Shining a light into Shadow IT

Thought Leadership
Shining a light into Shadow IT
The story of Corporate IT
unsurprisingly mirrors the
introduction of innovative and
disruptive technologies.
The IT department emerged in a twenty
year period between the widespread
adoption of the mainframe computer in
the 1960s, changing the way organizations
managed business information, and
the explosion of PCs that automated
office tasks in the 1980s. And then came
the network. Suddenly, Corporate IT
influenced every corner of the enterprise
and, with the World Wide Web, very
quickly had a global reach – controlling
the selection, management and security
of powerful enterprise systems working
firmly behind a defined perimeter.
But adapting to and managing these
developments pales in comparison to
the tsunami of change washing over
today’s IT departments. The adoption
of smart devices through policies such
as Bring Your Own Device (BYOD), the
use of social media, the demand for big
data analytics and a seemingly insatiable
appetite for low cost, easy-to-access
software-as-a-service (SaaS) and cloud
applications, have unleashed profound
changes that far exceed the impact of
these individual elements.
By
2018
59% OF TOTAL CLOUD WORKLOADS
WILL BE SOFTWARE-AS-A-SERVICE
(SAAS) UP FROM 41% IN 20131
The security implications of
self-sufficiency
Powerful and easy-to-acquire tools and
technologies – such as Dropbox™² for
quickly sharing a file with a colleague or
partner, to Amazon Web Services™³ for
spinning up development environments
fast – have ushered in an era of business
self-sufficiency. Tech-savvy users now
increasingly purchase, control and
provision their own services and solutions.
And this shift is gathering pace, with
industry analyst Gartner predicting that in
less than three years, 35% of expenditure
on IT will happen outside of the Corporate
IT budget, rising to 90% by 2020.⁴
This shift to the widespread use of
applications that are not sanctioned or
managed by IT is called Shadow IT.
Today’s workforce likes open ways of
working. But while employees may
believe tech self-reliance enables them
to do their jobs with better results, they
are not security or compliance specialists.
Thinking about how the applications
they use, what they post on social media,
or the websites they access, fit within
an enterprise security architecture is
not even on the agenda. And if every
employee, from HR to marketing, starts
working independently to store and share
data, the growth of Shadow IT will create
a security and risk time bomb.
Even in this new age of heightened
awareness of risk at board level, IT
is still seen in most organizations as
responsible for the technology estate,
including the elements it doesn’t even
1. ©Cisco Global Cloud Index: 2014–2019 White Paper 2. Dropbox™ – the file sharing and hosting service by Dropbox Inc.
4. Gartner Reveals Top Predictions for IT Organizations and Users for 2012 and Beyond 5. ©PWC Digital IQ Survey
www.nttsecurity.com
know about. The reality is that if there
is a security breach or compliance fine,
IT leaders will face hard questions, no
matter what the source of the failure.
For those organizations working hard to
improve security maturity by increasing
their predictive capabilities and applying
best practice controls – Shadow IT is a
dark cloud of audit and control risk for
data protection legislation such as the
Data Protection Act in the UK, HIPAA and
GLBA in the US, or the EU Data Protection
Directive and its local implementations.
So what can IT teams do to uncover,
assess and secure Shadow IT? In this
paper, we examine some of the drivers
for this phenomenon and share how
we are working with organizations to
take back control of risk and
compliance, without impairing
enterprise entrepreneurial spirit.
50%
OF IT MANAGERS ADMIT THAT
HALF OF THEIR BUDGET IS WASTED
ON MANAGING SHADOW IT5
Becoming a business partner for
continuous innovation
So why is IT faced with this tide of
unapproved applications? Two words –
speed and resources.
For many organizations, it is a question
of pace. Our reliance on enterprise
technology has stretched IT resources
to a point where demand for new digital
3. Amazon Web Services™ (AWS) – Amazon’s on-demand computing platform
Copyright© NTT Security 2016
opportunities outstrips IT’s capacity to
support continuous innovation. Business
managers and users don’t want to wait in
a traditional development line – not when
they can research and acquire relatively
cheap, off-the-shelf solutions that will give
them 80%+ of what they want, without a
capex investment. In some cases, users
go ahead and secure a free trial account
with their business credit card. Focusing
on the value of first-mover advantage or
the immediate benefits of collaboration
with other partners and stakeholders
across the extended enterprise, business
users pick up whatever tools make most
sense – including social media. The irony
is that by attempting to make it easy to
do business with one partner, they could
impact standards such as PCI and COBIT
that may be required by others.
