<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Shadow IT risk analysis in public cloud infrastructure⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yevhenii Martseniuk</string-name>
          <email>yevhenii.v.martseniuk@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Partyka</string-name>
          <email>andrii.i.partyka@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Harasymchuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Elena Nyemkova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mikolaj Karpinski</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CSDP-2024: Cyber Security and Data Protection</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepana Bandery str., 79000 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of the National Education Commission</institution>
          ,
          <addr-line>2 Podchorazych str., 30-084 Krakow</addr-line>
          ,
          <country country="PL">Polska</country>
        </aff>
      </contrib-group>
      <fpage>22</fpage>
      <lpage>31</lpage>
      <abstract>
        <p>Shadow IT, where IT systems and services are used without explicit approval from an organizational IT department, has risen to be an important issue for cloud computing. Its growth emanates from the growing capabilities and accessibility of cloud services that often circumvent the IT pre-established policies and governance mechanisms. This paper aims to research and investigate the complex nature of Shadow IT within public cloud environments, focusing on the risks it poses, its effects, and the strategies to manage it effectively. These risks are varied and significant, with great concern over data protection and security. Thus, unauthorized use of cloud services exposes organizational data to vulnerabilities. Furthermore, cloud environments could face a situation of policy shadowing in which higher-level policies shadow more granular but potentially conflicting policies, therefore leading to unnoticed security gaps. There are also great threats associated with legal and compliance risks, through which companies might have to incur huge penalties because of unauthorized cloud service usage. This research explains the various types of Shadow IT: from unauthorized software and hardware to unapproved cloud computing services and unsanctioned development activities. Additionally, the paper will detail the major Shadow IT risks related to security, compliance, cost, and interoperability problems. It further deals with strategic management towards the mitigation of risks involved in Shadow IT. More so, it focuses on IT governance models that can cope with the increasing need for control against the pressures for more flexibility and swifter innovation. Such effective strategies include implementing Cloud Access Security Broker (CASB) solutions, adopting secure information-sharing models in public clouds, and the proactive management of usage in clouds. Moreover, the paper shows the potential advantages of Shadow IT in terms of innovation and exploration of real user needs and preferences. By recognizing and exploiting the good sides of Shadow IT, organizations can turn the challenges into opportunities for growing and improving their IT strategies. By doing so, all of these challenges help concretely frame Shadow IT in a way that enables it to be handled with a structured and proactive management strategy to achieve a comprehensive approach to maintaining security, compliance, and operational efficiency. The paper underlines the need for changing IT management practices as per the emerging changes brought in by rapid developments in cloud technology and the ever-changing needs of enterprise IT.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;shadow IT</kwd>
        <kwd>public clouds</kwd>
        <kwd>AWS</kwd>
        <kwd>cyber security risks</kwd>
        <kwd>compliance</kwd>
        <kwd>cloud operations</kwd>
        <kwd>automation</kwd>
        <kwd>risk analysis</kwd>
        <kwd>cloud infrastructure 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Shadow IT, defined as the use of information technology
systems, solutions, and services without explicit
organizational approval, has become an increasingly critical
issue with the advent and widespread adoption of cloud
computing. Recent studies have extensively examined the
multifaceted risks and challenges associated with Shadow
IT, particularly within public cloud environments.</p>
      <p>
        For example, Edwards et al. (2019) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] highlighted that
Shadow IT introduces significant security vulnerabilities
due to the lack of oversight and proper security measures.
Their study illustrated how unauthorized cloud services
could lead to severe data breaches and unauthorized access
to sensitive information, posing substantial risks to
organizational data integrity and security. Similarly, Akello
(2021) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] explored the volitional non-malicious insider
threats associated with Shadow IT, especially in the context
of Work-From-Home (WFH) arrangements during the
COVID-19 pandemic. This research emphasized the
heightened risk of data exposure and security breaches due
to the uncontrolled use of cloud-based applications by
employees working remotely.
      </p>
      <p>
        Furthermore, Selvam (2022) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] discussed the efficacy of
Cloud Access Security Broker (CASB) solutions in
mitigating Shadow IT risks. The study demonstrated how
CASBs could help organizations monitor and control cloud
traffic, thereby reducing the unauthorized use of SaaS
0009-0009-2289-0968 (Y. Martseniuk); 0000-0003-3037-8373
(A. Partyka); 0000-0002-8742-8872 (O. Harasymchuk);
0000-0003-06902657 (E. Nyemkova); 0000-0002-8846-332X (M. Karpinski)
© 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).
applications and managing third-party app permissions.
This underscores the need for advanced security solutions
to address the unique challenges posed by Shadow IT in
cloud environments.
