protect your intellectual property** from becoming public training data
|
||||
- **Ensure operational continuity** regardless of vendor decisions, geopolitics, or API changes
|
||||
- **Reduce long-term costs** from unpredictable per-token pricing to fixed infrastructure
|
||||
- **Demonstrate regulatory maturity** to auditors who increasingly scrutinize data residency and third-party risk
|
||||
|
||||
> *"If our company's intelligence were a physical pile of cash, would we store it in a public bank that takes a 'training fee' off every dollar and reserves the right to change the currency? Or would we keep it in our own vault?"*
|
||||
|
||||
Local AI is the vault.
|
||||
|
||||
## The 180-Day Commitment
|
||||
|
||||
We do not propose a three-year transformation. We propose **four phases, 180 days, measurable outcomes**:
|
||||
|
||||
| Phase | Timeline | Business Outcome |
|
||||
|-------|----------|-----------------|
|
||||
| **Hygiene** | Days 0-30 | Visibility. We see every identity, every asset, every gap that could end the company. |
|
||||
| **Control** | Days 30-60 | Containment. We close the highest-risk exposure with existing tools—no new procurement. |
|
||||
| **Sovereignty** | Days 60-90 | Ownership. We reclaim proprietary intelligence and validate that we can recover from disaster. |
|
||||
| **Antifragility** | Days 90-180 | Advantage. We convert disruption into learning, and learning into market position. |
|
||||
|
||||
## The Investment Framing
|
||||
|
||||
This is not a cost centre. It is **optionality insurance**.
|
||||
|
||||
- **Cost of the program**: Primarily configuration and process—existing tools are leveraged first.
|
||||
- **Cost of inaction**: A single ransomware incident averages €4.5M in recovery. A single regulatory fine under DORA can reach 2% of global turnover. A single competitor trained on your data renders your proprietary advantage worthless.
|
||||
- **ROI timeline**: Risk reduction is visible in 30 days. Regulatory evidence is demonstrable in 90 days. Competitive advantage from sovereign intelligence compounds over 12-24 months.
|
||||
|
||||
## The Decision Required
|
||||
|
||||
We need **one executive sponsor with authority**, **one steering committee meeting per week**, and **tolerance for temporary disruption** in the first 30 days. The alternative is to continue operating with unseen dependencies, unmapped risks, and an intelligence strategy that enriches competitors.
|
||||
|
||||
---
|
||||
|
||||
*For the detailed strategic argument, see [The Antifragile Manifest](antifragile-manifest.md).*
|
||||
*For the board conversation guide, see [C-Suite Conversation Guide](c-suite-conversation-guide.md).*
|
||||
*For financial justification, see [Business Case Template](../playbooks/business-case-template.md).*
|
||||
569
antifragile-consulting/core/modular-engagements.md
Normal file
569
antifragile-consulting/core/modular-engagements.md
Normal file
@@ -0,0 +1,569 @@
|
||||
# Modular Engagement Architecture
|
||||
|
||||
> *"Not every client is ready for the full journey. Some need to solve one burning problem first. The antifragile approach is architected so that every module stands alone—and every module makes the next one easier."*
|
||||
|
||||
This document defines the antifragile consulting portfolio as a **menu of independent, self-contained modules**. Clients can purchase any module without committing to the full 180-day program. Each module delivers measurable value, produces transferable assets, and creates natural appetite for the next phase.
|
||||
|
||||
---
|
||||
|
||||
## The Philosophy: Progressive Resilience
|
||||
|
||||
We do not sell monolithic transformation projects. We sell **building blocks** that stack.
|
||||
|
||||
| Approach | Traditional Consulting | Antifragile Modular |
|
||||
|----------|----------------------|---------------------|
|
||||
| Sales motion | Sell a 12-month program or nothing | Sell a 30-day module; expand based on proven value |
|
||||
| Client commitment | All-in or walk away | Start where the pain is highest |
|
||||
| Risk to client | High (unknown ROI until month 6+) | Low (measurable value in 30 days) |
|
||||
| Risk to consultant | High (scope creep, payment delays) | Low (bounded scope, phase-gated payment) |
|
||||
| Political capital | Consumed defending the program | Generated by visible early wins |
|
||||
|
||||
**The rule**: Every module must be **sellable on its own**, **deliverable in 90 days or less**, and **must produce evidence that the next module is warranted**.
|
||||
|
||||
---
|
||||
|
||||
## The Module Menu
|
||||
|
||||
### Module 1: Endpoint Management Foundation
|
||||
|
||||
**The Entry Vector. The Most Common Starting Point.**
|
||||
|
||||
| Attribute | Detail |
|
||||
|-----------|--------|
|
||||
| **Typical duration** | 30-45 days |
|
||||
| **Typical investment** | Low (labor only; Intune included in E3) |
|
||||
| **Prerequisites** | M365 E3 or higher; Azure AD tenant |
|
||||
| **Standalone value** | Full device visibility; compliance enforcement; remote management capability |
|
||||
| **Typical client** | Remote-first organization; SCCM retiree; compliance-driven; Intune shelfware |
|
||||
|
||||
**What is delivered**:
|
||||
- Device inventory and enrollment campaign (Windows, macOS, iOS, Android)
|
||||
- Compliance baseline: encryption, OS version, password policy, firewall
|
||||
- Application inventory and shadow IT discovery
|
||||
- Basic conditional access integration (compliant device required for M365 access)
|
||||
- Admin training and operational handover
|
||||
|
||||
**Executive pitch**:
|
||||
|
||||
> *"Your devices are in home offices, airports, and coffee shops. In 30 days, we will know exactly what you have, whether it is secure, and how to fix what is not. This is not surveillance. It is ensuring that only healthy devices access your data—wherever they are."*
|
||||
|
||||
**Natural next modules**: Module 2 (Identity Security), Module 5 (AI Sovereignty Bridge), Module 6 (On-Premise AD)
|
||||
|
||||
**See**: [Endpoint Management Entry Vector](../playbooks/endpoint-management-entry-vector.md)
|
||||
|
||||
---
|
||||
|
||||
### Module 2: M365 Identity Security
|
||||
|
||||
**The Foundation of Everything. The Most Undervalued Module.**
|
||||
|
||||
| Attribute | Detail |
|
||||
|-----------|--------|
|
||||
| **Typical duration** | 30-60 days |
|
||||
| **Typical investment** | Low to medium (labor; E5/P2 licensing upgrade may be recommended selectively) |
|
||||
| **Prerequisites** | M365 tenant (E3 minimum); administrative access |
|
||||
| **Standalone value** | Elimination of standing privileged access; MFA enforcement; legacy auth blocked; guest access governed |
|
||||
| **Typical client** | Post-breach hardening; auditor findings; rapid growth with identity debt; privileged account compromise |
|
||||
|
||||
**What is delivered**:
|
||||
- Full identity census: human accounts, service accounts, guests, enterprise apps
|
||||
- MFA enforcement for 100% of users (per-user MFA for E3; conditional access for E5)
|
||||
- Legacy authentication blocked tenant-wide
|
||||
- Privileged access workstation (PAW) architecture for admins
|
||||
- PIM deployment (if E5/Entra ID P2) or manual JIT process (if E3)
|
||||
- Guest access audit and time-bounding
|
||||
- OAuth consent governance
|
||||
|
||||
**Executive pitch**:
|
||||
|
||||
> *"There are currently [X] administrator accounts in your tenant. If any one of them is compromised, an attacker owns your email, your documents, and your identity system. In 30 days, we reduce that to the minimum viable number, enforce multi-factor authentication, and ensure no admin ever logs in from a workstation with email and browsing."*
|
||||
|
||||
**Natural next modules**: Module 3 (M365 Security Hardening), Module 6 (On-Premise AD), Module 7 (Recovery & Resilience)
|
||||
|
||||
---
|
||||
|
||||
### Module 3: M365 Security Hardening
|
||||
|
||||
**The E3 Maximization Play. Configuration, Not Procurement.**
|
||||
|
||||
| Attribute | Detail |
|
||||
|-----------|--------|
|
||||
| **Typical duration** | 30-60 days |
|
||||
| **Typical investment** | Low (primarily labor; no new licensing required for E3 clients) |
|
||||
| **Prerequisites** | M365 tenant; Module 2 (Identity Security) strongly recommended first |
|
||||
| **Standalone value** | EOP tuned to maximum aggression; audit logging operational; Secure Score trending upward; ASR rules (if E5) |
|
||||
| **Typical client** | E3 clients with untapped security potential; post-M365-deployment hardening; Secure Score below 50 |
|
||||
|
||||
**What is delivered**:
|
||||
- Exchange Online Protection tuning: anti-phishing, anti-malware, anti-spam
|
||||
- Mailbox auditing enabled for all users
|
||||
- Unified Audit Log enabled and forwarded to SIEM
|
||||
- Microsoft Secure Score baseline and improvement plan
|
||||
- ASR rule deployment in audit mode (E5) or Defender Antivirus maximization (E3)
|
||||
- Windows Defender Firewall and exploit protection baseline
|
||||
- LAPS deployment for local admin password randomization
|
||||
|
||||
**Executive pitch**:
|
||||
|
||||
> *"You own E3, which includes enterprise-grade antivirus, email filtering, and audit logging. Most organizations use less than 30% of these capabilities because no one configured them. We turn every available security control to maximum—and prove the improvement with before-and-after metrics. No new software. Just expertise applied to what you already paid for."*
|
||||
|
||||
**Natural next modules**: Module 4 (Data Governance), Module 5 (AI Sovereignty Bridge), Module 10 (Red Team & Validation)
|
||||
|
||||
**See**: [M365 E3 Hardening](../playbooks/m365-e3-hardening.md), [Zero-Budget Hardening](../playbooks/zero-budget-hardening.md)
|
||||
|
||||
---
|
||||
|
||||
### Module 4: Data Governance & Compliance
|
||||
|
||||
**The Regulatory Survival Module.**
|
||||
|
||||
| Attribute | Detail |
|
||||
|-----------|--------|
|
||||
| **Typical duration** | 45-90 days |
|
||||
| **Typical investment** | Medium (labor; Purview licensing may be required for advanced features) |
|
||||
| **Prerequisites** | M365 tenant; Module 3 (Security Hardening) recommended |
|
||||
| **Standalone value** | Data classification deployed; retention policies enforced; DLP active; eDiscovery ready; regulatory evidence produced |
|
||||
| **Typical client** | Regulated industries (banking, healthcare, critical infrastructure); litigation hold requirements; GDPR/DORA/NIS2 compliance |
|
||||
|
||||
**What is delivered**:
|
||||
- Sensitivity label deployment (Public, Internal, Confidential, Highly Confidential)
|
||||
- Retention policies for all M365 workloads (email, Teams, SharePoint, OneDrive)
|
||||
- Data Loss Prevention (DLP) policies for high-sensitivity data types
|
||||
- External sharing lockdown and per-site governance
|
||||
- eDiscovery readiness: legal hold procedures, retention hold capability
|
||||
- Teams governance: controlled creation, expiration, access reviews
|
||||
- SharePoint site provisioning governance
|
||||
|
||||
**Executive pitch**:
|
||||
|
||||
> *"Your auditor does not want to see a policy document. They want to see evidence that sensitive data is classified, that emails are retained according to regulation, and that you can produce documents for legal hold within 48 hours. We build the evidence—not the theater."*
|
||||
|
||||
**Natural next modules**: Module 5 (AI Sovereignty Bridge), Module 7 (Recovery & Resilience), Module 10 (Red Team & Validation)
|
||||
|
||||
---
|
||||
|
||||
### Module 5: AI Sovereignty Bridge
|
||||
|
||||
**The Strategic Differentiator. The Conversation Starter.**
|
||||
|
||||
| Attribute | Detail |
|
||||
|-----------|--------|
|
||||
| **Typical duration** | 30-60 days |
|
||||
| **Typical investment** | Low to medium (labor; Azure OpenAI consumption; optional local inference hardware) |
|
||||
| **Prerequisites** | M365 tenant; Azure subscription; data governance baseline strongly recommended |
|
||||
| **Standalone value** | Shadow AI eliminated; sanctioned Azure OpenAI deployed; proprietary data protected; first custom model or RAG pipeline operational |
|
||||
| **Typical client** | Organizations using ChatGPT/Claude/Gemini without governance; leadership asking "what is our AI strategy?"; competitors investing in AI |
|
||||
|
||||
**What is delivered**:
|
||||
- Shadow AI usage inventory (proxy logs, endpoint scans, surveys)
|
||||
- Azure OpenAI Service deployment with private endpoints and customer-managed keys
|
||||
- Conditional access policies restricting AI access to approved users and devices
|
||||
- Azure AI Foundry pilot: one RAG pipeline or fine-tuned model on proprietary data
|
||||
- AI governance policy: approved use cases, prohibited data types, human-in-the-loop requirements
|
||||
- User education: why sanctioned AI is safer and often better than public alternatives
|
||||
|
||||
**Executive pitch**:
|
||||
|
||||
> *"Your teams are already using AI—through personal accounts, browser tabs, and mobile apps. Every proprietary document they paste into ChatGPT trains a model that will eventually be sold to your competitors. We stop that leakage in two weeks by giving them a better, safer alternative. Then we build your first custom AI asset on data that never leaves your Azure region."*
|
