A Ring 6 practitioner does not wait for the environment to be probed by a real adversary. The adversarial-modelling ritual is a scheduled exercise in which the team assumes the role of an intelligent attacker attempting to exploit the seams between contractual, architectural, and economic denials.
The ritual
- ▸Quarterly cadence at minimum, or after any material architectural change.
- ▸Two-person red team: one with outsider knowledge, one with insider knowledge.
- ▸Scope declared up front: vendor relationships, supply chain, build pipeline, billing, employee onboarding.
- ▸Objective: identify one novel exploit pathway per exercise.
- ▸Output: pathway description, remediation proposal, Ring 6 control change.
The exercise is not complete until a Ring 6 control has been strengthened. Any quarter that produces no control change is itself evidence of insufficient imagination.
Sidebar
Institutional-horizon commentary
A company that plans to outlive its founders must commit to adversarial modelling as a permanent ritual. The adversaries of a 20-year-old institution have access to 20 years of accumulated drift; the institution must continuously re-read its environment through adversarial eyes.