IT systems, software, or cloud services used within an organization without explicit approval from the IT department. Shadow IT creates security blind spots as these resources bypass standard security controls and policies.
Related Terms
Attack Surface
generalThe total number of possible entry points where an unauthorized user can attempt to enter or extract data from a system....
Cloud Access Security Broker (CASB)
cloud-securityA security solution that sits between cloud users and cloud applications to enforce security policies, monitor activity,...
Security Policy
complianceA formal document that defines an organization's approach to information security, including acceptable use, access cont...