||||
|
||||
**Natural next modules**: Module 9 (Organizational Resilience), Module 4 (Data Governance), Module 10 (Red Team & Validation)
|
||||
|
||||
**See**: [Azure OpenAI Sovereignty Bridge](azure-openai-sovereignty-bridge.md), [AI Sovereignty Framework](ai-sovereignty-framework.md)
|
||||
|
||||
---
|
||||
|
||||
### Module 6: On-Premise AD & Endpoint Hardening
|
||||
|
||||
**The Legacy Debt Cleanup. For Organizations with Feet in Both Worlds.**
|
||||
|
||||
| Attribute | Detail |
|
||||
|-----------|--------|
|
||||
| **Typical duration** | 45-60 days |
|
||||
| **Typical investment** | Medium (labor; Sysmon/Wazuh deployment; possible hardware for PAWs) |
|
||||
| **Prerequisites** | On-premise Active Directory; administrative access to domain controllers |
|
||||
| **Standalone value** | KRBTGT rotated; LAPS deployed; Sysmon operational; privileged access tiered; Azure AD Connect secured |
|
||||
| **Typical client** | Hybrid identity environments; SCCM/AD shops; post-Active-Directory-compromise recovery; NIS2-critical infrastructure |
|
||||
|
||||
**What is delivered**:
|
||||
- Full AD identity census with orphan and privilege analysis
|
||||
- KRBTGT password rotation (if > 180 days stale)
|
||||
- LAPS deployment to all domain-joined workstations
|
||||
- Sysmon deployment with SwiftOnSecurity configuration
|
||||
- Privileged Access Workstation (PAW) architecture for Tier 0 admins
|
||||
- Azure AD Connect hardening and audit
|
||||
- AD FS security review (if present)
|
||||
- Windows Defender maximization and firewall hardening
|
||||
|
||||
**Executive pitch**:
|
||||
|
||||
> *"Your Active Directory has been running for fifteen years. It has accounts from employees who left a decade ago, service accounts with passwords that never expire, and administrator accounts that log in from the same laptops used for email and browsing. In 45 days, we clean the foundation—and make it significantly harder for an adversary to gain a foothold."*
|
||||
|
||||
**Natural next modules**: Module 2 (Identity Security), Module 7 (Recovery & Resilience), Module 8 (OT Security Assessment)
|
||||
|
||||
**See**: [AD and Endpoint Hardening](../playbooks/ad-endpoint-hardening.md)
|
||||
|
||||
---
|
||||
|
||||
### Module 7: Recovery & Resilience Validation
|
||||
|
||||
**The Insurance Policy. Prove You Can Rebuild Before You Need To.**
|
||||
|
||||
| Attribute | Detail |
|
||||
|-----------|--------|
|
||||
| **Typical duration** | 30-45 days |
|
||||
| **Typical investment** | Low to medium (labor; third-party backup if not already owned) |
|
||||
| **Prerequisites** | Backup solution in place (even if untested); administrative access to critical systems |
|
||||
| **Standalone value** | One critical system recovered from backup; runbooks documented; CMDB seeded; quarterly drill cadence established |
|
||||
| **Typical client** | Organizations that have never tested recovery; recent ransomware scare; DORA/NIS2 compliance preparation; board demanding evidence |
|
||||
|
||||
**What is delivered**:
|
||||
- Backup coverage inventory: what is backed up, how often, where, by what mechanism
|
||||
- Recovery drill: one critical system restored to isolated environment with full validation
|
||||
- CMDB seeding: T0 and T1 assets documented with owners, dependencies, and recovery requirements
|
||||
- Recovery runbooks: documented, tested, and transferable to non-designers
|
||||
- Immutable backup validation: ensure backups cannot be deleted by compromised admin accounts
|
||||
- Quarterly recovery drill calendar established
|
||||
|
||||
**Executive pitch**:
|
||||
|
||||
> *"Most organizations discover they cannot recover from backup at 3 AM during an active ransomware incident. We discover it in a controlled test during business hours—when we can fix it without pressure. The question is not whether you have backups. The question is whether you have ever proven they work. We prove it."*
|
||||
|
||||
**Natural next modules**: Module 10 (Red Team & Validation), Module 8 (OT Security Assessment), Module 3 (M365 Security Hardening)
|
||||
|
||||
---
|
||||
|
||||
### Module 8: OT Security Assessment
|
||||
|
||||
**The Critical Infrastructure Module. For Power, Utilities, and Telco.**
|
||||
|
||||
| Attribute | Detail |
|
||||
|-----------|--------|
|
||||
| **Typical duration** | 45-90 days |
|
||||
| **Typical investment** | Medium to high (labor; potential network hardware for segmentation) |
|
||||
| **Prerequisites** | OT network access; cooperation from operations and engineering teams |
|
||||
| **Standalone value** | IT/OT connection matrix; vendor access audit; manual override procedures validated; NIS2 evidence produced |
|
||||
| **Typical client** | Power utilities; water/wastewater; telecommunications; manufacturing with SCADA/DCS |
|
||||
|
||||
**What is delivered**:
|
||||
- OT asset inventory: SCADA, DCS, EMS, protection relays, RTUs, AMI
|
||||
- IT-to-OT network connection mapping with business justification
|
||||
- Vendor remote access audit and time-bounding
|
||||
- Network segmentation plan: IT/OT DMZ, unidirectional gateway recommendations
|
||||
- Manual override procedure documentation and validation
|
||||
- NIS2/CER compliance evidence package
|
||||
- Black start / islanding procedure test (power utilities)
|
||||
|
||||
**Executive pitch**:
|
||||
|
||||
> *"Your control room does not need email. Your protection relays do not need internet access. Every connection between IT and OT is a bridge an adversary can cross. We map those bridges, justify the ones that must remain, and eliminate the ones that put physical safety at risk. This is not IT security. This is operational survival."*
|
||||
|
||||
**Natural next modules**: Module 6 (On-Premise AD), Module 7 (Recovery & Resilience), Module 10 (Red Team & Validation)
|
||||
|
||||
**See**: [Vertical: Power and Utilities](../reference/vertical-power-utilities.md), [Vertical: Telco](../reference/vertical-telco.md)
|
||||
|
||||
---
|
||||
|
||||
### Module 9: Organizational Resilience
|
||||
|
||||
**The People and Process Module. Fix the Structure, Not Just the Tools.**
|
||||
|
||||
| Attribute | Detail |
|
||||
|-----------|--------|
|
||||
| **Typical duration** | 60-90 days |
|
||||
| **Typical investment** | Medium (labor; no tooling cost) |
|
||||
| **Prerequisites** | Executive sponsor with authority; willingness to experiment with team structure |
|
||||
| **Standalone value** | One product team with embedded security; shift-left pilot operational; shared metrics proving velocity and security can coexist |
|
||||
| **Typical client** | Organizations with siloed Dev/Sec/Ops; slow release cycles blamed on security gates; talent retention problems |
|
||||
|
||||
**What is delivered**:
|
||||
- Current-state Dev/Sec/Ops friction mapping
|
||||
- Pilot team selection and embedded security engineer placement
|
||||
- CI/CD security gate deployment (automated scanning, not manual review)
|
||||
- Shared OKR definition: team owns vulnerability count, change failure rate, recovery time
|
||||
- Platform team or SRE team architecture (if appropriate)
|
||||
- Blameless post-mortem process with structural mandate
|
||||
- 90-day metrics report: before-and-after velocity, defect rates, team satisfaction
|
||||
|
||||
**Executive pitch**:
|
||||
|
||||
> *"Your development team ships fast. Your security team says no. Your operations team keeps the lights on. None of them are wrong—but the organizational boundary between them destroys all three goals. We do not reorganize your departments on day one. We embed security into one product team, measure the results, and let the metrics make the case for broader change."*
|
||||
|
||||
**Natural next modules**: Module 2 (Identity Security), Module 5 (AI Sovereignty Bridge), Module 10 (Red Team & Validation)
|
||||
|
||||
**See**: [Organizational Resilience](organizational-resilience.md)
|
||||
|
||||
---
|
||||
|
||||
### Module 10: Red Team & Validation
|
||||
|
||||
**The Proof Module. Validate Everything You Have Built.**
|
||||
|
||||
| Attribute | Detail |
|
||||
|-----------|--------|
|
||||
| **Typical duration** | 15-30 days (engagement) + quarterly re-testing |
|
||||
| **Typical investment** | Medium to high (external red team; internal coordination) |
|
||||
| **Prerequisites** | At least one other module deployed; operational incident response capability |
|
||||
| **Standalone value** | Independent validation of security posture; kill chain identification; board-ready evidence |
|
||||
| **Typical client** | Regulated industries requiring annual penetration testing; post-transformation validation; boards demanding proof |
|
||||
|
||||
**What is delivered**:
|
||||
- Scoping and rules of engagement (aligned to DORA TLPT or CIS requirements)
|
||||
- Adversarial simulation: external reconnaissance, initial access, lateral movement, impact
|
||||
- M365-specific attack paths: BEC, OAuth consent abuse, conditional access bypass attempts
|
||||
- OT-bounded red team (for critical infrastructure clients)
|
||||
- Report with kill chain analysis and prioritized remediation
|
||||
- Board presentation: findings, risk quantification, and evidence of control effectiveness
|
||||
- Quarterly purple team exercises (optional retainer)
|
||||
|
||||
**Executive pitch**:
|
||||
|
||||
> *"You have invested in security controls. But controls that have not been tested are assumptions, not facts. A red team exercise is a controlled failure that proves whether your defenses work before a real adversary tests them. The board receives independent evidence—not consultant promises."*
|
||||
|
||||
**Natural next modules**: Any module where gaps were identified; typically cycles back to hardening modules.
|
||||
|
||||
---
|
||||
|
||||
### Module 11: Embedded Quality & Process Assurance
|
||||
|
||||
**The Presence Module. For Leaders Who Feel They Are Not in Control.**
|
||||
|
||||
| Attribute | Detail |
|
||||
|-----------|--------|
|
||||
| **Typical duration** | 60-90 days (12 weeks embedded) |
|
||||
| **Typical investment** | Medium (labor; no tooling cost) |
|
||||
| **Prerequisites** | Executive sponsor; team willing to be observed; tolerance for process change |
|
||||
| **Standalone value** | Repeatable processes; accurate documentation; team confidence; friction reduction |
|
||||
| **Typical client** | Heads of Security or Operations who say "we don't feel in control"; project teams behind schedule; teams with tool-shelfware |
|
||||
|
||||
**What is delivered**:
|
||||
- Immersion report: formal vs. actual process map; invisible risks identified
|
||||
- Friction reduction: fast wins that reduce daily pain and vulnerability
|
||||
- Capability handover: team-owned documentation, self-assessment checklists, metrics dashboard
|
||||
- Validation: team operates independently for one week; consultant steps back to advisory
|
||||
|
||||
**Executive pitch**:
|
||||
|
||||
> *"You have capable people, but the gap between what is documented and what is actually happening has grown too wide. I do not audit you. I join your team for 12 weeks, observe the reality of daily work, and help you close that gap. You will have repeatable processes, accurate documentation, and a team that trusts its own capability."*
|
||||
|
||||
**Natural next modules**: Module 9 (Organizational Resilience), Module 12 (Blue/Purple Team Foundation), Module 3 (M365 Security Hardening)
|
||||
|
||||
**See**: [Embedded Quality & Process Assurance](quality-management-engagement.md)
|
||||
|
||||
---
|
||||
|
||||
### Module 12: Blue / Purple Team Foundation
|
||||
|
||||
**The Capability Module. From Tool Ownership to Operational Defense.**
|
||||
|
||||
| Attribute | Detail |
|
||||
|-----------|--------|
|
||||
| **Typical duration** | 60-90 days |
|
||||
| **Typical investment** | Medium (labor; leverages existing Microsoft security stack) |
|
||||
| **Prerequisites** | Microsoft Defender (E5) or equivalent EDR; at least one security analyst; willingness to learn |
|
||||
| **Standalone value** | Operating rhythm for SOC; first guided threat hunt; purple team charter; 12-month capability roadmap |
|
||||
| **Typical client** | Organizations that own E5/Defender/Sentinel but underutilize them; SOC drowning in noise; no hunt discipline; red and blue teams do not collaborate |
|
||||
|
||||
**What is delivered**:
|
||||
- Capability audit: maturity assessment of detection, response, hunting, and metrics
|
||||
- Operating rhythm: weekly Secure Score reviews, alert triage playbooks, automated enrichment
|
||||
- First guided threat hunt: hypothesis-driven search with documented methodology
|
||||
- Purple team exercise: collaborative attack/defence simulation with detection gap analysis
|
||||
- 12-month roadmap: prioritized capability improvements with resource requirements
|
||||
|
||||
**Executive pitch**:
|
||||
|
||||
> *"You have a Ferrari-grade security stack and drive it like a rental car. The tools are not the problem—the team's ability to use them is. I help you build the weekly cadence, the hunt discipline, and the purple team culture that turns telemetry into action. In 12 weeks, your team owns the capability, not just the licenses."*
|
||||
|
||||
**Natural next modules**: Module 10 (Red Team & Validation), Module 3 (M365 Security Hardening), Module 7 (Recovery & Resilience)