      </p>
      <p>
        Moreover, Khan, H., Zahoor, E., Akhtar, S., &amp; Perrin, O.
(2022) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] examined the challenges of secure information
sharing in public clouds, focusing on community-based
secure information sharing models. They argued that while
these models could facilitate controlled collaboration and
data sharing, they also highlighted the inherent risks of
Shadow IT, such as the potential for data leaks and policy
conflicts between different cloud services.
      </p>
      <p>
        Finally, a study by Vakhula, Kurii, and Opirskyy (2024)
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] on security challenges in cloud environments
emphasized the importance of adopting a Security-As-Code
approach. This research indicated that automated security
measures and continuous monitoring could significantly
mitigate the risks associated with unauthorized cloud
services, thereby enhancing overall cloud security and
compliance.
      </p>
      <p>This work aims to explore the complex nature of
Shadow IT within public cloud environments, focusing on
the risks it poses, the impacts it incurs, and the strategies
that can be employed for its effective management. By
synthesizing recent literature and proposing
comprehensive risk mitigation strategies, this study seeks to
provide a robust framework for organizations to manage
Shadow IT more effectively, ensuring data protection,
security, and compliance in cloud computing.</p>
    </sec>
    <sec id="sec-2">
      <title>2. The risks and impacts of shadow</title>
      <p>IT</p>
      <sec id="sec-2-1">
        <title>2.1. Security risks</title>
        <p>
          Shadow IT, by its very nature, introduces significant
security challenges for organizations, as it encompasses the
use of IT resources that have not been vetted or approved
by the official IT department. These rogue applications and
devices may be inherently insecure, potentially packed with
malware, or present exploitable vulnerabilities that hackers
can leverage to gain unauthorized access. The lack of formal
oversight means such devices and software are seldom
updated or patched promptly, if at all, leaving them
perpetually vulnerable to emerging threats. Furthermore,
the improper configuration of shadow IT resources can
inadvertently open up additional security loopholes. The ad
hoc management of sensitive data within the shadow IT
ecosystem also raises serious concerns, as it may not be
backed up or stored with the necessary security measures,
increasing the risk of data loss or exposure. Lastly, the
unchecked use of shadow IT can lead to unmonitored access
to critical and confidential company information,
significantly elevating the risk profile for data breaches and
information theft.
Data Protection and Security Risks. The unauthorized
adoption of cloud services, a hallmark of Shadow IT,
significantly jeopardizes data protection and security. In the
realm of cloud computing, where data is often stored
offpremises, the lack of oversight on these services can lead to
breaches and unauthorized access [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] highlighting how the
allure of convenient cloud solutions tempts users to sidestep
established IT protocols, thus exposing sensitive data to
potential cyber threats. For instance, a multinational
corporation recently faced a severe data breach when
confidential customer information was leaked through an
unapproved cloud storage service. This incident
underscores the tangible risks of Shadow IT in
compromising data integrity and security.
        </p>
        <p>
          Policy Shadowing in Cloud Authorization. Another
critical risk associated with Shadow IT in cloud
environments is policy shadowing. As detailed by
Šedivcová, Lada &amp; Potančok, Martin. [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], higher-level cloud
policies may inadvertently obscure or conflict with
lowerlevel security policies, leading to overlooked vulnerabilities.
An example of this can be seen in organizations where
overarching cloud access policies do not account for the
granular permissions required by different user groups,
thereby creating security loopholes that can be exploited.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Compliance risks</title>
        <p>The presence of shadow IT in organizations, particularly
those operating within tightly regulated fields, poses a
significant risk from a compliance standpoint. Auditors
tasked with ensuring that organizations adhere to specific
regulatory standards may respond unfavorably upon
identifying the use of unauthorized IT resources. This
adverse reaction is due to the potential for such resources to
circumvent established data protection and security
protocols, thereby violating compliance requirements.</p>
        <p>The financial repercussions for organizations can be
severe, with hefty fines imposed as a penalty for the lack of
adequate data controls. These fines serve as a tangible
reflection of the compliance risks associated with shadow
IT, underscoring the necessity for organizations to establish
robust governance frameworks to mitigate the risks
associated with unauthorized IT assets and ensure
regulatory compliance.</p>
        <p>
          Legal Ramifications of Unauthorized Cloud Service
Usage. The use of unapproved cloud services in Shadow IT
scenarios can lead to serious legal consequences for
organizations. As Walterbusch, Fietz, and Teuteberg [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]
discuss, many employees engaging in Shadow IT activities
are often unaware of the legal implications of using
unauthorized cloud services. These can range from breaches
of data privacy laws to violations of regulatory compliance
standards. For instance, a healthcare provider might
unknowingly violate the Health Insurance Portability and
Accountability Act (HIPAA) if sensitive patient data is
stored or transmitted via an unauthorized cloud service.
