Shadow IT

From HandWiki
Revision as of 20:46, 6 February 2024 by CodeMe (talk | contribs) (fix)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Short description: Type of information technology systems

In big organizations, shadow IT refers to information technology (IT) systems deployed by departments other than the central IT department, to bypass[1] limitations and restrictions that have been imposed by central information systems.[2] While it can promote innovation and productivity, shadow IT introduces security risks and compliance concerns, especially when such systems are not aligned with corporate governance.[3]

Origins

Information systems in large organizations can be a source of frustration for their users.[2] In order to bypass limitations of solutions provided by a centralized IT department, as well as restrictions that are deemed detrimental to individual productivity, non-IT departments might develop independent IT resources and for the specific or urgent need or requirements.[4] In some cases, IT specialists could be recruited or software solutions procured outside of the centralized IT department, sometimes without the knowledge, or approval of corporate governance channels.

Modern Shadow IT

Shadow IT has traditionally occurred through various sources of Hardware, such as employees bringing in USB drives or spinning up their own servers in offices. Recently Shadow IT has grown due to businesses adopting the cloud. The result has meant that more and more employees are signing up to Software-as-a-Service (SaaS) products to help them complete their jobs and be more productive. As a result, Shadow IT and SaaS Sprawl are now closely aligned and organisations can end up with 100s of SaaS applications that are not visible or centrally managed by the IT department.

Combatting Modern Shadow IT

There are several approaches that can be taken to mitigate the risks of Shadow IT. One of the main ways is to start creating a security culture and making employees responsible for their departments' tooling. In a distributed world the Heads of Departments are often responsible for managing data in SaaS applications as well as which employees have access to those systems. SaaS Security Posture Management is a modern cybersecurity category that aims to help businesses specifically address security risks associated with SaaS applications. Some focus on identifying sensitive data such as DLP, some are CASB focused, and others specifically address the risks of Shadow IT. The first step to tackling shadow IT is to identify the approved and unapproved applications being used throughout your business.[5]

Benefits

Although often perceived as attempts to undermine corporate governance, the existence of shadow IT often is an indicator of needs from individual departments not being satisfied from a centrally managed information ecosystem. Thus the immediate benefits of shadow IT are as follows:

  • Innovation: Shadow IT could be seen as sandbox for potential or prototype solutions in response to evolution of changing business requirements. Also, alignment between departments can be avoided or enhanced dependent on the constraints within the broader business.
  • Individual productivity: Shadow solutions are customized to the needs of the individual departments and thus allows the individuals involve to be more effectively. A study[6] confirms that 35% of employees feel they need to work around a security measure or protocol to work efficiently.
  • Reduced internal costs: Some shadow policies, such as BYOD, reduces direct hardware and software costs, while allowing localized support decreases overhead for IT departments.

Drawbacks

In addition information security risks, some of the implications of Shadow IT are:[7][8]

  • Costs: Additional time and investment could incurred at a corporate level on additional integration and validation and compliance of discovered shadow IT infrastructures. On the other hand, department choosing the solutions with the lowest price-tag for their shadow solutions might not have considered costs for deployment and maintenance. This also results in diminished return on investment in case of insufficient buy-in.
  • Consistency: As shadowed technical solutions might beyond centralized version control, they might deviate from standardized methodologies or calculations. Multiple, coexisting shadow infrastructures also introduces a heavily fragmented application landscape. This also makes centralized configuration management more difficult.
  • Operating inefficiencies: Established shadow solutions might prevent overall implementation of more efficient processes due to widespread use or inadequate documentation. The shadow system might also be beyond the capacity of the centralized IT department for integration and maintenance, especially when it becomes "too big to fail".

Compliance

Shadow IT increases the likelihood of uncontrolled data flows, making it more difficult to comply with various legislations, regulations or sets of best practices. These include, but are not limited to:

Prevalence

Within an organization, the amount of shadow IT activity is by definition unknown, especially since departments often hide their shadow IT activities as a preventive measure to ensure their ongoing operations. Even when figures are known, organizations are reluctant to voluntarily admit their existence. As a notable exception, The Boeing Company has published an experience report[1] describing the alarming numbers of shadow applications which various departments have introduced to work around the limitations of their official information system.