|
||||
|
||||
**See**: [Blue/Purple Team Foundation](blue-purple-team-foundation.md)
|
||||
|
||||
**Also see**: [Retained Capability](retained-capability.md) for the MSSP co-management and detection engineering model.
|
||||
|
||||
---
|
||||
|
||||
## Module Selection Guide
|
||||
|
||||
### For the Client Who Knows Their Pain
|
||||
|
||||
| Client Says | Start With Module | Typical Duration |
|
||||
|-------------|-------------------|-----------------|
|
||||
| "We need to manage remote devices" | Module 1: Endpoint Management | 30-45 days |
|
||||
| "We had a phishing incident" | Module 2: Identity Security | 30-60 days |
|
||||
| "Our E3 licenses feel wasted" | Module 3: M365 Security Hardening | 30-60 days |
|
||||
| "The auditor is coming" | Module 4: Data Governance | 45-90 days |
|
||||
| "What is our AI strategy?" | Module 5: AI Sovereignty Bridge | 30-60 days |
|
||||
| "Our AD is a mess" | Module 6: On-Premise AD Hardening | 45-60 days |
|
||||
| "Can we actually recover from backup?" | Module 7: Recovery & Resilience | 30-45 days |
|
||||
| "We operate critical infrastructure" | Module 8: OT Security Assessment | 45-90 days |
|
||||
| "Security slows us down" | Module 9: Organizational Resilience | 60-90 days |
|
||||
| "Prove our security works" | Module 10: Red Team & Validation | 15-30 days |
|
||||
| "We don't feel in control" | Module 11: Embedded Quality Assurance | 60-90 days |
|
||||
| "We own tools but can't use them" | Module 12: Blue/Purple Team Foundation | 60-90 days |
|
||||
| "Our outsourced SOC underperforms" | Module 12 (+ Retained Capability Audit) | 60-90 days |
|
||||
| "Mythos/AI will find all our vulnerabilities" | AI-assisted TVM Sprint | 30-90 days |
|
||||
|
||||
### For the Client Who Does Not Know Where to Start
|
||||
|
||||
**The Diagnostic Path**:
|
||||
|
||||
1. **Week 1: Kill Chain Assessment** (included in scoping; no charge)
|
||||
- Interview stakeholders
|
||||
- Identify the shortest path to organizational failure
|
||||
- Recommend the module that closes the most critical gap
|
||||
|
||||
2. **Module selection based on kill chain**:
|
||||
- Kill chain starts with compromised endpoint → Module 1
|
||||
- Kill chain starts with stolen credentials → Module 2
|
||||
- Kill chain starts with unrecoverable systems → Module 7
|
||||
- Kill chain starts with OT bridge → Module 8
|
||||
|
||||
---
|
||||
|
||||
## Progressive Enhancement: How Modules Stack
|
||||
|
||||
### Path A: The M365-First Organization
|
||||
|
||||
```
|
||||
Month 1-2: Module 1 (Endpoint Management)
|
||||
↓ Discovers identity and AI gaps
|
||||
Month 2-3: Module 2 (Identity Security)
|
||||
↓ Discovers compliance and data gaps
|
||||
Month 4-5: Module 4 (Data Governance)
|
||||
↓ Discovers AI shadow usage
|
||||
Month 5-6: Module 5 (AI Sovereignty Bridge)
|
||||
↓ Discovers architectural fragility
|
||||
Month 7-12: Module 10 (Red Team) + selected hardening
|
||||
```
|
||||
|
||||
### Path B: The Hybrid Infrastructure Organization
|
||||
|
||||
```
|
||||
Month 1-2: Module 6 (On-Premise AD Hardening)
|
||||
↓ Discovers recovery and identity gaps
|
||||
Month 2-3: Module 2 (Identity Security)
|
||||
↓ Discovers endpoint visibility gap
|
||||
Month 3-4: Module 1 (Endpoint Management)
|
||||
↓ Discovers AI and data gaps
|
||||
Month 5-8: Module 5 (AI Sovereignty) + Module 4 (Data Governance)
|
||||
Month 9-12: Module 7 (Recovery Validation) + Module 10 (Red Team)
|
||||
```
|
||||
|
||||
### Path C: The Critical Infrastructure Organization
|
||||
|
||||
```
|
||||
Month 1-2: Module 8 (OT Security Assessment)
|
||||
↓ Discovers IT/OT identity and recovery gaps
|
||||
Month 2-3: Module 6 (On-Premise AD) + Module 2 (Identity Security)
|
||||
Month 4-5: Module 7 (Recovery & Resilience)
|
||||
↓ Validates black start, DR procedures
|
||||
Month 6-9: Module 1 (Endpoint Management) + Module 3 (M365 Hardening)
|
||||
Month 10-12: Module 10 (Red Team with OT scope)
|
||||
```
|
||||
|
||||
### Path D: The "Not in Control" Organization
|
||||
|
||||
```
|
||||
Month 1-3: Module 11 (Embedded Quality & Process Assurance)
|
||||
↓ Discovers that tools are underutilized because processes are broken
|
||||
Month 3-5: Module 12 (Blue/Purple Team Foundation)
|
||||
↓ Builds operating rhythm for existing security stack
|
||||
Month 5-7: Module 2 (Identity Security) + Module 3 (M365 Hardening)
|
||||
↓ Technical fixes now stick because processes support them
|
||||
Month 8-12: Module 10 (Red Team) + continuous improvement retainer
|
||||
```
|
||||
|
||||
### Path E: The "Mythos / AI Vulnerability Panic" Organization
|
||||
|
||||
```
|
||||
Week 1-2: AI-assisted TVM Baseline Sprint
|
||||
↓ Discovers actual exploitable attack surface; beats adversary AI to first move
|
||||
Month 1-2: Module 1 (Endpoint Management) + Module 2 (Identity Security)
|
||||
↓ Closes the highest-risk doors while AI TVM operationalizes
|
||||
Month 2-3: Module 3 (M365 Security Hardening) + AI TVM operationalization
|
||||
↓ Automated remediation pipeline; <48h critical CVE response
|
||||
Month 3-6: Module 12 (Blue/Purple Team) + continuous AI TVM improvement
|
||||
↓ Purple team validates that open vulnerabilities are detected and contained
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Pricing and Engagement Structure
|
||||
|
||||
### Fixed-Scope Modules
|
||||
|
||||
Each module is sold with:
|
||||
|
||||
- **Fixed price** (or fixed daily rate with capped days)
|
||||
- **Fixed duration** (hard stop)
|
||||
- **Defined deliverables** (checklist)
|
||||
- **Go/no-go gate** before any expansion
|
||||
|
||||
**Example module statement of work**:
|
||||
|
||||
```
|
||||
Module: Endpoint Management Foundation
|
||||
Duration: 30 business days
|
||||
Investment: €[X]
|
||||
Deliverables:
|
||||
[ ] Device inventory: 100% of corporate devices identified
|
||||
[ ] Enrollment: 90%+ of corporate devices managed
|
||||
[ ] Compliance baseline: encryption, OS version, password policy deployed
|
||||
[ ] Application inventory: shadow IT report delivered
|
||||
[ ] Conditional access: compliant device required for M365
|
||||
[ ] Training: client admin team operational
|
||||
[ ] Handover: runbooks and monitoring dashboard
|
||||
|
||||
Go/No-Go Gate: Day 30 steering committee
|
||||
→ If value demonstrated: propose Module 2 (Identity Security)
|
||||
→ If value not demonstrated: engagement concludes with findings report
|
||||
```
|
||||
|
||||
### Module Bundles (Optional)
|
||||
|
||||
For clients ready to commit to a multi-module journey, offer **discounted bundles**:
|
||||
|
||||
| Bundle | Modules | Discount | Typical Timeline |
|
||||
|--------|---------|----------|-----------------|
|
||||
| **M365 Foundation** | 1 + 2 + 3 | 10% | 90-120 days |
|
||||
| **M365 Secure** | 1 + 2 + 3 + 4 + 5 | 15% | 180 days |
|
||||
| **Hybrid Hardening** | 1 + 2 + 3 + 6 + 7 | 15% | 180 days |
|
||||
| **Critical Infrastructure** | 1 + 2 + 6 + 7 + 8 + 10 | 20% | 270 days |
|
||||
| **Capability Building** | 11 + 12 + 2 + 3 | 15% | 180 days |
|
||||
| **MSSP Optimization** | Retained Capability Audit + 12 + 10 | 15% | 120-180 days |
|
||||
| **AI TVM Sprint** | AI-assisted TVM + 1 + 2 + 3 | 15% | 90-120 days |
|
||||
|
||||
**The rule**: Bundles are discounted but still phase-gated. Each module has its own go/no-go. The client can pause or stop after any module.
|
||||
|
||||
---
|
||||
|
||||
## Sales Enablement
|
||||
|
||||
### The Modular Pitch
|
||||
|
||||
> *"We do not sell one-size-fits-all transformation programs. We sell specific, bounded modules that solve specific problems. You can start with any module—whichever pain is keeping you awake at night. Each module delivers measurable value in 30-60 days. If you like the results, we add the next module. If you do not, we stop. No long-term commitment. No sunk cost. Just building blocks that make your organization stronger."*
|
||||
|
||||
### The Discovery Question Sequence
|
||||
|
||||
1. *"What is the shortest path to a business-ending incident here?"* (Identifies kill chain)
|
||||
2. *"Which of your security investments are you least sure about?"* (Identifies untapped tooling)
|
||||
3. *"If you could fix one thing in the next 60 days, what would it be?"* (Identifies module selection)
|
||||
4. *"What have you tried before that did not work?"* (Avoids repeating failures)
|
||||
5. *"What would make you confident enough to expand to the next phase?"* (Defines go/no-go criteria)
|
||||
|
||||
---
|
||||
|
||||
## Integration With Existing Frameworks
|
||||
|
||||
| Document | Integration |
|
||||
|----------|-------------|
|
||||
| [Rapid Modernisation Plan](../playbooks/rapid-modernisation-plan.md) | Each module maps to one or more rapid modernisation phases |
|
||||
| [Business Case Template](../playbooks/business-case-template.md) | Modular pricing structure; per-module ROI |
|
||||
| [C-Suite Conversation Guide](c-suite-conversation-guide.md) | Modular pitching scripts and objection handling |
|
||||
| [M365 Antifragile Project](../playbooks/m365-antifragile-project.md) | Modules 1-5 map directly to M365 project workstreams |
|
||||
| [Antifragile Risk Register](../assessment-templates/antifragile-risk-register.md) | Each module closes a defined risk category |
|
||||
|
||||
---
|
||||
|
||||
*For the full 180-day rapid modernisation plan, see [Rapid Modernisation Plan](../playbooks/rapid-modernisation-plan.md).*
|
||||
*For module-specific tactical guidance, see the linked playbooks in each module description.*
|
||||
148
antifragile-consulting/core/move-fast-and-fix-things.md
Normal file
148
antifragile-consulting/core/move-fast-and-fix-things.md
Normal file
@@ -0,0 +1,148 @@
|
||||
# Move Fast and Fix Things
|
||||
|
||||
> *"The best time to plant a tree was 20 years ago. The second best time is now. The worst time is after the storm has already knocked it down."*
|
||||
|
||||
This document anchors the antifragile consulting practice in a single, actionable posture: **move fast and fix things**. It is not a contradiction of Taleb's philosophy—it is its operational expression. Antifragility is not achieved by standing still and theorizing. It is earned by rapid iteration, honest repair, and the refusal to let perfect be the enemy of resilient.
|
||||
|
||||
---
|
||||
|
||||
## The Philosophy
|
||||
|
||||
### Speed Is a Security Control
|
||||
|
||||
The organizations that survive are not the ones with the most comprehensive plans. They are the ones that **execute fastest** against the gaps that actually matter. A 90% solution deployed today outperforms a 100% solution that ships in six months—because the attacker does not wait for your roadmap.
|
||||
|
||||
### Fixing Things Is Strategic
|
||||
|
||||
Every unfixed vulnerability, orphaned account, and untested backup is a **compounding liability**. Technical debt in security does not accrue interest linearly. It accrues catastrophically. The longer a gap exists, the more likely it becomes the entry point for an existential incident.
|
||||
|
||||
Fixing things is not maintenance. It is **risk reduction at velocity**.
|
||||
|
||||
### Work Beats Purchases
|
||||
|
||||
Most organizations do not have a tools problem. They have a **utilization problem**. They own EDR but have 40% coverage. They own a SIEM but log only 20% of critical systems. They own a PAM solution but have not onboarded privileged accounts. They own backup software but have never tested a restore.
|
||||
|
||||
The antifragile consultant's first duty is not to recommend new spending. It is to **extract the value already paid for**.
|
||||
|
||||
---
|
||||
|
||||
## The Three Rules
|
||||
|
||||
### Rule 1: Start With What You Own
|
||||
|
||||
Before any new purchase is discussed, exhaust the capabilities of existing tooling. This is not cheapness. It is **optionality preservation**: every dollar not spent on redundant tooling is a dollar available for structural improvement.
|
||||
|
||||
| Common Underutilized Asset | What Most Organizations Do | What We Do |
|
||||
|---------------------------|---------------------------|------------|
|
||||
| Microsoft E5 / Defender suite | Buy additional EDR, SIEM, CASB | Maximize Defender for Endpoint, Sentinel, Entra ID PIM, Purview |
|
||||
| Existing firewall / IDS | Buy another "next-gen" platform | Audit rules, enable logging, integrate with SOC workflow |
|
||||
| Active Directory | Add third-party IAM | Cleanse accounts, implement PAWs, enforce conditional access |
|
||||
| Backup solution | Buy additional DRaaS | Test restores, document runbooks, automate verification |
|
||||
| CMDB / ITAM tool | Start a new discovery project | Populate with T0 assets, enforce ownership, feed security workflow |
|
||||
|
||||
### Rule 2: Fix the Kill Chain First
|
||||
|
||||
Not all debt is equal. We identify the shortest sequence of failures that would end the organization—the **kill chain**—and we fix those nodes with extreme prejudice. Everything else waits.
