The steep rise in shadow IT is attributed to the pervasive use of mobile devices and cloud-based applications and services. Although shadow IT can improve employee productivity and drive innovation, it generates serious vulnerabilities and security risks as it expands the unknown parts of an organization’s attack surface, creating opportunities for cyber attacks and compliance violations.
Malware or other malicious assets planted by cybercriminals are not considered shadow IT. Shadow IT only encompasses unsanctioned assets deployed by authorized users.
Definition of shadow IT
Shadow IT refers to digital systems, devices (e.g., personal computers (PCs), laptops, tablets, and smartphones), software, applications (i.e., usually off-the-shelf packaged software), and services (i.e., predominantly software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) that are used within an organization without the knowledge of the IT department.
Understanding shadow IT
The consumerization of technology is a root cause of shadow IT. The low cost and accessibility of IT resources have led to an explosion of shadow IT.
In some cases, the decision to acquire and use shadow IT is deliberate. Users explicitly circumvent IT to procure solutions that IT has disallowed or to access a solution perceived as better than sanctioned resources. Users may also acquire resources without alerting IT because the approval and procurement process is deemed too onerous.
In many cases, users are not willfully excluding their IT department from evaluating resources; they simply sign up to use a system at the behest of partners or other external entities or use systems they use at home or have used in other organizations.
Shadow IT can also occur when users create websites outside the corporate domain for development or one-off projects. Bring-your-own-device (BYOD) and working from home are other sources of shadow IT.
Differences between sanctioned and unsanctioned IT
At the core of shadow IT are sanctioned and unsanctioned IT (e.g., devices, applications, and services). The difference is simple.
Sanctioned IT solutions have been vetted, approved, and often hardened to eliminate vulnerabilities. On the contrary, unsanctioned IT (i.e., shadow IT) solutions have not.
Unsanctioned IT exposes organizations to threats (e.g., malware and data loss) that can be introduced into networks by cybercriminals, malicious insiders who take advantage of weaknesses, or accidental insiders who inadvertently create vulnerabilities.
Common examples of shadow IT
As the examples below illustrate, shadow IT does not mean the resources are inherently non-secure. The issue with their use lies in the fact that IT does not know they exist and, therefore, cannot protect the organization from them. Common examples of shadow IT include:
Any application used for business purposes without involving the IT group, such as applications for:
- Cloud storage
- Collaboration
- Communication and messaging
- Document proofreading
- File sharing
- Productivity
- Project management
- Social media management, as well as
Employees’ personal devices
- Laptops
- Phones
- Storage devices (e.g., USB drives and external hard drives)
- Tablets
Risks associated with shadow IT
While shadow IT is adopted for the benefits provided by the selected tools, shadow IT assets increase cyber risk by creating vulnerabilities that fall outside the reach of security systems, including the following.
Security vulnerabilities
Shadow IT brings with it a number of vulnerabilities. The security issues usually associated with shadow IT come from a lack of security controls and processes. For instance, shadow IT elements are not included in IT monitoring and maintenance programs and are often found to be behind with software updates and security patches, as well as carrying viruses and other malware.
Additionally, shadow IT solutions often lack the authentication and other access controls required of sanctioned solutions. This makes shadow IT more susceptible to unauthorized access, which can expose sensitive information and unwittingly provide a point of entry to secured networks.
Collaboration inefficiencies
Shadow IT introduces systems that are not used across an organization. This creates collaboration issues related to communications and data sharing since shadow IT is often not integrated with sanctioned systems and workflows.
Compliance issues
Shadow IT rarely meets the stringent compliance requirements of regulations such as the Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI DSS), and General Data Protection Regulation (GDPR). This not only puts data at risk but exposes organizations to fines and penalties related to compliance violations.
Potential for data loss
When sensitive data is stored on, accessed by, or transmitted through shadow IT systems and applications, the risk of data breaches or leaks increases significantly. In addition, data stored outside of sanctioned IT systems is not included in backups, putting it at risk of irrevocable loss in the event of a failure or attack.
