Kuboid
Open Luck·Kuboid.in
Black Hat2023
Open in YouTube ↗

Security Advocacy Shouldn't Be for Security Professionals

Black Hat937 views41:41over 2 years ago

This talk analyzes the communication gap between security professionals and the broader IT community, highlighting how technical content often fails to reach its intended audience. It examines the 'expert problem' in human psychology, where increased expertise leads to poorer communication with non-experts, and discusses the prevalence of overly complex, unvetted, and non-concise security documentation. The speaker advocates for adopting a 'TL;DR' approach to security content, emphasizing the need for clear, actionable, and accessible guidance that can be understood by non-security personnel.

Why Your Security Documentation Is Failing Your Users

TLDR: Security documentation often suffers from the "expert problem," where deep technical knowledge leads to inaccessible, overly complex, and non-actionable guidance. By failing to provide clear, concise, and task-oriented instructions, security teams inadvertently increase risk by forcing users to guess at configurations. Adopting a "TL;DR" mindset and prioritizing task-based documentation over theoretical "thought leadership" is essential for improving security outcomes.

Security professionals have a bad habit. We write documentation for other security professionals, assuming a baseline of knowledge that simply does not exist for the average developer or IT administrator. We fill pages with jargon, architectural diagrams, and high-level concepts, all while ignoring the person who just needs to know how to secure a specific S3 bucket or configure a firewall rule. This isn't just a communication failure; it is a security vulnerability. When your documentation is too dense to parse, your users will either ignore it entirely or implement the wrong controls, leaving your infrastructure exposed.

The Expert Problem in Security Communication

Human psychology dictates that the more you know about a topic, the harder it becomes to explain it to someone who doesn't. This is the "expert problem." In our industry, this manifests as documentation that prioritizes "thought leadership" over utility. We want to sound smart, so we write long, winding documents that position our organization as an authority.

The reality is that nobody is reading your 125-page PDF on security architecture. If you are a developer tasked with securing a cloud environment, you don't have time to digest a manifesto. You need to know what to do, why you are doing it, and how to execute it without breaking production. When we fail to provide this, we aren't just being bad writers; we are failing to provide the necessary guardrails for the people who actually build and maintain the systems we are trying to protect.

Why "Thought Leadership" Is Not Security Guidance

Look at the documentation provided by major cloud providers for common tasks like data residency and sovereignty. Often, these documents are filled with high-level theory but lack the specific, step-by-step instructions required to actually implement the controls. They link to dozens of other pages, creating a rabbit hole of information that makes it nearly impossible for a busy administrator to find a clear path forward.

This is the opposite of what a user needs. A user needs a "TL;DR" that cuts through the noise. If you are writing security content, your goal should be to get the user from point A to point B as quickly and safely as possible. If your documentation requires the user to read three other documents just to understand the first one, you have already lost them.

The Cost of Inaccessible Documentation

When documentation is inaccessible, the cost is paid in misconfigurations. We see this constantly in penetration testing engagements. A team might have the best security policies in the world, but if those policies are buried in a 200-page internal wiki that no one understands, they won't be followed.

Consider the OWASP documentation as a benchmark. It is effective because it is actionable. It identifies a specific risk, explains the impact, and provides clear, concrete steps for remediation. It doesn't waste time on fluff. If your internal security documentation doesn't meet this standard of clarity, you are essentially asking your team to fail.

How to Fix Your Security Content

If you want your documentation to be used, you need to change your approach. Start by asking yourself two questions for every piece of content you produce: "Can anyone actually consume this and do the thing?" and "Is this useful to someone who isn't a security expert?"

  1. Be Concise: If you can't explain the task in a few sentences, you haven't simplified it enough. Use the TL;DR format to provide the "what" and "why" immediately.
  2. Be Actionable: Don't just tell people to "secure their environment." Tell them exactly which settings to change and which commands to run.
  3. Avoid Jargon: If you are using acronyms that aren't industry standard, you are alienating your audience. Write for the person who is trying to do their job, not for the person you are trying to impress.
  4. Focus on the "How": Theory is fine, but implementation is what matters. If you are documenting a security control, include the specific CLI commands or API calls required to enable it.

For example, instead of writing a ten-page document on the importance of logging, write a one-page guide that shows exactly how to enable audit logs in your specific cloud environment using the AWS CLI or Azure CLI.

We need to stop gatekeeping security through complexity. If we want to build a more secure industry, we have to make security easy to understand and even easier to implement. The next time you sit down to write a guide, remember that your audience is busy, stressed, and likely not a security expert. Give them the information they need to succeed, and leave the "thought leadership" for someone else.

Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in