|
||||
|
||||
This requires brutal honesty:
|
||||
|
||||
- If your domain admins are logging in from workstations with email and browsing, that is the kill chain.
|
||||
- If your backups have never been restored, that is the kill chain.
|
||||
- If your cloud storage bucket is public and contains customer data, that is the kill chain.
|
||||
- If your CEO's email has no MFA, that is the kill chain.
|
||||
|
||||
We do not fix everything. We fix the **existential** things. Fast.
|
||||
|
||||
### Rule 3: Every Fix Must Produce a Signal
|
||||
|
||||
A fix that does not generate intelligence is a fix that will rot. Every remediation must produce a **signal**: a metric, an alert, a log entry, or a structural change that prevents recurrence.
|
||||
|
||||
| Bad Fix | Good Fix |
|
||||
|---------|----------|
|
||||
| "We disabled the old account." | "We disabled the old account and implemented automated orphan detection." |
|
||||
| "We patched the server." | "We patched the server and added it to automated vulnerability management." |
|
||||
| "We rotated the password." | "We rotated the password and vaulted it in the PAM with checkout logging." |
|
||||
| "We fixed the firewall rule." | "We fixed the firewall rule and added a monthly rule review to the change process." |
|
||||
|
||||
---
|
||||
|
||||
## Mapping to Antifragile Pillars
|
||||
|
||||
| Antifragile Pillar | Move Fast and Fix Things Expression |
|
||||
|-------------------|-------------------------------------|
|
||||
| **Structural Decoupling** | Identify and eliminate hidden dependencies before they become fatal. Do not add new platforms to solve problems that abstraction can solve. |
|
||||
| **Optionality Preservation** | Maximize existing investments to preserve budget for strategic optionality. Every unnecessary purchase reduces your ability to pivot. |
|
||||
| **Stress-to-Signal Conversion** | Every fix must generate telemetry. Incidents are not failures; they are unpaid penetration tests. Convert their lessons into structure. |
|
||||
| **Sovereign Intelligence** | Use what you own first. Local AI on existing hardware beats cloud AI on a credit card. Your data should improve your models, not someone else's. |
|
||||
| **Asymmetric Payoff Design** | Small, fast fixes on the kill chain yield disproportionate risk reduction. Do not distribute effort evenly; concentrate it where failure is existential. |
|
||||
|
||||
---
|
||||
|
||||
## Mapping to Standards
|
||||
|
||||
We do not treat compliance as the goal. We treat it as a **side effect of doing the right things fast**.
|
||||
|
||||
| Standard | How We Map |
|
||||
|----------|-----------|
|
||||
| **CIS Controls v8** | IG1 is the floor, not the ceiling. We aim for IG1 completeness in 90 days because it is the minimum viable security posture. See [CIS Controls Mapping](../reference/cis-controls-mapping.md). |
|
||||
| **NIST CSF 2.0** | We align to Identify, Protect, Detect, Respond, Recover—but we emphasize GOVERN as the missing piece in most organizations. See [NIST CSF Mapping](../reference/nist-csf-mapping.md). |
|
||||
| **ISO 27001** | Annex A controls are addressed through the kill chain-first methodology, not checklist compliance. |
|
||||
| **DORA / NIS2** | Operational resilience and ICT risk management are natural outcomes of the antifragile rapid-modernisation approach. |
|
||||
|
||||
---
|
||||
|
||||
## The Consultant's Stance
|
||||
|
||||
When you walk into a client environment, bring these assumptions:
|
||||
|
||||
1. **They already own enough software.** Your job is to configure, integrate, and operationalize—not to shop.
|
||||
2. **Their technical debt is worse than they admit.** Your job is to find the kill chain and fix it without shaming.
|
||||
3. **Speed builds trust.** A visible fix in week one is worth more than a perfect report in week twelve.
|
||||
4. **Honesty is the product.** You are not a reseller. You are an independent advisor. Say what you would do with your own company's data.
|
||||
|
||||
### The Opening Pitch
|
||||
|
||||
> *"Most consultants will sell you a shopping list. We start with what you already bought. Our job is to find the gaps that matter, fix them fast, and make sure they stay fixed. We move fast. We fix things. And we do it with the tools you already own."*
|
||||
|
||||
---
|
||||
|
||||
## Engagement Principles
|
||||
|
||||
### Week 1: Brutal Honesty Audit
|
||||
|
||||
- Inventory existing tooling and its utilization rate
|
||||
- Identify the kill chain
|
||||
- Pick three fixes that can be completed before the next steering committee
|
||||
- Execute them
|
||||
|
||||
### Month 1: Momentum Through Visibility
|
||||
|
||||
- Show the client what they could not see before
|
||||
- Close the highest-risk gaps
|
||||
- Demonstrate value from existing tools
|
||||
- Build political capital for harder changes
|
||||
|
||||
### Quarter 1: Structural Change
|
||||
|
||||
- Convert fixes into process
|
||||
- Automate detection and response
|
||||
- Establish the antifragile feedback loop: incident → learning → structure
|
||||
|
||||
---
|
||||
|
||||
## Contrast With "Move Fast and Break Things"
|
||||
|
||||
The Silicon Valley mantra was an excuse for externalizing harm. "Move fast and fix things" is its responsible successor:
|
||||
|
||||
| Move Fast and Break Things | Move Fast and Fix Things |
|
||||
|---------------------------|--------------------------|
|
||||
| Ship now, fix later | Fix now, ship sustainably |
|
||||
| Externalize risk to users | Internalize risk and reduce it |
|
||||
| Growth at all costs | Resilience as the foundation of growth |
|
||||
| Ignore technical debt | Pay down the highest-interest debt first |
|
||||
| Disrupt without accountability | Build trust through visible repair |
|
||||
|
||||
---
|
||||
|
||||
*Next: [CIS Controls Mapping](../reference/cis-controls-mapping.md)*
|
||||
*Previous: [Antifragile Manifest](antifragile-manifest.md)*
|
||||
278
antifragile-consulting/core/organizational-resilience.md
Normal file
278
antifragile-consulting/core/organizational-resilience.md
Normal file
@@ -0,0 +1,278 @@
|
||||
# Organizational Resilience: Breaking the Dev / Sec / Ops Silos
|
||||
|
||||
> *"You do not have a tools problem. You have a handoff problem. Every boundary between departments is a boundary where accountability dies."*
|
||||
|
||||
This document provides the strategic arguments, talking points, and implementation roadmap for organizational structures that produce resilient systems. It addresses two related transformations:
|
||||
|
||||
1. **Shift Left**: Moving security, reliability, and operational concerns earlier in the development lifecycle
|
||||
2. **Merge Dev / Sec / Ops**: Eliminating the structural boundaries that create blame, delay, and fragility
|
||||
|
||||
It is designed for consultants who must persuade executives that **organizational design is a security control**—and that siloed departments are a latent single point of failure.
|
||||
|
||||
---
|
||||
|
||||
## The Executive Summary
|
||||
|
||||
Your clients likely have three departments that do not talk to each other:
|
||||
|
||||
- **Development** builds features and ships code
|
||||
- **Security** reviews code after it is built and blocks releases
|
||||
- **Operations** runs the systems and is blamed when they fail
|
||||
|
||||
The result is predictable: slow releases, adversarial relationships, security findings that are too late to fix economically, and operational failures that no one owns.
|
||||
|
||||
The antifragile alternative is not a new tool. It is a **new structure**: shared accountability, integrated workflows, and teams that own their systems from commit to retirement.
|
||||
|
||||
**The business case**:
|
||||
- **Speed**: Releases move from quarterly to weekly—or daily—because there are no handoff queues
|
||||
- **Cost**: Security findings fixed in development cost 1/100th of what they cost in production
|
||||
- **Resilience**: Teams that own operations design systems that do not fail; teams that only build features design systems that look good on demo day
|
||||
- **Talent**: Engineers want to work in high-trust, high-ownership environments
|
||||
|
||||
---
|
||||
|
||||
## Part 1: Shift Left — The Argument
|
||||
|
||||
### What "Shift Left" Actually Means
|
||||
|
||||
"Shift left" means moving quality, security, and operational concerns **earlier in the lifecycle**—from production to pre-production, from pre-production to build, from build to design, from design to requirements.
|
||||
|
||||
| Stage | Traditional Timing | Shift-Left Timing | Cost to Fix |
|
||||
|-------|-------------------|-------------------|-------------|
|
||||
| Requirements | Never | During specification | 1x |
|
||||
| Design | Never | During architecture review | 5x |
|
||||
| Development | Post-build (security scan) | During coding (IDE integration) | 10x |
|
||||
| Build / CI | Post-commit | Pre-commit hooks, automated gates | 15x |
|
||||
| Test | Pre-release | Continuous automated testing | 25x |
|
||||
| Production | Post-incident | Continuous monitoring, chaos engineering | 100x+ |
|
||||
|
||||
### The Executive Framing
|
||||
|
||||
> *"Every security finding discovered in production is a finding that should have been caught in development—at one percent of the cost. Shift left is not a security initiative. It is a cost-reduction initiative with security as the primary beneficiary."*
|
||||
|
||||
### Why Most "Shift Left" Programs Fail
|
||||
|
||||
| Failure Mode | Root Cause | Antifragile Fix |
|
||||
|-------------|-----------|----------------|
|
||||
| Security scans produce thousands of findings | Scans run too late; debt accumulates | Run lightweight scans in IDE; gate commits on critical severity |
|
||||
| Developers ignore security alerts | Security is not measured in their objectives | Shared OKR: team owns vulnerability count, not just security team |
|
||||
| Security team becomes the "department of no" | Security is a gate, not a service | Embed security engineers in development teams as consultants |
|
||||
| Operational issues discovered after release | Operations is not involved in design | Require operational readiness review before release |
|
||||
|
||||
---
|
||||
|
||||
## Part 2: Merging Dev / Sec / Ops — The Argument
|
||||
|
||||
### The Case for Integration
|
||||
|
||||
Separate departments create **perverse incentives**:
|
||||
|
||||
| Department | Incentive | Resulting Fragility |
|
||||
|-----------|-----------|---------------------|
|
||||
| Development | Ship features fast | Security and reliability deferred |
|
||||
| Security | Prevent breaches | Block releases, slow innovation, become adversarial |
|
||||
| Operations | Keep systems stable | Resist change, accumulate undocumented workarounds |
|
||||
|
||||
When these departments merge into **platform teams** or **product-aligned teams** with end-to-end ownership, incentives align:
|
||||
|
||||
| Integrated Team | Incentive | Resulting Resilience |
|
||||
|----------------|-----------|---------------------|
|
||||
| Platform team | Reliable, secure, fast infrastructure | Builds guardrails, not gates |
|
||||
| Product team | Working software in production | Owns security, performance, and operability |
|
||||
| SRE team | System reliability via engineering | Automates toil, designs for failure |
|
||||
|
||||
### The Executive Framing
|
||||
|
||||
> *"You currently have three departments optimizing for three different outcomes. Development ships fast. Security says no. Operations keeps the lights on. The result is that nobody optimizes for the only outcome that matters: working, secure, reliable software in production. Merging them does not eliminate specialization. It aligns specialization toward a shared goal."*
|
||||
|
||||
### The Three Models (Progressive Integration)
|
||||
|
||||
We do not demand full merger on day one. We propose a **progressive path**:
|
||||
|
||||
#### Model 1: Shift Left with Embedded Security (Months 1-6)
|
||||
|
||||
- Security engineers embed in development teams 2-3 days per week
|
||||
- Security tooling integrated into IDE and CI/CD pipeline
|
||||
- Shared vulnerability metrics: team owns count, not security department
|
||||
- Operational readiness checklist required before release
|
||||
|
||||
**What changes**: Process and proximity. No headcount reorganization.
|
||||
|
||||
#### Model 2: Platform Teams with SRE (Months 6-12)
|
||||
|
||||
- Create platform teams that own infrastructure, tooling, and developer experience
|
||||
- SREs embed in product teams or form dedicated reliability teams
|
||||
- Security becomes a **platform capability**: secure defaults, automated scanning, policy-as-code
|
||||
- Operations becomes a **platform capability**: observability, incident management, runbook automation
|
||||
|
||||
**What changes**: Structural realignment of infrastructure and tooling teams.
|
||||
|
||||
#### Model 3: Product-Aligned Teams with Full Ownership (Months 12-24)
|
||||
|
||||
- Product teams own their entire stack: code, security, operations, on-call
|
||||
- Platform teams provide paved roads, not mandatory highways
|
||||
- Security team becomes a **centre of excellence**: threat intelligence, advanced hunting, policy governance
|
||||
- Operations becomes a **centre of excellence**: architecture review, chaos engineering, capacity planning
|
||||
|
||||
**What changes**: Full organizational transformation. Teams own outcomes, not functions.
|
||||
|
||||
---
|
||||
|
||||
## Talking Points for Executives
|
||||
|
||||
### For the CEO
|
||||
|
||||
> *"Your competitors are releasing features weekly while your teams debate whether a security scan finding should block a quarterly release. The organizations that win are not the ones with the best security department. They are the ones where security is so integrated that it does not slow anyone down."*
|
||||
|
||||
**Key points**:
|
||||
- Speed and security are not trade-offs. They are complements when the structure is right.
