A critical time-sensitive opportunity exists: the EU AI Act high-risk obligations take effect August 2, 2026, and zero content addresses what this means for data center operators and infrastructure providers specifically. The broader compliance landscape for AI infrastructure is equally vacant — nobody has published a unified compliance framework, and the intersection of compliance and resilience engineering is entirely unoccupied intellectual territory.
SemiAnalysis’s ClusterMAX rating system evaluates NeoCloud performance, but no equivalent exists for resilience or compliance maturity. The gap between “we have SOC 2” and “our security program actually works under pressure” is where most organizations fail — and where assurance engineering becomes essential.
URE approaches security as an enabler, not a checkpoint. Articles in this cluster cover trust boundary design, security assurance methodology applied to real systems, defense-in-depth for infrastructure that spans facilities to firmware, and the governance frameworks that scale with the business rather than constraining it.
Last Friday, the White House ordered every federal agency to stop using Anthropic products within six months. The Defense Secretary designated the company a “supply chain risk to national security” — a label normally reserved for foreign adversaries like Huawei or Kaspersky.
Anthropic’s crime: they refused to remove two safety guardrails from Claude before deploying it on classified Pentagon networks. No AI for mass domestic surveillance of American citizens. No fully autonomous weapons without human oversight.
...
In Brazil, when advising a customer on endpoint security, there was a mental model we never said out loud. The technical discussion would cover detection rates, false positives, memory footprint — the usual. But underneath it ran a question that never made it into the RFP: who do you want knowing what you’re doing? Russians or Americans?
Kaspersky was the default for most of the market — and not because of ideology. Norton and Symantec had spent years earning their reputation for turning Windows machines into molasses, and McAfee was McAfee. Kaspersky worked. It was lighter, faster, cheaper. The fact that its telemetry flowed to Moscow rather than Langley was a feature, not a bug, depending on which side of the table you sat on.
...
This is the third and final part of a series based on a real-world engagement: a company that scaled from $40M to $1B in annual revenue in just five years, and the security program that had to grow with it.
This is a story about building high-performance operating systems where security, standards, architecture, and performance act as enablers rather than constraints.
Part 1: Earning credibility before you’ve earned authority. Part 2: Blurring the lines — Security at the SRE and Operations level. Part 3: Wrapping the gift — Transparency and agency. The Quality That Can’t Be Purchased I’ve been writing around this idea for a while — in Cold Aisle Trenches, in why standards fail when you try to impose them, in how defense in depth actually works at scale. The thread is always the same: security can’t be bought. You can’t swipe a credit card and receive “secure” in a box. It’s a quality that emerges — like the lights-out data center you don’t chase but eventually arrive at, because every other piece fell into place first.
...
This is the second of a three-part series based on a real-world engagement: a company that scaled from $40M to $1B in annual revenue in just five years, and the security program that had to grow with it.
This is a story about building high-performance operating systems where security, standards, architecture, and performance act as enablers rather than constraints.
Part 1: Earning credibility before you’ve earned authority. Part 2: Blurring the lines - Security at the SRE and Operations level. Part 3: Wrapping the gift — Transparency and agency. From Trust to Reliance
...
This is the first of a three-part series based on a real-world engagement: a company that scaled from $40M to $1B in annual revenue in just five years, and the security program that had to grow with it.
This is a story about building high-performance operating systems where security, standards, architecture, and performance act as enablers rather than constraints.
Part 1: Earning credibility before you’ve earned authority. Part 2: Blurring the lines - Security at the SRE and Operations level. Part 3: Wrapping the gift — Transparency and agency. The Inflection Point A few years back, AMTI was at the heart of a fascinating corporate challenge. I was serving as a fractional CISO and advisor for a company standing at a critical inflection point.
...
Most security programs are built around preventing bad things from happening. That’s necessary but insufficient. At AMTI, where I served as CTO and led infrastructure security for a multi-tenant cloud serving customers from single-VM deployments to enterprise DRaaS contracts spanning hundreds of miles of metro fiber, I learned that mature security is about resilience: the capacity to detect, contain, and recover faster than adversaries can escalate.