Data inconsistency
When data is spread across shadow IT, it falls outside IT’s centralized management. This results in the creation and propagation of unofficial, invalid, or outdated information, and also creates versioning issues.
Lack of IT visibility and control
Because shadow IT often goes undetected by security teams, organizations are exposed to unknown vulnerabilities commonly exploited by cybercriminals.
Operational inefficiencies
Shadow IT often does not integrate easily with sanctioned IT infrastructure. The result is workflow obstacles and challenges in sharing and synchronizing information. In addition, conflicts can arise when IT-sanctioned solutions are introduced that interfere with or interrupt shadow IT that users rely on for day-to-day operations.
Shadow IT benefits
Although shadow IT has risks, its users tout its benefits as a reason for using it, including the following.
Enhanced flexibility and innovation
Because it is quickly accessible and offers virtually limitless options in terms of available solutions, shadow IT is inherently flexible. This flexibility leads to innovation in how work is done by allowing users to experiment with different systems. It also can lead to innovation in other areas, such as communication and even product design. When used judiciously, shadow IT can also facilitate an organization’s digital transformation by bringing more technology to day-to-day operations and processes.
Addressing immediate needs
The accessibility of hardware and software solutions, especially those available as cloud services, opens up a vast array of IT resources. If an employee is not able to accomplish a task with the tools provided by IT, or they find something that seems more efficient, they can order it or sign up for an account and start using the new tool in near real-time.
Increased productivity
With shadow IT, employees do show improved productivity. This is attributed to allowing them to use the tools with which they are most comfortable. In some cases, productivity is increased because they bypass cumbersome processes associated with acquiring or accessing IT systems and tools. Additionally, if employees do not have suitable systems or tools, they can get them on their own more quickly than if they had to navigate IT procurement processes.
Additional benefits of shadow IT
- Allows employees to use the best tools for their jobs
- Eliminates bottlenecks related to getting approval from IT for new systems
- Enables teams to be more agile in responding to business changes
- Facilitates the adoption of new technology more rapidly
- Facilitates the launch of new systems in just minutes
- Increases employee satisfaction by letting them use the tools they like
Management strategies for shadow IT
Managing shadow IT can materially mitigate its risks. Organizations can allow shadow IT and benefit from it by adopting and enforcing controls. The following are several tactics that have been successfully employed to manage shadow IT risk.
Establishing clear IT policies
Effective management of shadow IT starts with developing and implementing a comprehensive usage policy. The shadow IT policy should provide details about the acceptable use of unsanctioned technology, establish processes for having a solution approved, and dictate the security controls that are required for its sanctioned use. Shadow IT policies should be made part of employee handbooks, and the penalties for noncompliance should be clearly articulated and enforced.
Shadow IT policies can also include direction for security and IT teams. These sections should cover the approval processes as well as detail what tools should be used to manage and monitor shadow IT.
Providing employee training and awareness
Education and clear communication are vital to managing shadow IT. Employees need to be educated about the risks of shadow IT and how to follow the organization’s security policies when using personal devices or services not provided through the IT department. Training and ongoing communication should include a clear explanation of the process for working with IT to use tools that have not yet been sanctioned and remind employees about the penalties for noncompliance.
Implementing monitoring and reporting tools
Monitoring systems can be used to identify instances of shadow IT by detecting unauthorized use of IT resources. This can be done using purpose-built shadow IT discovery tools as well as monitoring firewall logs and intrusion detection and prevention systems’ activity to identify anomalies. Additionally, cloud access security brokers (CASBs) can detect unauthorized systems. If shadow IT is a significant concern, penetration testing and other ethical hacking measures can be used to identify instances of it.
Compromising to minimize shadow IT risks
Although IT departments want employees to use sanctioned systems so that they can be protected with corporate security controls and included in overarching operational and budgeting plans, some departments have determined that strict control over what systems are sanctioned and how this is achieved has driven users to shadow IT.
As a result, some organizations choose a more open approach to shadow IT systems: IT teams determine what is used and how best to protect it, and users have access to the tools they want and need.
Although this type of compromise is not easy, working together is one way that users and IT can find ways to mitigate the risk of shadow IT.