|
||||
- Talent retention: the best engineers will not work in slow, adversarial environments.
|
||||
- Competitive velocity: every month spent in release queue is a month competitors gain.
|
||||
|
||||
### For the CFO
|
||||
|
||||
> *"A vulnerability found in development costs approximately €500 to fix. The same vulnerability found in production costs €50,000—plus incident response, customer notification, potential regulatory fines, and reputational damage. Shift left is the highest-return cost reduction available in your technology budget."*
|
||||
|
||||
**Key points**:
|
||||
- Quantify current rework: What % of development capacity is spent on post-release fixes?
|
||||
- Quantify delay cost: What is the revenue impact of a delayed release?
|
||||
- Quantify incident cost: What was the last production security finding's total cost?
|
||||
|
||||
### For the CTO / Engineering Lead
|
||||
|
||||
> *"Your development teams want to build great software. Your security team wants to protect the company. Your ops team wants stability. None of them are wrong. But the organizational boundary between them creates friction that destroys all three goals. We are not asking you to hire different people. We are asking you to let them sit together and share a target."*
|
||||
|
||||
**Key points**:
|
||||
- Shared ownership reduces blame and accelerates learning.
|
||||
- Platform teams reduce cognitive load: developers focus on features, platform teams handle infrastructure.
|
||||
- SRE practices (error budgets, SLOs) align reliability and velocity mathematically.
|
||||
|
||||
### For the CISO
|
||||
|
||||
> *"You cannot scale security by adding reviewers. You scale security by making the secure path the easy path. A merged structure does not reduce your authority. It increases your leverage—by embedding security into the workflow rather than standing at the gate."*
|
||||
|
||||
**Key points**:
|
||||
- Security team becomes strategic: threat hunting, intelligence, architecture governance
|
||||
- Embedded security engineers become force multipliers, not bottlenecks
|
||||
- Metrics shift from "findings blocked" to "vulnerabilities prevented"
|
||||
|
||||
### For the Head of Operations
|
||||
|
||||
> *"Operations is not a cost centre. It is the place where software meets reality. When operations is separate from development, developers ship software they do not understand, and operations maintains systems they did not design. The result is burnout, outages, and undocumented fixes. Integrated teams own the full lifecycle. That ownership produces better design and fewer surprises."*
|
||||
|
||||
**Key points**:
|
||||
- SRE principles reduce toil through automation
|
||||
- Teams that own on-call design systems that fail gracefully
|
||||
- Operational expertise upstream prevents downstream emergencies
|
||||
|
||||
---
|
||||
|
||||
## Objection Handling
|
||||
|
||||
| Objection | Response | Follow-Up |
|
||||
|-----------|----------|-----------|
|
||||
| "Our departments are too big to merge." | "We are not proposing a reorganization on day one. We are proposing embedded collaboration and shared metrics as the first step. Structure follows behaviour." | "Let us pilot with one product team and measure velocity and defect rates before and after." |
|
||||
| "Security will lose independence." | "Independence does not require separation. Auditors can review integrated teams. The security function retains policy authority while embedding execution." | "The security team sets the guardrails. The product team drives within them. That is independence with collaboration." |
|
||||
| "Developers do not want to do security." | "Developers do not want to do security theater. They want to ship working software. When security is automated, contextual, and fast, developers embrace it. When security is a quarterly scan with 500 false positives, they ignore it." | "Let us show them an IDE plugin that finds vulnerabilities as they type, with suggested fixes. That changes the conversation." |
|
||||
| "Operations will resist losing control." | "Operations is not losing control. It is gaining influence earlier in the lifecycle. The operational readiness review becomes a design input, not a release gate." | "Your ops engineers have invaluable production knowledge. We want that knowledge in the architecture review, not just the war room." |
|
||||
| "We tried DevOps before and it failed." | "Most 'DevOps' failures are actually 'DevOps theater': renaming teams without changing incentives or accountability. We measure outcomes—release frequency, change failure rate, mean time to recovery—not labels." | "What failed last time? Tools? Training? Executive support? We design specifically to avoid those failure modes." |
|
||||
| "Regulators require segregation of duties." | "Segregation of duties does not require segregation of departments. It requires that no single person can approve and execute a critical change without review. Integrated teams can maintain segregation through workflow and tooling." | "Banking regulators increasingly accept policy-as-code and automated approval chains as valid segregation controls." |
|
||||
| "This would require massive retraining." | "The first phase requires no retraining. It requires proximity: security engineers sitting with developers, ops engineers joining design reviews. Training follows need, not mandate." | "We will identify skill gaps in the pilot and target training precisely." |
|
||||
|
||||
---
|
||||
|
||||
## The 90-Day Organizational Pilot
|
||||
|
||||
We do not propose a full merger in 90 days. We propose a **pilot that proves the concept**.
|
||||
|
||||
### Week 1-2: Select the Pilot Team
|
||||
|
||||
- Criteria:
|
||||
- High release frequency (or high desire for it)
|
||||
- Moderate security exposure (not the most critical system, not the least)
|
||||
- Willing engineering manager
|
||||
- Existing CI/CD pipeline
|
||||
|
||||
### Week 3-4: Embed and Integrate
|
||||
|
||||
- Security engineer: 2-3 days per week with the team
|
||||
- SRE / ops representative: joins sprint planning and retrospectives
|
||||
- Shared Slack/Teams channel: no more ticket-based handoffs for routine questions
|
||||
- Joint OKR: team owns vulnerability count, change failure rate, and mean time to recovery
|
||||
|
||||
### Week 5-8: Tooling and Automation
|
||||
|
||||
- Security scanning in IDE and CI pipeline
|
||||
- Operational readiness checklist (automated where possible)
|
||||
- Runbook for common operational tasks owned by the team
|
||||
- Error budget defined: reliability target that allows velocity
|
||||
|
||||
### Week 9-12: Measure and Report
|
||||
|
||||
| Metric | Before | After | Target |
|
||||
|--------|--------|-------|--------|
|
||||
| Release frequency | X/quarter | Y/week | 1+ per week |
|
||||
| Lead time for changes | X days | Y days | < 3 days |
|
||||
| Change failure rate | X% | Y% | < 15% |
|
||||
| Mean time to recovery | X hours | Y hours | < 1 hour |
|
||||
| Critical vulnerabilities in production | X | Y | 0 |
|
||||
| Security review cycle time | X days | Y days | < 1 day |
|
||||
|
||||
### Week 12: Steering Committee Presentation
|
||||
|
||||
- Show metrics
|
||||
- Team testimonials
|
||||
- Recommendation: expand to N teams, or adjust and retry
|
||||
|
||||
---
|
||||
|
||||
## Regulatory Alignment
|
||||
|
||||
### DORA and ICT Risk Management
|
||||
|
||||
DORA Article 6 (ICT risk management framework) implicitly requires:
|
||||
|
||||
- Integrated risk assessment across development, operations, and security
|
||||
- Continuous monitoring that spans the full lifecycle
|
||||
- Incident learning that produces structural improvements
|
||||
|
||||
A siloed organization struggles to demonstrate this integration. A merged structure produces the evidence naturally.
|
||||
|
||||
### Banking: Segregation of Duties
|
||||
|
||||
Banking regulators require segregation between:
|
||||
- Development and production access
|
||||
- Security policy and security operations
|
||||
- Change approval and change execution
|
||||
|
||||
**These can be maintained in integrated teams through**:
|
||||
- Policy-as-code (security rules encoded in pipeline)
|
||||
- Automated approval workflows (no single person can deploy critical changes)
|
||||
- Independent audit function (separate from operational teams)
|
||||
- Immutable logging (all actions recorded, tamper-evident)
|
||||
|
||||
### Critical Infrastructure: Safety and Security
|
||||
|
||||
In power and telco, safety systems must be protected from IT changes. This does not require organizational separation. It requires:
|
||||
|
||||
- **Technical separation**: Air gaps, unidirectional gateways, safety-certified systems
|
||||
- **Change control**: Independent safety review for changes touching safety-critical functions
|
||||
- **Operational discipline**: Procedures that are followed regardless of organizational structure
|
||||
|
||||
---
|
||||
|
||||
## Integration With the Rapid Modernisation Plan
|
||||
|
||||
Organizational resilience runs parallel to technical hardening:
|
||||
|
||||
| Rapid Modernisation Phase | Organizational Parallel |
|
||||
|--------------------------|------------------------|
|
||||
| Hygiene (Days 0-30) | Map current Dev/Sec/Ops handoffs; identify highest-friction boundary |
|
||||
| Control (Days 30-60) | Embed security in pilot team; automate first security gate in CI/CD |
|
||||
| Sovereignty (Days 60-90) | Pilot team owns full lifecycle; measure release frequency and recovery time |
|
||||
| Antifragility (Days 90-180) | Expand to additional teams; platform team provides paved roads; centre of excellence formed |
|
||||
|
||||
---
|
||||
|
||||
*For the C-suite conversation guide, see [C-Suite Conversation Guide](c-suite-conversation-guide.md).*
|
||||
*For the business case including organizational ROI, see [Business Case Template](../playbooks/business-case-template.md).*
|
||||
259
antifragile-consulting/core/quality-management-engagement.md
Normal file
259
antifragile-consulting/core/quality-management-engagement.md
Normal file
@@ -0,0 +1,259 @@
|
||||
# Embedded Quality & Process Assurance
|
||||
|
||||
> *"You do not need another audit. You need someone to sit with your team, watch them work, and help them fix the friction that slows them down and creates vulnerabilities."*
|
||||
|
||||
This document defines an engagement model for clients who feel they are **not truly in control** of their projects, teams, or operations. It is not an audit. It is not a penetration test. It is **embedded process assurance**: an experienced advisor joins the team, observes the reality of daily work, identifies the gaps between intent and execution, and co-creates improvements that stick.
|
||||
|
||||
It is designed for Heads of Security and Heads of Operations who have tools, policies, and headcount—but still feel that something is slipping through the cracks.
|
||||
|
||||
---
|
||||
|
||||
## The "Not in Control" Posture
|
||||
|
||||
### What They Actually Mean
|
||||
|
||||
When a Head of Security or Head of Operations says *"we don't believe we are truly in control of what we have / what we are doing,"* they are usually describing one or more of these conditions:
|
||||
|
||||
| Symptom | What Is Actually Happening |
|
||||
|---------|---------------------------|
|
||||
| "We have policies but nobody follows them" | Process-theater: documents exist, behaviour is unchanged |
|
||||
| "We bought tools but they are not configured" | Shelfware: purchased capability, never operationalized |
|
||||
| "I find out about changes after they happen" | Visibility gap: no governance gates, no change notification |
|
||||
| "The same incident keeps happening" | Learning failure: post-mortems are written, nothing structural changes |
|
||||
| "My team is busy but I cannot tell you what they achieved" | Activity without outcomes: metrics measure effort, not risk reduction |
|
||||
| "We have a project plan but it does not match reality" | Planning fantasy: Gantt charts assume perfect conditions; reality is messier |
|
||||
| "I do not trust our own documentation" | Drift: systems were documented once; they have changed dozens of times since |
|
||||
|
||||
**The insight**: These leaders do not need more tools. They need **someone to help them see what is actually happening** and **someone to help them fix it in the context of real work**.
|
||||
|
||||
---
|
||||
|
||||
## What This Is Not
|
||||
|
||||
| Traditional Approach | Embedded Quality Assurance |
|
||||
|---------------------|---------------------------|
|
||||
| **Audit** (arrives, checks boxes, leaves a report) | **Presence** (stays, observes work, fixes friction in real time) |
|
||||
| **External assessment** (interviews, surveys, sampling) | **Embedded observation** (attends standups, watches deployments, reads actual tickets) |
|
||||
| **Recommendations** (list of things to do, no help doing them) | **Co-implementation** (suggests improvement, helps implement it, validates it works) |
|
||||
| **Quarterly review** (one meeting, static snapshot) | **Continuous calibration** (weekly check-ins, daily Slack/Teams presence, adaptive focus) |
|
||||
| **Generalist consultant** (knows frameworks, not your stack) | **Practitioner-advisor** (knows M365, Azure, Defender, Intune, and how teams actually use them) |
|
||||
|
||||
---
|
||||
|
||||
## The Engagement Model
|
||||
|
||||
### Phase 1: Immersion (Week 1-2)
|
||||
|
||||
**Objective**: Understand the reality of how work happens—not how it is documented.
|
||||
|
||||
**Activities**:
|
||||
- Attend team standups, sprint planning, retrospectives (for agile teams)
|
||||
- Attend change advisory board, incident review, capacity planning (for operations teams)
|
||||
- Shadow key personnel: senior engineer, security analyst, ops lead, project manager
|
||||
- Review actual work artifacts: recent tickets, pull requests, incident post-mortems, change records
|
||||
- Observe tool usage: how they actually use Intune, Sentinel, Defender, Azure AD—not how the manual says they should
|
||||
- Map the **formal process** (documented) against the **informal process** (actual)
|
||||
|
||||
**Deliverable**: Immersion Report
|
||||
- Formal vs. actual process map
|
||||
- Top 5 friction points (not failures—friction)
|
||||
- Top 3 "invisible risks" (things that are not tracked but should be)
|
||||
- Team sentiment: what do they believe is broken that leadership does not see?
