ID.AM-08.140

Does your organization have a process to identify and manage unauthorized or unapproved technology solutions (shadow IT) being used to meet business objectives?

Explanation

Shadow IT refers to technology systems, software, devices, or services used within an organization without explicit IT department approval or knowledge. These unofficial solutions often emerge when employees seek to improve productivity or overcome limitations in approved tools. Examples include using personal cloud storage accounts for work files, unauthorized collaboration tools, or employee-developed applications. Evidence of compliance could include documentation of shadow IT discovery processes, such as network scanning reports, application inventory tools, cloud access security broker (CASB) logs, or formal shadow IT assessment reports that identify unauthorized systems in use across the organization.

Implementation Example

Identify unofficial uses of technology to meet mission objectives (i.e., shadow IT)

ID: ID.AM-08.140

Context

Function
ID: IDENTIFY
Category
ID.AM: Asset Management
Sub-Category
Systems, hardware, software, services, and data are managed throughout their life cycles

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron