Section 3.25 Shadow IT Flashcards
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
Shadow IT
Section 3
Use of information technology systems, devices, software, applications and services without explicit organisational approval.
IT-related projects that are managed outside of, and without the knowledge of, the IT department
Why does Shadow IT exist?
An organization’s security posture is actually set too high or is too complex for
business operations to occur without be negatively affected
BYOD: Bring your own devices
Shadow IT Risks
Shadow IT is very dangerous within organisations as unknown/unmanaged devices/cloud networks connected to an organisations network acts as a target for threat actors.
Organisations ideally should procure all the devices on a network