|
||||
|
||||
**The conversation at Week 2**:
|
||||
|
||||
> *"Your policy says all changes require CAB approval. In reality, 60% of Azure policy changes happen via direct portal access by two senior engineers who document them after the fact. That is not non-compliance. That is a signal that your CAB process is too slow for operational reality. We fix the process, not the people."*
|
||||
|
||||
---
|
||||
|
||||
### Phase 2: Friction Reduction (Week 3-6)
|
||||
|
||||
**Objective**: Fix the highest-friction gaps that create both inefficiency and vulnerability.
|
||||
|
||||
**Activities**:
|
||||
- Implement **fast wins** that reduce daily pain:
|
||||
- Automate a manual provisioning step
|
||||
- Create a runbook for a recurring but undocumented task
|
||||
- Simplify a approval workflow that takes 3 days and 4 people
|
||||
- Standardize a configuration that is currently done differently on every deployment
|
||||
- Introduce **guardrails, not gates**:
|
||||
- Replace pre-deployment security review with automated scanning in CI/CD
|
||||
- Replace quarterly access review with monthly automated report + exception tracking
|
||||
- Replace post-incident blame with blameless post-mortem with structural mandate
|
||||
- Build **visibility where there is blindness**:
|
||||
- Dashboard showing actual vs. planned changes
|
||||
- Alert when configuration drifts from baseline
|
||||
- Weekly "what changed" report for leadership
|
||||
|
||||
**Deliverable**: Friction Reduction Report
|
||||
- Before/after metrics: time saved, errors reduced, visibility gained
|
||||
- Implemented improvements with ownership and maintenance plan
|
||||
- Remaining friction points for next phase
|
||||
|
||||
---
|
||||
|
||||
### Phase 3: Capability Building (Week 7-10)
|
||||
|
||||
**Objective**: Ensure the team can sustain and extend improvements without permanent consultant dependency.
|
||||
|
||||
**Activities**:
|
||||
- **Knowledge transfer sessions**: Teach the team why each improvement was made, not just how it works
|
||||
- **Documentation-as-code**: Move runbooks and procedures into version-controlled, executable formats where possible
|
||||
- **Metrics definition**: Help the team define their own success metrics (not consultant-imposed ones)
|
||||
- **Self-assessment tools**: Give the team checklists and templates to continue the work
|
||||
- **Mentoring**: Pair junior team members with consultant for specific skills (KQL query writing, Intune policy authoring, incident response triage)
|
||||
|
||||
**Deliverable**: Capability Handover Package
|
||||
- Team-owned process documentation
|
||||
- Self-assessment checklist
|
||||
- Metrics dashboard maintained by the team
|
||||
- 90-day improvement roadmap drafted by the team (not the consultant)
|
||||
|
||||
---
|
||||
|
||||
### Phase 4: Validation (Week 11-12)
|
||||
|
||||
**Objective**: Prove that the team is now in control—and that the consultant can leave.
|
||||
|
||||
**Activities**:
|
||||
- Consultant steps back to advisory-only presence
|
||||
- Team runs a week independently; consultant observes from distance
|
||||
- Validation exercise: team handles a simulated incident, change, or deployment without consultant help
|
||||
- Retrospective: what worked, what still needs work, what the team will tackle next
|
||||
|
||||
**Deliverable**: Validation Report
|
||||
- Independent operation confirmation
|
||||
- Remaining gaps (honest assessment)
|
||||
- Recommended next module or engagement type
|
||||
|
||||
---
|
||||
|
||||
## Application Contexts
|
||||
|
||||
### Context 1: M365 Project Team
|
||||
|
||||
**Profile**: Client is deploying M365 (greenfield or migration); project is behind schedule; team is overwhelmed; quality is slipping.
|
||||
|
||||
**Embedded assurance activities**:
|
||||
- Observe provisioning workflow: are users created consistently? Are licenses assigned correctly? Are permissions documented?
|
||||
- Observe change control: is every tenant change tracked? Is there rollback capability?
|
||||
- Observe communication: does the project team know what the security team needs? Does security know what the project team is changing?
|
||||
- Implement: standard user provisioning template, automated license reconciliation, change log in shared channel
|
||||
|
||||
**The pitch**:
|
||||
|
||||
> *"Your M365 project is not failing because your team is incompetent. It is failing because the gap between what they know and what they are expected to deliver is too wide. I join the team for 12 weeks, help them close that gap, and leave them with processes they can sustain."*
|
||||
|
||||
### Context 2: Security Operations Team
|
||||
|
||||
**Profile**: SOC or security team has tools but no rhythm; alerts are ignored; incidents are reactive; burnout is high.
|
||||
|
||||
**Embedded assurance activities**:
|
||||
- Observe alert triage: which alerts are ignored? Why? (False positive? No runbook? No authority to act?)
|
||||
- Observe incident response: who is called? When? How is information shared? Where does the process stall?
|
||||
- Observe shift handoffs: what is lost between shifts?
|
||||
- Implement: alert tuning playbook, tier-1 triage runbook, automated enrichment, shift handoff template
|
||||
|
||||
**The pitch**:
|
||||
|
||||
> *"Your security team is drowning in noise. They do not need another SIEM. They need someone to help them turn that noise into signal, build repeatable processes, and regain the confidence that they are seeing what matters. I sit with them, watch their shifts, and help them build a rhythm."*
|
||||
|
||||
### Context 3: Infrastructure / Operations Team
|
||||
|
||||
**Profile**: Ops team maintains critical systems; changes are ad-hoc; documentation is stale; knowledge is concentrated in one or two people.
|
||||
|
||||
**Embedded assurance activities**:
|
||||
- Observe change execution: how is a firewall rule added? A DNS record changed? A certificate renewed?
|
||||
- Observe monitoring: what is watched? What is not? Who responds to alerts at 2 AM?
|
||||
- Observe documentation: is it accurate? Do people use it? When was it last updated?
|
||||
- Implement: change automation for high-frequency tasks, monitoring dashboard, living documentation process, cross-training plan
|
||||
|
||||
**The pitch**:
|
||||
|
||||
> *"Your ops team knows the systems better than anyone—but that knowledge lives in their heads. If one person leaves, the organization loses critical capability. I help them externalize that knowledge into repeatable, documented, automatable processes. The team becomes stronger, not more dependent."*
|
||||
|
||||
### Context 4: Development Team
|
||||
|
||||
**Profile**: Dev team ships code but security is a bottleneck; vulnerabilities found late; releases are stressful.
|
||||
|
||||
**Embedded assurance activities**:
|
||||
- Observe the "security moment": when does security enter the conversation? Day 1 or day 45?
|
||||
- Observe the deployment pipeline: what checks exist? Which are bypassed? Why?
|
||||
- Observe the feedback loop: when a vulnerability is found, how long until it is fixed? What prevents faster resolution?
|
||||
- Implement: security checks in IDE, automated SAST in CI/CD, vulnerability prioritization aligned with business impact, shared metrics
|
||||
|
||||
**The pitch**:
|
||||
|
||||
> *"Your developers want to ship secure code. Your security team wants to prevent breaches. Both are frustrated because they work in separate rooms with separate metrics. I embed with the dev team for 12 weeks, make security part of their daily workflow instead of a quarterly gate, and prove that speed and security are complements—not trade-offs."*
|
||||
|
||||
---
|
||||
|
||||
## Talking Points for the Head of Security / Head of Operations
|
||||
|
||||
**When they say**: *"We don't believe we are truly in control of what we have."*
|
||||
|
||||
**You respond**:
|
||||
|
||||
> *"That feeling is usually accurate—and it is not a tool problem. It is a visibility and process problem. You have capable people, but the gap between what is documented and what is actually happening has grown too wide. I do not audit you. I join your team, observe the reality, and help you close that gap. In 12 weeks, you will have repeatable processes, accurate documentation, and a team that trusts its own capability."*
|
||||
|
||||
**When they say**: *"We have tried consultants before and nothing changed."*
|
||||
|
||||
**You respond**:
|
||||
|
||||
> *"Most consultants deliver a report and leave. I deliver presence. I attend your standups, read your tickets, and help fix things while I am there. The difference is not the findings—it is the implementation. You will see changes in the first two weeks, not in a final deck."*
|
||||
|
||||
**When they say**: *"We don't have budget for a long engagement."*
|
||||
|
||||
**You respond**:
|
||||
|
||||
> *"This is 12 weeks, fixed scope. But the first deliverable—the immersion report—is available in Week 2. If you do not see value by then, we stop. Most clients see enough value in the first two weeks to justify the full engagement."*
|
||||
|
||||
**When they say**: *"My team will feel judged if someone is watching them."*
|
||||
|
||||
**You respond**:
|
||||
|
||||
> *"I am not there to evaluate individuals. I am there to evaluate the system: the processes, the tools, the handoffs, the invisible workarounds. Every team has workarounds—they exist because the formal process does not match reality. My job is to make the formal process match reality, not to shame anyone for adapting."*
|
||||
|
||||
---
|
||||
|
||||
## Metrics That Prove Control
|
||||
|
||||
| Before | After | What It Measures |
|
||||
|--------|-------|-----------------|
|
||||
| "We think our config is standard" | "We can show the drift from baseline in real time" | Visibility |
|
||||
| "Changes happen, we find out later" | "Every change is logged, notified, and rollback-ready" | Control |
|
||||
| "The same alert fires 50 times a day" | "We tuned the alert; it now fires 3 times, and each is actionable" | Signal quality |
|
||||
| "Incidents take 4 hours to escalate" | "Incidents auto-enrich and route in 15 minutes" | Response speed |
|
||||
| "Two people know how to do X" | "Anyone on the team can do X from the runbook" | Resilience |
|
||||
| "We have 20 open critical vulnerabilities" | "We have 3; the other 17 were false positives or already mitigated" | Accuracy |
|
||||
| "I do not know what the team did this week" | "I can see risk reduction, process improvement, and blockers" | Transparency |
|
||||
|
||||
---
|
||||
|
||||
## Integration With Modular Engagements
|
||||
|
||||
This module sits naturally between **technical hardening** and **organizational transformation**:
|
||||
|
||||
```
|
||||
Module 1 (Endpoint Management) or Module 3 (M365 Hardening)
|
||||
↓ Reveals process gaps the tools cannot fix
|
||||
Module 11 (Embedded Quality & Process Assurance)
|
||||
↓ Builds team capability to sustain improvements
|
||||
Module 9 (Organizational Resilience) or Module 12 (Blue/Purple Team Foundation)
|
||||
↓ Scales the capability across the organization
|
||||
```
|
||||
|
||||
It can also precede technical work:
|
||||
|
||||
```
|
||||
Module 11 (Embedded Quality & Process Assurance)
|
||||
↓ Discovers that tools are misconfigured because processes are broken
|
||||
Module 2 (Identity Security) or Module 3 (M365 Hardening)
|
||||
↓ Technical fixes now stick because processes support them
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
*For the modular engagement menu, see [Modular Engagements](modular-engagements.md).*
|
||||
*For organizational structure transformation, see [Organizational Resilience](organizational-resilience.md).*
|
||||
*For blue/purple team capability building, see [Blue/Purple Team Foundation](blue-purple-team-foundation.md).*
|
||||
263
antifragile-consulting/core/retained-capability.md
Normal file
263
antifragile-consulting/core/retained-capability.md
Normal file
@@ -0,0 +1,263 @@
|
||||
# Retained Capability: What to Keep In-House When You Outsource Security
|
||||
|
||||
> *"Outsourcing your SOC does not outsource your risk. It outsources your alert triage. The thinking—the detection engineering, the threat modeling, the business-context awareness—must stay inside your walls. Otherwise you are paying for someone else's generic playbook applied to your specific threat landscape."*
|
||||
|
||||
This document addresses one of the most common and expensive misconceptions in enterprise security: the belief that outsourcing a security function means outsourcing the expertise required to make that function effective. It is designed for clients who have engaged an MSSP (Managed Security Service Provider) or outsourced SOC, who feel the service underperforms, and who do not realize that the performance gap is largely within their own control.
|
||||
|
||||
---
|
||||
|
||||
## The MSSP Illusion
|
||||
|
||||
### What the Client Believes
|
||||
|
||||
> *"We pay a SOC provider €50,000 per month. They have 200 analysts and advanced tools. Our security is handled."*
|
||||
|
||||
### What Is Actually Happening
|
||||
|
||||
| Client Assumption | MSSP Reality |
|
||||
|------------------|--------------|
|
||||
| "They monitor our environment 24/7" | They monitor the alerts their generic rules generate. Rules tuned to their entire client base, not to your environment. |
|
||||
| "They have threat intelligence" | They consume commercial threat feeds. They do not have intelligence about *your* specific adversaries, your *industry's* TTPs, or your *proprietary* attack surface. |
|
||||
| "They investigate incidents" | They triage alerts based on severity. True investigation—understanding *why* an anomaly matters to *your* business—is rarely within scope. |
|
||||
| "They improve over time" | They improve their own margins by standardizing. Customization for your environment costs them money. |
|
||||
| "We can hold them accountable" | Your SLA measures ticket volume and response time, not detection quality, mean-time-to-contain, or adversary emulation success rate. |
|
||||
|
||||
**The hard truth**: Most MSSP underperformance is not the MSSP's fault. It is the client's fault for outsourcing the execution **and** the thinking.