40%
OF SHADOW CLOUD DEPLOYMENTS
RESULTED IN THE EXPOSURE OF
CONFIDENTIAL DATA7
There are industry voices that continue
to encourage IT to re-establish a vicelike grip over technology decisions and
procurement, but for most organizations
this is unrealistic. IT will never have
sufficient resources to facilitate all
elements of every business initiative.
Even trying a dictatorial blocking
approach, which some software tools
promise, risks undermining business
efficiency rather than offering valuable
insight based on domain experience.
Instead of panicking about losing control,
IT departments can choose to take the
role of business partners in the quest for
continuous innovation. By developing
a deeper understanding of business
objectives and priorities, IT can build a
framework that clearly outlines whether
or not it is appropriate to go it alone. In
this way, IT can focus on managing risk
and compliance in line with its strategic
security architecture – rather than on
administering every application and tool
business users want to try.
By
2017
35% OF NEW APPLICATIONS WILL
USE CLOUD-ENABLED, CONTINUOUS
DELIVERY AND ENABLED BY FASTER
DevOps LIFE CYCLES TO STREAMLINE
ROLLOUT OF NEW FEATURES AND
BUSINESS INNOVATION8
7. ©Symantec Internet Security Threat Report 2013
10. NTT Security Risk:Value Report 2016
www.nttsecurity.com
Evaluating the risks of shadow IT
Aspiring to a role as business partner
may be all well and good, but it does
not give IT immediate visibility to the
scope of the very real yet unknown and
unmanaged risks Shadow IT creates.
As the guardians of enterprise security
strategy and compliance programs,
information security professionals are
under pressure to discover the extent
of the Shadow IT landscape. This means
examining its digital footprint across
social media, web, mobile and cloud
applications; evaluating its potential
impact in terms of risk; and building
governance frameworks to include these
previously unidentified elements of
enterprise technology. This intelligence is
then used to put risk in context and
focus resources.
The time to act is now. Industry analysts
predict that by 2020 there will be 32
billion connected devices on the planet.9
The potential of the Internet of Things
to accelerate continuous innovation, will
make the task of managing Shadow IT
even tougher. A business focused on
the value of IoT for customer service,
operational efficiency or revenue
potential, will not consider the impact of
a breach – which according to NTT
Security research now costs an average
of $907,053.10
Shine a light into shadow IT
Managing Shadow IT will require
organizations to:
• Invest in their predictive capabilities
– putting intelligence in context by
discovering the extent of the digital
footprint and the cloud services in use.
Who is using them? Why are they being
used? What data is being shared? This
information can then be used to assess
the risks each service, application or
website poses in the context of the
organization’s data protection and
compliance frameworks
• U
nderstand the cloud services that the
business uses and segment them into
those that are authorized by IT and
those that are not
• Review access to both sanctioned and
unsanctioned applications – many
organizations use single sign-on (SSO)
• B
egin to evaluate and select cloud
services in terms of their ability to meet
security and compliance requirements,
using an industry registry of cloud
services and their specific security
controls
8. IDC: 2015-2017 Forecast: Cloud Computing to Skyrocket, Rule IT Delivery
• E
nsure that all enterprise data
is always protected as per your
defined policies – this may require
you to classify data both residing
in, or travelling to and from, cloud
applications. This may mean
preventing certain types of sensitive
data from being shared. Information
security professionals can add value
here by advising users of different
ways to operate securely – perhaps
reviewing how the business encrypts
and tokenizes data
• A
pply granular security policies that
enforce appropriate levels of data
access and cloud service functionality
according to variables such as a user’s
device, location, and operating system
• Detect anomalies that could signal
compromised credentials, noncompliant behavior, malware or data
theft or exposure
• C
reate an education program that
communicates policies and criteria for
selecting new mobile, web, digital and
cloud services. Ensure that you inform
users in real-time when they have
acted in a way that is not compliant
• M
aintain compliance with continuous
monitoring and reporting of cloud
audit trails and remediation
• S
ecurity controls must be selected,
implemented and operated in
an integrated manner with the
appropriate priorities
There is an emerging set of solutions
that can help information security teams
with these tasks. Some of these tools
focus on discovering an organization’s
digital footprint and assets outside of the
perimeter – helping evaluate the risks
to web, mobile and social properties.
These predictive capabilities speed, and
ultimately automate incident response
and remediation. Others offer a way to
establish a clear picture of unsanctioned
cloud services using log data from
firewalls and web proxies, giving security
teams a way to apply consistent,
granular security controls across all cloud
applications. These solutions are called
Cloud Access Security Brokers (CASBs).