According to Gartner, by 2015, 35 percent of enterprise IT expenditures for most organizations will be managed outside the central IT department's budget.[12]

A 2012 French survey [13] of 129 IT managers revealed some examples of shadow IT :

  • Excel macro 19%
  • software 17%
  • cloud solutions 16%
  • ERP 12%
  • BI systems 9%
  • Websites 8%
  • hardware 6%
  • VoIP 5%
  • shadow IT support 5%
  • shadow IT project 3%
  • BYOD 3%.

Examples

Examples of these unofficial data flows include USB flash drives or other portable data storage devices, instant messaging software, Gmail or other online e-mail services, Google Docs or other online document sharing and Skype or other online VOIP software—and other less straightforward products: self-developed Access databases and self-developed Excel spreadsheets and macros. Security risks arise when data or applications move outside protected systems, networks, physical location, or security domains.

References

  1. 1.0 1.1 Handel, Mark J.; Poltrock, Steven (2011). "Working around official applications: experiences from a large engineering project". CSCW '11: Proceedings of the ACM 2011 conference on Computer supported cooperative work. pp. 309–312. doi:10.1145/1958824.1958870. [1]
  2. 2.0 2.1 Newell, Sue; Wagner, Eric; David, Gary (2006). Clumsy Information Systems: A Critical Review of Enterprise Systems. Agile Information Systems: Conceptualization, Construction, and Management. p. 163. ISBN 1136430482. https://books.google.com/books?id=TBFZB49aqYUC&pg=PA163. 
  3. Kopper, Andreas; Westner, Markus; Strahringer, Susanne (2020-06-01). "From Shadow IT to Business-managed IT: a qualitative comparative analysis to determine configurations for successful management of IT by business entities" (in en). Information Systems and e-Business Management 18 (2): 209–257. doi:10.1007/s10257-020-00472-6. ISSN 1617-9854. https://doi.org/10.1007/s10257-020-00472-6. 
  4. Zarnekow, R; Brenner, W; Pilgram, U (2006). Integrated Information Management: Applying Successful Industrial Concepts in IT. ISBN 978-3540323068. 
  5. What is Shadow IT and Why Should your Business Care | Available at https://www.joinploy.com/blog/what-is-shadow-it-and-why-should-your-business-care
  6. RSA,November 2007,The Confessions Survey: Office Workers Reveal Everyday Behavior That Places Sensitive Information at Risk,available from, http://www.rsa.com/company/news/releases/pdfs/RSA-insider-confessions.pdf, retrieved September 15, 2017 
  7. Myers, Noah and Starliper, Matthew W. and Summers, Scott L. and Wood, David A., The Impact of Shadow IT Systems on Perceived Information Credibility and Managerial Decision Making (March 8, 2016). Available at SSRN: http://ssrn.com/abstract=2334463 or https://dx.doi.org/10.2139/ssrn.2334463
  8. Fábián Tamás, Shadow IT in the New IT Management Triangle (2022). Available at https://doksi.net/en/news.php?order=ShowArticle&id=1909
  9. "Gramm-Leach-Bliley Act". https://www.ftc.gov/tips-advice/business-center/privacy-and-security/gramm-leach-bliley-act. 
  10. "Under Construction". https://www.eugdpr.org/. 
  11. "23 NYCRR 500". https://govt.westlaw.com/nycrr/Browse/Home/NewYork/NewYorkCodesRulesandRegulations?guid=I5be30d2007f811e79d43a037eefd0011&originationContext=documenttoc&transitionType=Default&contextData=(sc.Default). 
  12. "Predictions Show IT Budgets Are Moving Out of the Control of IT Departments". Gartner. http://www.gartner.com/newsroom/id/1862714. Retrieved 2012-04-25. 
  13. RESULTATS DE L’ENQUETE SUR LE PHENOMENE DU "SHADOW IT" par Thomas Chejfec : http://chejfec.com/2012/12/18/resultats-complets-de-lenquete-shadow-it/

External links

  • [2] Discussion on Tech Republic
  • [3] Industry's First Cloud Adoption and Risk Report
  • [4] Shadow IT in the New IT Management Triangle