|
||||
|
||||
---
|
||||
|
||||
## The Retained Capability Model
|
||||
|
||||
When you outsource a security function, you should retain three capabilities internally:
|
||||
|
||||
| Retained Capability | Why It Cannot Be Outsourced | What It Produces |
|
||||
|--------------------|---------------------------|------------------|
|
||||
| **Detection Engineering** | Only you know what "normal" looks like in your environment. Only you can write rules that detect anomalies specific to your architecture, your applications, and your user behaviours. | Custom detection rules (KQL, Sigma, YARA) that catch threats generic rules miss |
|
||||
| **Threat Context & Prioritization** | Only you know which assets are crown jewels. Only you can prioritize a vulnerability on your payment gateway over a vulnerability on your marketing blog. | Risk-ranked remediation that aligns with business impact |
|
||||
| **Integration & Orchestration** | Only you can connect the SOC to your change management, your identity team, your OT engineers, and your executives. | Closed-loop incident response that produces structural improvement |
|
||||
|
||||
**The analogy**:
|
||||
|
||||
> *"An MSSP is like a security guard in your building. They watch the cameras, patrol the halls, and call the police when they see something. But they do not design the building's security architecture. They do not know which rooms contain the crown jewels. They do not decide whether a new wing needs stronger locks. Those decisions require someone who understands the building, its occupants, and its valuables. That someone must be you."*
|
||||
|
||||
---
|
||||
|
||||
## The Detection Engineering Gap (SOC-Specific)
|
||||
|
||||
### What Generic MSSP Rules Detect
|
||||
|
||||
- Known malware signatures
|
||||
- Common phishing indicators
|
||||
- Brute-force login attempts
|
||||
- Known-bad IP addresses and domains
|
||||
- Standard persistence techniques
|
||||
|
||||
### What Generic MSSP Rules Miss
|
||||
|
||||
| Threat | Why Generic Rules Miss It | What Custom Detection Would Catch |
|
||||
|--------|--------------------------|-----------------------------------|
|
||||
| **Insider threat**: Employee exfiltrating data via sanctioned cloud storage | The activity looks like normal business use | Unusual volume, timing, or destination for that specific user role |
|
||||
| **Living-off-the-land**: Attacker using native tools (WMIC, net.exe, PowerShell) | These are legitimate administrative tools | Execution context, parent-child process relationships, and command-line arguments specific to your environment |
|
||||
| **Compromised service account**: Non-interactive account suddenly interactive | Service accounts are rarely monitored individually | Any interactive login from a known service account |
|
||||
| **Supply chain compromise**: Vendor VPN used at 3 AM from new geography | Vendor access is pre-authorized | Time-of-day and geo anomalies for specific vendor accounts |
|
||||
| **OT reconnaissance**: IT network scanning targeting OT VLANs | Standard IT scanning is normal | Scanning traffic crossing the IT/OT boundary |
|
||||
| **AI-enabled fraud**: Deepfake voice call authorizing wire transfer | Traditional fraud controls do not detect synthetic media | Anomaly in voice authentication + financial authorization workflow |
|
||||
|
||||
**The insight**: Every environment has a unique "attack surface fingerprint." An MSSP serving 200 clients cannot maintain 200 custom detection rulebooks. They maintain one rulebook and apply it everywhere. The gaps are yours to fill.
|
||||
|
||||
---
|
||||
|
||||
## The Minimum Viable In-House Capability
|
||||
|
||||
You do not need a 20-person SOC to make an MSSP effective. You need a **minimal viable retained capability**:
|
||||
|
||||
### For Outsourced SOC: The Detection Engineering Cell
|
||||
|
||||
| Role | FTE | Responsibility |
|
||||
|------|-----|---------------|
|
||||
| **Detection Engineer** | 0.5-1.0 | Writes custom KQL/Sigma rules; tunes MSSP alert thresholds; validates MSSP detection coverage |
|
||||
| **Threat Context Analyst** | 0.5-1.0 | Prioritizes MSSP findings by business impact; provides environment-specific context; hunts for gaps |
|
||||
| **Integration Lead** | 0.25-0.5 | Ensures SOC feeds into change management, incident response, and governance; owns the MSSP relationship |
|
||||
|
||||
**Total: 1.5-2.5 FTEs** (can be part-time across existing staff or a single senior analyst)
|
||||
|
||||
**What this cell does weekly**:
|
||||
- Reviews MSSP closed tickets: were they true positives? Were any missed?
|
||||
- Reviews MSSP open tickets: are they stuck waiting for context the MSSP does not have?
|
||||
- Reviews new threats: would our MSSP detect this? If not, what custom rule do we need?
|
||||
- Conducts one hunt: proactive search for threats the MSSP is not configured to see
|
||||
- Meets with MSSP: provides feedback, requests tuning, shares environment changes
|
||||
|
||||
---
|
||||
|
||||
## How to Audit Your MSSP's Detection Coverage
|
||||
|
||||
### The Purple Team Test for MSSPs
|
||||
|
||||
Most clients evaluate MSSPs on **response time** and **ticket volume**. These are the wrong metrics. Evaluate them on **detection coverage**.
|
||||
|
||||
**The test**:
|
||||
|
||||
1. **Select 5 TTPs** relevant to your threat model:
|
||||
- One initial access vector (e.g., phishing with embedded macro)
|
||||
- One persistence technique (e.g., scheduled task creation)
|
||||
- One lateral movement technique (e.g., RDP hijacking)
|
||||
- One data collection technique (e.g., large ZIP creation)
|
||||
- One exfiltration technique (e.g., upload to personal cloud storage)
|
||||
|
||||
2. **Execute them in a controlled environment** (or simulate them with purple team tools)
|
||||
|
||||
3. **Measure**:
|
||||
- Did the MSSP detect the activity?
|
||||
- How long from execution to alert?
|
||||
- Was the alert accurate and actionable?
|
||||
- Did the MSSP understand the business impact?
|
||||
|
||||
4. **Gap analysis**: For every undetected TTP, determine:
|
||||
- Is the MSSP capable of detecting this but not tuned for our environment?
|
||||
- Is this beyond the MSSP's generic capability?
|
||||
- What custom detection rule would close the gap?
|
||||
|
||||
**Deliverable**: Detection Coverage Matrix
|
||||
|
||||
| TTP | Generic MSSP Detection | Custom Rule Required | Owner | Priority |
|
||||
|-----|----------------------|---------------------|-------|----------|
|
||||
| Phishing with macro | Yes (standard) | No | MSSP | — |
|
||||
| Scheduled task persistence | Partial (noisy) | Yes: parent process + user context | Client Detection Engineer | P1 |
|
||||
| RDP hijacking | No | Yes: concurrent sessions + unusual source | Client Detection Engineer | P1 |
|
||||
| Large ZIP creation | No | Yes: volume threshold + destination | Client Detection Engineer | P2 |
|
||||
| Personal cloud upload | Partial (known apps only) | Yes: DLP + user behaviour baseline | Client Detection Engineer | P1 |
|
||||
|
||||
---
|
||||
|
||||
## The MSSP Relationship Redesign
|
||||
|
||||
Most MSSP contracts are structured as **black boxes**: the client sends logs; the MSSP sends tickets. This model guarantees mediocrity.
|
||||
|
||||
**The antifragile alternative**: Co-managed SOC with clear capability boundaries.
|
||||
|
||||
| Function | MSSP Responsibility | Client Responsibility | Collaboration Model |
|
||||
|----------|--------------------|----------------------|---------------------|
|
||||
| **Log ingestion & platform ops** | Own the SIEM/SOAR infrastructure | Provide logs, verify completeness | Monthly log source audit |
|
||||
| **Alert triage (Tier 1)** | Initial assessment, enrichment, false positive closure | Provide context, approve escalations | Shared Slack/Teams channel |
|
||||
| **Investigation (Tier 2)** | Technical analysis, scope assessment | Business impact assessment, stakeholder notification | Joint incident bridge |
|
||||
| **Detection engineering** | Maintain generic rulebook | Write custom rules, tune thresholds, validate coverage | Bi-weekly detection review |
|
||||
| **Threat hunting** | Hunt on MSSP-wide intelligence | Hunt on client-specific intelligence and anomalies | Monthly hunt hypothesis workshop |
|
||||
| **Incident response** | Contain and eradicate (with approval) | Strategic decisions, regulatory notification, communications | Pre-approved containment playbooks |
|
||||
| **Reporting & metrics** | Ticket volume, response time, closed alerts | Detection coverage, mean-time-to-contain, business impact | Joint monthly metrics review |
|
||||
| **Continuous improvement** | Platform updates, threat feed integration | Architecture changes, detection gap closure, purple team | Quarterly capability review |
|
||||
|
||||
**The contract amendment**:
|
||||
|
||||
> *"Your MSSP contract currently measures response time and ticket volume. We propose adding two metrics: (1) Detection Coverage Rate—the percentage of emulated TTPs your MSSP detects in our environment, and (2) Custom Rule Integration Time—the days between us submitting a detection rule and your team deploying it. These metrics align your incentives with our actual security outcomes."*
|
||||
|
||||
---
|
||||
|
||||
## Generalizing Beyond SOC
|
||||
|
||||
The retained capability principle applies to any outsourced security function:
|
||||
|
||||
### Outsourced Penetration Testing
|
||||
|
||||
| What the Vendor Does Well | What You Must Retain |
|
||||
|---------------------------|---------------------|
|
||||
| Execute standardized test methodology | Define scope based on your actual threat model |
|
||||
| Find common vulnerabilities | Prioritize findings by business impact |
|
||||
| Write exploit proof-of-concepts | Validate whether a finding is truly exploitable in *your* architecture |
|
||||
| Produce a report | Convert findings into a structural improvement roadmap |
|
||||
|
||||
**The gap**: Most pentest reports sit unread. Without internal capability to validate, prioritize, and remediate, the test is theater.
|
||||
|
||||
### Outsourced Compliance Auditing
|
||||
|
||||
| What the Vendor Does Well | What You Must Retain |
|
||||
|---------------------------|---------------------|
|
||||
| Check control existence against framework | Define which controls actually reduce your risk |
|
||||
| Sample evidence | Ensure evidence represents operational reality, not audit-day fiction |
|
||||
| Write findings | Convert findings into actionable remediation with business justification |
|
||||
| Provide certification | Maintain continuous compliance between audits |
|
||||
|
||||
**The gap**: Compliance auditors check boxes. They do not know which boxes matter most to your survival.
|
||||
|
||||
### Outsourced Cloud Security Posture Management
|
||||
|
||||
| What the Vendor Does Well | What You Must Retain |
|
||||
|---------------------------|---------------------|
|
||||
| Scan cloud resources against benchmarks | Define which misconfigurations are actually exploitable in your network topology |
|
||||
| Generate remediation scripts | Validate that remediation does not break production workloads |
|
||||
| Track drift over time | Understand *why* drift occurs (process failure, shadow IT, emergency change) |
|
||||
|
||||
**The gap**: CSPM tools find thousands of "violations." Without internal context, every violation is treated as equally urgent.
|
||||
|
||||
### Outsourced Incident Response Retainer
|
||||
|
||||
| What the Vendor Does Well | What You Must Retain |
|
||||
|---------------------------|---------------------|
|
||||
| Respond to active incidents with specialized expertise | Know your environment well enough to guide the responders to critical systems |
|
||||
| Forensic acquisition and analysis | Preserve chain of custody and business continuity during investigation |
|
||||
| Eradication and recovery | Make strategic decisions about containment scope and communication |
|
||||
|
||||
**The gap**: External IR firms arrive blind. Without internal documentation and a pre-established relationship, they spend the first 48 hours learning your network.
|
||||
|
||||
---
|
||||
|
||||
## The Business Case for Retained Capability
|
||||
|
||||
### Cost of the Current Model
|
||||
|
||||
| Cost Category | Typical Annual Impact |
|
||||
|--------------|----------------------|
|
||||
| MSSP subscription (underperforming) | €500K-€2M |
|
||||
| Missed detections leading to breach | €4.5M average (rare but catastrophic) |
|
||||
| Alert fatigue: analyst turnover and burnout | €150K per replaced analyst |
|
||||
| Compliance penalties from undetected control failures | €100K-€2M (regulated industries) |
|
||||
| **Total risk-adjusted cost** | **€600K-€8M+** |
|
||||
|
||||
### Cost of Retained Capability
|
||||
|
||||
| Investment | Annual Cost |
|
||||
|-----------|-------------|
|
||||
| 1.5-2.5 FTE detection engineering cell | €150K-€300K |
|
||||
| Detection engineering tooling (free/open-source + Azure) | €10K-€30K |
|
||||
| Purple team exercises (quarterly) | €20K-€40K |
|
||||
| Consultant support (detection engineering mentor, quarterly) | €30K-€60K |
|
||||
| **Total retained capability investment** | **€210K-€430K** |
|
||||
|
||||
**ROI**: For a mid-sized organization, retained capability reduces breach probability, improves MSSP effectiveness, and prevents compliance failures. The investment pays for itself if it prevents one missed detection per year.