Such violations can result in substantial fines and damage
to the organization’s reputation.
        </p>
        <p>Compliance Risks in Shadow IT. Compliance risks in
Shadow IT are predominantly related to the failure to meet
industry-specific regulations and standards. In sectors like
finance or healthcare, where data security and privacy are
paramount, the uncontrolled use of cloud services can lead
to non-compliance with standards like Sarbanes-Oxley or
GDPR. This non-compliance is not merely about facing
penalties but also concerns the broader aspect of trust and
reliability in the eyes of customers and stakeholders. A
notable example includes a financial institution that faced
regulatory scrutiny and hefty fines due to its failure to
monitor and control Shadow IT practices, leading to
noncompliance with financial reporting standards.</p>
        <p>Impact on IT Governance. Erosion of Traditional IT
Governance Structures. Shadow IT represents a significant
challenge to traditional IT governance structures. In an
environment where decisions about IT resources and
services are increasingly made outside the purview of the IT
department, the centralized control and strategic planning
of IT resources are undermined. This decentralization not
only disrupts the established IT governance framework but
also leads to inconsistencies in IT standards and policies
across the organization. For instance, different departments
might adopt varying cloud services for similar tasks, leading
to inefficiencies and difficulties in data integration and
management.</p>
        <p>
          Balancing Flexibility and Control. The rise of
Shadow IT also highlights the need for IT governance
models to evolve, balancing the need for control with the
demand for flexibility and rapid innovation. Traditional
governance models, often seen as rigid and slow to respond
to new technology trends, can drive employees towards
Shadow IT as a means to circumvent these limitations.
Therefore, IT governance must adapt to provide guidelines
that accommodate the rapid adoption of new technologies
while maintaining control over security and compliance
standards. For example, some organizations are now
implementing hybrid governance models that allow for the
controlled use of certain cloud services, providing the flexibility
that employees need while maintaining oversight [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>IT Governance as a Strategic Partner. To effectively
manage Shadow IT, IT governance needs to transition from
being a gatekeeper to a strategic partner. This involves
understanding the business needs that drive employees
towards Shadow IT and providing solutions that meet these
needs within the governance framework. By adopting a more
collaborative approach, IT departments can better align their
strategies with business objectives, ensuring that technology
adoption is both effective and secure. Successful cases have
shown that when IT governance is closely integrated with
business strategy, it can lead to innovative solutions that
enhance productivity without compromising security and
compliance.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Cost risks</title>
        <p>The allure of public cloud platforms lies in their ease of
access, scalability, and the perception of cost-effectiveness.
However, when employees or departments bypass official
channels to leverage these services without proper oversight,
the organization faces multifaceted financial risks.</p>
        <p>Economic Redundancy in Public Cloud Usage. The
use of unauthorized public cloud services for functionalities
already provided by sanctioned organizational resources
epitomizes economic redundancy. Organizations find
themselves paying for duplicate services, as official and
shadow public cloud instances run in parallel to fulfill the
same operational needs. This redundancy not only inflates
IT expenditures unnecessarily but also complicates data
management and integration processes, leading to
inefficiencies that further strain organizational resources.</p>
        <p>
          Hidden Costs and Security Implications. Even free or
seemingly low-cost public cloud applications can entail
significant hidden costs. Unauthorized use of public cloud
services elevates the risk of data breaches, as these platforms
might not conform to the organization’s security and
compliance standards. The consequences of such breaches
include not just the direct costs of incident response and data
recovery but also longer-term financial liabilities stemming
from regulatory fines, legal actions, and reputational damage.
The indirect costs associated with the loss of customer trust
and potential business disruptions can far exceed any
perceived savings from using unsanctioned cloud services.
Duplicitous Spending and Operational Risks. Choosing
unauthorized public cloud solutions over approved
organizational options leads to duplicative spending on
cloud services. This practice not only represents an
unnecessary financial outlay but also introduces operational
risks. The lack of coordination between shadow and
sanctioned IT resources can result in data silos, inconsistent
data management practices, and inefficiencies in resource
utilization. Additionally, the unmonitored use of public
cloud services can lead to compliance gaps, exposing the
organization to regulatory scrutiny and potential penalties
and expenses arising from their risks, illustrating the
financial pitfalls of shadow IT beyond mere duplication of
costs [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Interoperability</title>
        <p>Interoperability Challenges in Public Cloud
Infrastructure: Bridging Shadow IT and Official IT
Department Activities. The emergence of shadow IT
within an organization, particularly when it involves public
cloud services, significantly complicates interoperability
between different departments and the official IT
department. This complexity arises due to the adoption of
various programs and cloud services without a coordinated
strategy, leading to a fragmented IT landscape that hampers
data cohesion and operational efficiency.</p>
        <p>Data Harmonization Challenges. The use of
disparate software solutions across departments
necessitates additional processes to ensure data
harmonization. This involves converting and formatting
data into a universally recognized format that can be
seamlessly integrated and utilized across the organization.
