Shadow IT
Shadow IT
Hiral Patel
@gisacouncil
Introduction
Shadow IT refers to information technology systems, applications, or
services used within an organization without explicit approval or oversight
from the IT department. These can include software, hardware, or cloud-
based tools employees use to perform their tasks, often because they
perceive them to be more efficient or user-friendly than the official IT
solutions provided by the organization.
Examples of Shadow IT:
Here are the most common reasons why employee choose Shadow IT
Employees find approved software and services inefficient
Approved software is complicated and uncomfortable to work with
Allowed solutions are incompatible with employees’ devices
Employees don’t fully understand the security risks posed by shadow IT
Common Sources of shadow IT
1.File Storage Solutions
Employees often resort to unauthorized tools for file sharing and storage,
such as personal accounts on Dropbox or Google Drive, to exchange files,
folders, or screenshots. These tools may not meet organizational security
standards, posing a significant risk. For instance, using services like
WeTransfer for sharing large files. While it is user-friendly, files shared via
WeTransfer may not always be encrypted end-to-end, exposing sensitive
corporate data to potential interception or unauthorized access.
Additionally, if shared links are misused or fall into the wrong hands,
confidential information could be compromised.
2. Productivity, Collaboration, and Project Management Tools
Once you've determined whether an app is suitable for your organization, it's
essential to investigate how it's being used and by whom. If its usage is
limited, it may be acceptable, but if its use is increasing, you should monitor
it more closely to decide whether to block the app. In the Microsoft Defender
Portal, go to Cloud Apps and select Cloud Discovery, then navigate to the
Discovered Apps tab. Drill down into specific apps and check the Usage tab
for details on active users and traffic levels. To see which users are
engaging with the app, click on Total active users. If an app's usage is
concentrated in a department, such as Marketing, it may indicate a
business need, and you may need to find a safer alternative.
For deeper insights, explore subdomains and resources
to track specific activities, data access, and resource usage
within cloud services.
Step:3 Identify Alternative Apps
To find safer alternatives to risky apps, use the cloud app catalog to
discover applications that provide similar business functionality while
complying with your organization’s security policies. You can utilize
advanced filters to search for apps within the same category that meet
specific security controls, ensuring they align with your organization's
standards. This approach helps you identify compliant tools that can
replace non-compliant ones, maintaining productivity while reducing
security risks.
Phase 3: Manage your apps
Defender for Cloud Apps helps streamline the management of app usage
within your organization. Once you've identified usage patterns and
behaviors, you can create custom app tags to classify apps based on their
business relevance or justification. These tags can then be utilized for
monitoring specific activities, such as tracking high traffic to apps tagged
as risky, like cloud storage services. App tags are managed under Settings >
Cloud Apps > Cloud Discovery > App Tags and can be applied for filtering
apps in the cloud discovery pages. Additionally, these tags can be used to
create targeted policies for better security and compliance management.
Step:2 Continuous Monitoring
1 3
2 4
Food for Thought
How can organizations reduce the risks of Shadow IT?
A) Encourage the use of non-cloud applications
B) Monitor unauthorized apps and create policies to block high-risk ones
C) Limit employee access to cloud services entirely
D) Disallow the use of personal devices for work
Thank You
I hope it was useful
CONTACT INFO
+91 960-110-3255
HIRALAPATEL