|
||||
|
||||
---
|
||||
|
||||
## The Consultant's Role
|
||||
|
||||
As an antifragile consultant, you do not replace the MSSP. You make the MSSP effective by:
|
||||
|
||||
1. **Auditing detection coverage** (Purple team test for MSSPs)
|
||||
2. **Building the detection engineering cell** (hiring, training, tooling, process)
|
||||
3. **Redesigning the MSSP relationship** (metrics, collaboration model, contract amendments)
|
||||
4. **Writing the first custom rules** (KQL, Sigma, Sentinel analytics rules)
|
||||
5. **Training internal staff** to sustain and extend the capability
|
||||
6. **Establishing the operating rhythm** (weekly detection review, monthly hunt, quarterly capability assessment)
|
||||
|
||||
**The pitch to the CISO**:
|
||||
|
||||
> *"Your MSSP is not failing you. You are failing to give them the context and custom detection rules they need to succeed in your environment. We do not fire the MSSP. We build a 2-person detection engineering cell inside your organization that makes the MSSP 3x more effective. For the cost of one senior analyst, you transform a €600K annual MSSP spend from insurance theater into actual protection."*
|
||||
|
||||
**The pitch to the CFO**:
|
||||
|
||||
> *"You are spending €600K per year on a SOC provider that runs generic rules. Generic rules catch generic threats. Your adversaries are not generic. A €200K investment in retained detection engineering makes your existing €600K SOC investment actually work. That is not additional spend. That is making current spend effective."*
|
||||
|
||||
---
|
||||
|
||||
## Integration With Existing Frameworks
|
||||
|
||||
| Document | Integration |
|
||||
|----------|-------------|
|
||||
| [Blue/Purple Team Foundation](blue-purple-team-foundation.md) | Detection engineering is the core of blue team capability; this document adds the MSSP co-management layer |
|
||||
| [Modular Engagements](modular-engagements.md) | Retained capability audit can be delivered as a standalone 30-day module; detection engineering cell build is a 60-90 day module |
|
||||
| [Antifragile Risk Register](../assessment-templates/antifragile-risk-register.md) | "Outsourced SOC with no retained detection engineering" is a T1 risk with extreme optionality impact |
|
||||
| [Business Case Template](../playbooks/business-case-template.md) | Retained capability ROI calculation |
|
||||
|
||||
---
|
||||
|
||||
*For building blue team capability from scratch, see [Blue/Purple Team Foundation](blue-purple-team-foundation.md).*
|
||||
*For the modular engagement menu, see [Modular Engagements](modular-engagements.md).*
|
||||
222
antifragile-consulting/core/t0-asset-framework.md
Normal file
222
antifragile-consulting/core/t0-asset-framework.md
Normal file
@@ -0,0 +1,222 @@
|
||||
# T0 Asset Framework
|
||||
|
||||
> *"Local AI is not an upgrade. It is an insurance policy against the obsolescence of your own company."*
|
||||
|
||||
This framework defines the **Tier 0 (T0) asset classification** and its application to sovereign intelligence, critical infrastructure, and organizational survival. It translates cybersecurity risk language into strategic architecture decisions.
|
||||
|
||||
---
|
||||
|
||||
## What Is a T0 Asset?
|
||||
|
||||
In enterprise security and infrastructure architecture, assets are commonly tiered by criticality:
|
||||
|
||||
| Tier | Definition | Traditional Examples |
|
||||
|------|-----------|---------------------|
|
||||
| T3 | Standard business assets | Office productivity, non-critical SaaS |
|
||||
| T2 | Important operational assets | ERP, CRM, standard customer-facing systems |
|
||||
| T1 | Critical assets whose failure causes major harm | Financial systems, core production databases, active directory |
|
||||
| **T0** | **Assets whose compromise or loss destroys the entire operation** | **Domain controllers, root certificate authorities, cryptographic key material, sovereign intelligence** |
|
||||
|
||||
A T0 asset is not merely "important." It is **existential**. Its loss does not cause downtime; it causes dissolution.
|
||||
|
||||
---
|
||||
|
||||
## Why Sovereign Intelligence Is T0
|
||||
|
||||
Treating local AI infrastructure as Tier 0 reframes the conversation from "technology investment" to **"foundational pillar of survival."**
|
||||
|
||||
### 1. T0 Defines the Boundary of Trust
|
||||
|
||||
Most organizations have allowed their cognitive perimeter to dissolve. Data flows outward to cloud AI providers through APIs, chat interfaces, and embedded assistants. The boundary of trust—the firewall between "us" and "them"—has been punctured by convenience.
|
||||
|
||||
By classifying intelligence as T0 and moving it inside the perimeter, the organization:
|
||||
|
||||
- **Re-establishes the boundary of trust**
|
||||
- **Regains control over what can be known about the organization**
|
||||
- **Prevents silent exfiltration of strategic reasoning**
|
||||
|
||||
> *"Our strategy is now ours again."*
|
||||
|
||||
### 2. T0 Removes Vendor Risk
|
||||
|
||||
Clients are rightly terrified of vendor lock-in for infrastructure. Yet they are sleepwalking into the ultimate lock-in: **intelligence lock-in**.
|
||||
|
||||
If an organization builds workflows around a cloud model, it is renting its ability to think. The vendor controls:
|
||||
|
||||
- The model's capabilities and behaviour
|
||||
- The pricing and availability
|
||||
- The "alignment" and safety filters
|
||||
- The terms of service and data usage policies
|
||||
|
||||
A local model is **vendor-independent**. It is an asset that remains fully functional regardless of:
|
||||
|
||||
- Silicon Valley boardroom decisions
|
||||
- Geopolitical events affecting API availability
|
||||
- Pricing restructuring
|
||||
- Model deprecation or behaviour changes
|
||||
|
||||
This is the definition of a T0 asset: **it must survive the failure of any external dependency**.
|
||||
|
||||
### 3. T0 Signals Strategic Maturity
|
||||
|
||||
Most competitors are pushing shiny cloud APIs because they are easy to implement and make the consultant look "modern."
|
||||
|
||||
When you advocate for local T0 infrastructure, you signal that you are not interested in the shiny. You are interested in **durability**. You are optimizing for the organization's viability over a 5-to-10-year horizon, not the next quarterly demo.
|
||||
|
||||
Clients who are serious about survival recognize that maturity immediately.
|
||||
|
||||
### 4. T0 Elevates the Advisor
|
||||
|
||||
The industry is currently filled with "AI consultants" who are essentially glorified sales reps for cloud providers. They have a structural conflict of interest: their revenue depends on your consumption of third-party services.
|
||||
|
||||
An independent architect has no such conflict. When you say:
|
||||
|
||||
> *"I am not suggesting local AI because it is easy. I am suggesting it because it is the only way to keep our proprietary edge from being harvested."*
|
||||
|
||||
You are speaking with the authority of someone who is **on the client's side of the table**.
|
||||
|
||||
---
|
||||
|
||||
## The T0 Asset Lifecycle
|
||||
|
||||
### Identification
|
||||
|
||||
Not all AI infrastructure is T0. The classification applies to:
|
||||
|
||||
- **Proprietary fine-tuned models** trained on internal data
|
||||
- **Core reasoning infrastructure** that drives strategic or operational decisions
|
||||
- **Model weights and architectures** that encode organizational knowledge
|
||||
- **Training datasets** that represent irreproducible intellectual capital
|
||||
- **Inference pipelines** that touch classified, regulated, or crown-jewel data
|
||||
|
||||
Cloud AI usage for generic, non-proprietary tasks (e.g., drafting public marketing copy) may remain non-T0. The classification is **data- and context-dependent**.
|
||||
|
||||
### Protection
|
||||
|
||||
T0 assets demand T0 protection:
|
||||
|
||||
| Control Layer | Requirement |
|
||||
|--------------|-------------|
|
||||
| **Physical** | Local hardware in controlled facilities; no third-party physical access |
|
||||
| **Network** | Air-gapped or strictly segmented; no direct internet egress from inference hosts |
|
||||
| **Access** | Zero-trust with just-in-time elevation; multi-party approval for model changes |
|
||||
| **Cryptographic** | Model weights encrypted at rest and in transit; key material in HSM |
|
||||
| **Audit** | Complete logging of access, inference, and fine-tuning operations |
|
||||
| **Backup** | Immutable, geographically distributed backups of weights, data, and configurations |
|
||||
| **Recovery** | Tested recovery procedures with RPO < 1 hour and RTO < 4 hours |
|
||||
|
||||
### Monitoring
|
||||
|
||||
T0 assets require continuous validation:
|
||||
|
||||
- **Integrity monitoring**: Detect unauthorized changes to model weights or configurations
|
||||
- **Performance drift monitoring**: Ensure fine-tuned models maintain accuracy over time
|
||||
- **Access anomaly detection**: Alert on unusual inference patterns or unauthorized access attempts
|
||||
- **Dependency health**: Monitor supporting infrastructure (GPU, storage, orchestration) with the same rigor as the models themselves
|
||||
|
||||
### Recovery
|
||||
|
||||
A T0 asset without a tested recovery plan is a liability:
|
||||
|
||||
- **Quarterly recovery drills**: Restore model weights and inference pipelines from backup
|
||||
- **Version rollback capability**: Maintain previous model versions for instant reversion
|
||||
- **Cross-site redundancy**: Active-passive or active-active deployment across independent facilities
|
||||
- **Documentation**: Recovery runbooks that can be executed by personnel who did not design the system
|
||||
|
||||
---
|
||||
|
||||
## The Vault Metaphor
|
||||
|
||||
When clients ask why they should accept the "friction" of local hosting, use the vault metaphor:
|
||||
|
||||
> *"Think of it like this: If our company's intelligence was a physical pile of cash, would we store it in a public bank that takes a 'training fee' off every dollar we put in and that holds the right to change the currency whenever they want? Or would we keep it in our own vault, where we control the security, the access, and the value?"*
|
||||
|
||||
**Local AI is the vault.**
|
||||
|
||||
The vault has a cost. It requires space, guards, and maintenance. But it guarantees that:
|
||||
|
||||
- The cash is there when you need it
|
||||
- No one else is lending it out
|
||||
- The currency does not change overnight
|
||||
- You can audit the balance at any time
|
||||
|
||||
---
|
||||
|
||||
## T0 Classification Worksheet
|
||||
|
||||
Use this worksheet during client engagements to classify AI and intelligence assets:
|
||||
|
||||
```
|
||||
Asset Name: ________________________________
|
||||
Description: ________________________________
|
||||
Data Types Processed: _______________________
|
||||
[ ] Public information
|
||||
[ ] Internal operational data
|
||||
[ ] Customer data
|
||||
[ ] Financial data
|
||||
[ ] Strategic / IP data
|
||||
[ ] Regulated data (specify: _________)
|
||||
|
||||
If this asset were unavailable for 24 hours:
|
||||
[ ] Minor inconvenience
|
||||
[ ] Operational disruption
|
||||
[ ] Significant financial loss
|
||||
[ ] Existential threat to organization
|
||||
|
||||
If this asset's data were leaked to a competitor:
|
||||
[ ] No impact
|
||||
[ ] Reputational damage
|
||||
[ ] Competitive disadvantage
|
||||
[ ] Existential threat to organization
|
||||
|
||||
If the vendor discontinued this service tomorrow:
|
||||
[ ] Easy replacement within 30 days
|
||||
[ ] Difficult replacement within 90 days
|
||||
[ ] Replacement requires major re-architecture
|
||||
[ ] No viable replacement exists
|
||||
|
||||
TIER CLASSIFICATION: [ ] T3 [ ] T2 [ ] T1 [ ] T0
|
||||
|
||||
Justification: ________________________________
|
||||
Required Controls: ____________________________
|
||||
Owner: ______________________________________
|
||||
Review Date: ________________________________
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Integrating T0 with Existing Frameworks
|
||||
|
||||
### NIST Cybersecurity Framework
|
||||
|
||||
| NIST Function | T0 Application |
|
||||
|--------------|----------------|
|
||||
| Identify | Asset inventory explicitly includes model weights, training data, and inference pipelines |
|
||||
| Protect | Encryption, access control, and segmentation applied to AI infrastructure at the highest level |
|
||||
| Detect | Anomaly detection on model access and inference patterns |
|
||||
| Respond | Incident response plans include model compromise and data poisoning scenarios |
|
||||
| Recover | Recovery objectives for AI assets match or exceed those of domain controllers |
|
||||
|
||||
### CIS Controls
|
||||
|
||||
Map T0 AI assets to CIS Control 1 (Inventory and Control of Enterprise Assets) and Control 3 (Data Protection). Treat model weights as sensitive data subject to the same controls as cryptographic key material.
|
||||
|
||||
---
|
||||
|
||||
## Consultant's Checklist
|
||||
|
||||
When presenting the T0 framework to clients:
|
||||
|
||||
- [ ] Explain the T0 concept using familiar examples (domain controllers, root CAs)
|
||||
- [ ] Map the client's current AI usage to the tier classification
|
||||
- [ ] Identify at least one T0-class intelligence asset the client has not recognized
|
||||
- [ ] Present the vault metaphor for intuitive understanding
|
||||
- [ ] Quantify the vendor risk: what happens if the cloud provider changes terms tomorrow?
|
||||
- [ ] Show the strategic maturity signal: this is what serious organizations do
|
||||
- [ ] Provide the worksheet for self-assessment
|
||||
- [ ] Connect T0 classification to immediate next steps in the [Rapid Modernisation Plan](../playbooks/rapid-modernisation-plan.md)
|
||||
|
||||
---
|
||||
|
||||
*Next: [Rapid Modernisation Plan](../playbooks/rapid-modernisation-plan.md)*
|
||||
*Previous: [AI Sovereignty Framework](ai-sovereignty-framework.md)*
|
||||
Reference in New Issue
Block a user