We view CASB as an interesting but as
yet immature market. Organizations
need to review the options carefully to
find the best match for their business,
architecture, and security policy and
compliance requirements across all cloud
access scenarios.
9. ©IDC/EMC - the Digital Universe
Copyright© NTT Security 2016
2
Our Risk Insight service gives you a complete overview of your information security risks. Aligned to
our Global Enterprise Methodology, our consultants will deliver tangible and relevant value using the
following approach:
Example case study: secure critical
data with insight into cloud
applications
Challenge:
Di
sc
ov
er
y
Eva
lua
tio
n
Results
y
rit ns
cu tio
e
a
S er
p
O
n
atio
ent
lem
p
m
I
Confidence
Visibility
Solution:
Focus
Planning
Prioritization
The NTT Security point of view –
turning Shadow IT into Social IT
With estimates calculating that there
is up to $1.3 trillion in untapped
value from social technologies which
could be exploited through improved
communications and collaboration within
and across business,11 there is no doubt
that users will continue to seek out tools
that help them work together more
effectively. And by 2019, the SaaS model
will account for $1 of every $4.59 spent
on software.12 Much of this money will be
spent by departments outside IT.
The risks of Shadow IT will not decrease
without intervention. This does not
automatically mean introducing conflict
with the continuous innovation goals of
the business. The risk must be managed
but without reaching an impasse over
who controls what with users. Detection
of all the unsanctioned applications
and data exchange is only the first
step towards managing Shadow IT. As
with every new technology innovation,
controls introduced to tackle this issue
A large global retailer needed to
understand exactly what applications
– sanctioned and unsanctioned –
were being used across the business,
and the security implications of this.
must integrate with enterprise security
policies and compliance frameworks, be
regularly reviewed in a business context
and monitored in terms of effectiveness
against the wider security program.
There is technology that can help to
detect, assess, monitor and control the
use of Shadow IT. This will solve the
problem without negatively impacting
flexibility and innovation, but must
be carefully selected to give the right
functionality and scale. Organizations
must also ensure that the intelligence is
aggregated in the right way to increase
predictive capability rather than hinder it.
But at the heart of Shadow IT is a
resourcing issue. Where IT resources are
stretched too thinly and users have taken
things into their own hands, organizations
may also need to look beyond technology
and find opportunities to strategically
out-task elements of day-to-day security
monitoring and alerting that give back
time to build deeper relationships with
and add value for their business users.
Stage 1 – Identify the extent of the
problem
• Audit POC – unsanctioned SaaS
usage was 10x expected level
(over 2,000 apps)
• L
ive audit to cover multi-100,000 IT
users – real time SaaS app usage,
business readiness rating, block
unsanctioned apps quickly
Stage 2 – Secure the critical
SaaS infrastructure
• Office 365™,13 ©ServiceNow,14
©
Salesforce.com15
• Classify content by risk type
• S
ecure critical content – prevent
risky exposure
• U
ser behavior – identify broken
process and poor user behavior,
introduce threat detection
Business value of the solution:
The global retailer was able to secure
its critical content – applications and
information – tightening permissions
and reducing the exposure of
that data. They also got greater
insight into poor user behavior and
identified broken business processes.
This helped them understand how
these applications were potentially
being abused by employees – insight
which allowed the organization to
improve policies and communication
across the business.
About NTT Security
To learn more about NTT Security
and our unique services for information
security and risk management, please
speak to your account representative
or visit: www.nttsecurity.com
for regional contact information.
NTT Security seamlessly delivers cyber
resilience by enabling organizations
to build high-performing and effective
security and risk management programs,
with controls that enable the increasingly
connected world and digital economy to
overcome constantly changing security
challenges. Through the Full Security Life
Cycle, we ensure that scarce resources
are used effectively by providing the right
mix of integrated consulting, managed,
cloud, and hybrid services – delivered
by local resources and leveraging our
global capabilities. NTT Security is part
of the NTT Group (Nippon Telegraph
and Telephone Corporation), one of the
largest information and communications
technology (ICT) companies in the world.
For more information, visit
www.nttsecurity.com
11. ©McKinsey – Capturing business value with social technologies 12. IDC Worldwide SaaS and Cloud Software 2015–2019 Forecast and 2014 Vendor Shares
13. Microsoft® Office 365™ – software plus services subscriptions 14. ©ServiceNow Inc. – ITSM and cloud computing provider 15. ©Salesforce.com Inc. – CRM cloud computing product
www.nttsecurity.com
Copyright© NTT Security 2016
3