Such efforts require not only technical resources but also
time and financial investment, often necessitating the use of
specialized data integration tools or platforms.</p>
        <p>Cloud Service Fragmentation and Associated Costs.
When departments independently select different public
cloud services, the organization faces a multi-cloud
environment where data resides in siloed ecosystems. Each
cloud provider may have its own set of protocols, standards,
and services, complicating data interoperability. Moreover,
transferring data between these services can incur additional
fees, especially if large volumes of data are involved or if
frequent data sharing across platforms is necessary. Cloud
service providers often charge for egress or API calls, which
can accumulate significant costs unbeknownst to the central
IT department.</p>
      </sec>
      <sec id="sec-2-5">
        <title>2.5. The silver lining of shadow IT</title>
        <p>Embracing Innovation and User-Driven Solutions.
Shadow IT is often viewed through a lens of caution due to
the potential risks it poses to data security, compliance, and
financial management. However, this perspective overlooks
the valuable insights and innovative potential that shadow
IT activities can bring to an organization. Recognizing and
harnessing the positive aspects of shadow IT can transform
perceived challenges into opportunities for growth and
improvement in IT strategies.</p>
        <p>Insight into User Needs and Preferences. One of the
most significant benefits of shadow IT is its ability to reveal
the genuine needs and preferences of users within an
organization. When employees turn to unauthorized tools
and services, it often indicates that existing IT solutions do
not fully meet their requirements or that there are gaps in
the available technology offerings. This direct feedback
from the user base provides the IT department with critical
insights into where improvements are needed, allowing for
more user-centric IT planning and development.</p>
        <p>Key Advantage 1: Shadow IT acts as a grassroots
feedback mechanism, highlighting the specific needs and
workflow preferences of different departments. By
analyzing the types of solutions employees seek out on their
own, the IT department can better understand the evolving
technology needs of the organization and adapt its strategy
accordingly.</p>
        <p>Collective Problem-Solving and Innovation. Shadow
IT represents collective problem-solving in action. Employees
engaging in shadow IT are not just bypassing official channels
but are actively seeking solutions to their challenges. This
proactive approach to problem-solving can lead to the
discovery of innovative tools and workflows that the IT
department may not have considered. Many successful IT
programs and tools used today originated from such
grassroots initiatives and were later formally adopted and
integrated into the organization’s official IT infrastructure.</p>
        <p>
          Key Advantage 2: Embracing shadow IT as a form of
collective innovation encourages a culture of creativity and
problem-solving within the organization. It acknowledges
the valuable contributions employees can make to the IT
landscape and leverages their firsthand experience to
improve and innovate IT services and solutions [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-6">
        <title>2.6. Strategic approaches to leveraging shadow IT</title>
        <p>Formalize a Process for Innovation Submission: Create
channels through which employees can propose the tools
and solutions they have found useful, allowing the IT
department to evaluate and potentially adopt these
innovations officially.</p>
        <p>Conduct Regular Needs Assessments: Engage with
users across the organization to understand their
technology needs and frustrations, aiming to reduce the
necessity of seeking shadow IT solutions.</p>
        <p>Foster a Collaborative IT Culture: Develop an IT
department ethos that is seen as approachable and
responsive to user needs, encouraging open dialogue about
new tools and technologies.</p>
        <p>By shifting the narrative around shadow IT from a risk
to be mitigated to an opportunity for user-driven
innovation, organizations can harness the creativity and
ingenuity of their workforce to enhance their IT strategies
and solutions.</p>
        <p>In conclusion, the pervasive use of Shadow IT within
organizations represents a considerable threat to data
security, compliance, and overall IT governance. The
unauthorized adoption of cloud services, policy shadowing,
and inadequate oversight collectively contribute to a
heightened risk environment. Traditional IT governance
structures must evolve to address the complexities
introduced by Shadow IT. As organizations increasingly
rely on cloud computing, the need for robust strategies to
mitigate these risks becomes imperative.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Risk mitigation strategies and reducing shadow IT</title>
      <p>Understanding the scope and impact of shadow IT within an
organization, particularly in the context of public cloud
environments, is crucial for developing effective
management strategies. The ease of access and widespread
adoption of public cloud services has significantly increased
the prevalence of shadow IT, as departments and individuals
can readily procure cloud services without IT department
approval. Both technology solutions and proactive