The Visibility Problem at Scale Operating a cloud service provider on your own ASN creates a specific governance challenge: you’re the abuse contact, but in a GDPR-compliant architecture, you have no visibility into customer data. Encrypted traffic is opaque by design. This constraint forced architectural discipline: we couldn’t inspect our way to security, so we had to instrument our way there.
...
Every company says security is a core value. Few embed it as a design constraint. The difference shows up when things break.
I get a call from a co-founder I’ve known for years. His company just raised $400M+ Series D. His voice is flat: “We have a problem.” Same day, we’re on a call. He’s a skilled engineer — personally devastated. They leaked over 2 million user records. Home addresses. Phone numbers. The full profile. The data had been publicly accessible for three weeks before anyone noticed.
...
1/5 — The Inception Series: Security Assurance — URE Case — 1/5
Start from the beginning: you’re here.
Next: 2/5 — Trust Boundaries
This is the first of five short posts on Security Assurance Engineering. The goal is simple: separate security intent from security proof, and show what “assurance” looks like when you treat a system as real—owned, changing, and measurable.
I’ll use URE as the working surface. URE is the platform where I publish research notes and operating practice generated in my lab—work that started as a few shared threads with friends and peers, and eventually became worth “productizing” into something durable and navigable.
...
2/5 — Trust Boundaries Series: Security Assurance — URE Case — 2/5
Start from the beginning: 1/5 — The Inception
Next: 3/5 — The Design
In mature environments, we don’t start with implementation. We start with boundaries and ownership.
Before anyone spins up “a simple website/blog,” we make three things explicit:
What is the system? (scope and components) Who can change it? (identities and permissions) What must always remain true? (invariants + guardrails) Security should be intentional. The goal is to create guardrails the rest of the team can rely on—so delivery is fast and the system stays trustworthy under change.
...
3/5 — The Design Series: Security Assurance — URE Case — 3/5
Start from the beginning: 1/5 — The Inception
Next: 4/5 — Security as an Enabler (and “forward agency”)
Design is where “a simple website” becomes a real system.
Not because the pages are complex—but because the moment you publish, you inherit real dependencies: DNS, build pipelines, third parties, telemetry, and the drift that comes with change. So before we build anything, we do one unglamorous thing:
...
4/5 — Security as an Enabler (and “forward agency”) Series: Security Assurance — URE Case — 4/5
Start from the beginning: 1/5 — The Inception
Next: 5/5 — Conclusion — Assurance Without Theater
Security enables the business when it shows up with agency: not just identifying risk, but carrying enough context to propose solutions that preserve the mission.
That requires a maturity shift.
When security arrives late, it often speaks in “non-English.” It blocks because the system is already committed to choices no one can defend.
...
5/5 — Conclusion — Assurance Without Theater Series: Security Assurance — URE Case — 5/5
Start from the beginning: 1/5 — The Inception
Security Assurance Engineering is not a side quest. It’s not a compliance ritual. And it’s not a “security team thing.”
It’s what turns security from intent into proof—in systems that are owned, changing, and measurable.
Across these chapters, the arc is consistent:
Part 1/5 (Inception): Architecture sets the invariants. Assurance proves they still hold under change. Part 2/5 (Trust Boundaries): If the boundary isn’t explicit, you don’t have a system—you have assumptions. Part 3/5 (Design): The tedious questions aren’t bureaucracy; they are how you prevent accidental scope and irreversible drift. Part 4/5 (Security as Enabler): Done well, security doesn’t slow delivery—it restores optionality and keeps the mission intact under real pressure. The takeaway is simple:
...
Every company says security is a priority. Every company also ships under pressure.
The gap between those two statements is where businesses bleed.
I’ve watched organizations with excellent engineers and serious budgets still get humbled by the same pattern: teams optimize locally (features, velocity, “my backlog”), while the system pays globally (incidents, outages, churn, reputational drag). When things go south, it rarely takes a cinematic attacker or a once-in-a-decade failure.
...