engagement are essential in gaining insights into these
unauthorized IT activities. By focusing on public cloud
environments, organizations can tailor their management
strategies to address the unique challenges and risks
associated with the unauthorized use of cloud services,
ensuring a comprehensive approach to maintaining
security, compliance, and operational efficiency.</p>
      <sec id="sec-3-1">
        <title>3.1. Automated approach for risk mitigation strategy</title>
        <p>In addressing the risks associated with shadow IT, especially
within public cloud environments, it’s crucial to identify and
prioritize key risk areas. By focusing on these domains,
organizations can develop a more effective strategy for
mitigating the potential threats shadow IT poses. The main
areas of risk include:</p>
        <p>
          Implementing Cloud Access Security Broker (CASB)
Solutions. One of the primary strategies for mitigating the
risks of Shadow IT involves the adoption of Cloud Access
Security Broker (CASB) solutions. CASBs serve as a security
policy enforcement point, placed between cloud service
consumers and cloud service providers to combine and
interject enterprise security policies as cloud-based
resources are accessed. CASBs can provide visibility into
unauthorized cloud applications, helping organizations to
control and monitor cloud traffic. Selvam [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] emphasizes
the effectiveness of CASBs in addressing unauthorized SaaS
applications and managing third-party app permissions,
thereby reducing the risks posed by Shadow IT.
        </p>
        <p>
          Developing Secure Information Sharing Models in
Public Clouds. The creation of secure information-sharing
models within public clouds is another crucial strategy. As
noted by Pandita, U., Katy, H., Kalpana, &amp; Sonawane, D.
[
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], these models are essential for mitigating the risks
associated with Shadow IT in public clouds. By enabling
secure and controlled collaboration, these models ensure
that even when employees use cloud services outside the
formal IT infrastructure, the data remains protected. This
approach promotes a balance between the flexibility of
cloud services and the security requirements of the
organization.
        </p>
        <p>
          Active Management and Control of Cloud Usage.
Proactively managing and controlling cloud usage within an
organization is key to preventing the spread of Shadow IT.
This involves not just the implementation of technological
solutions but also the fostering of a culture where
employees understand the risks associated with
unauthorized cloud services. [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] suggests that IT
departments should work closely with other departments to
identify and approve cloud services that meet both the
•
business and security needs of the organization. This
collaborative approach can significantly reduce the
proliferation of Shadow IT and ensure that cloud services
are used safely and effectively [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Optimizing IT operations for strategic business alignment</title>
        <p>In the dynamic landscape of organizational technology
management, the balance between meeting user demands
and adhering to security, compliance, and budget
constraints presents a significant challenge. Addressing this
challenge requires not just managing IT resources but
transforming the IT department into a strategic partner that
is closely aligned with the business’s needs and goals.</p>
        <p>Streamlining IT Processes. Efficiency in IT operations
is crucial for meeting the fast-paced demands of today’s
business environment. Streamlining IT processes involves
critically evaluating existing procedures to identify
bottlenecks and redundancies. This process includes:</p>
        <sec id="sec-3-2-1">
          <title>Automation: Implementing automation for</title>
          <p>routine tasks, such as software updates, user
account management, and data backups, can
significantly reduce the time and resources
required for these activities, allowing IT staff to
focus on more strategic initiatives.</p>
          <p>Simplifying Approval Processes: Revising
approval workflows to eliminate unnecessary
steps without compromising security or
compliance can expedite the provisioning of IT
resources and services, thereby enhancing user
satisfaction and reducing the temptation to seek
shadow IT solutions.</p>
          <p>
            Frequent Review and Adaptation: Continuously
monitoring and adapting IT processes to address
evolving business needs ensures that the IT
department remains agile and responsive [
            <xref ref-type="bibr" rid="ref16">16</xref>
            ].
          </p>
          <p>Becoming a Business Partner. Transitioning from a
traditional service-oriented role to that of a strategic
business partner involves a proactive approach to
understanding and addressing the technology needs of the
organization:</p>
        </sec>
        <sec id="sec-3-2-2">
          <title>Engagement and Communication: Regularly</title>
          <p>engaging with users and stakeholders to discuss
their challenges and requirements helps build
trust and ensures that IT solutions are closely
aligned with business objectives.</p>
          <p>Education and Awareness: Actively educating
users about available IT resources and solutions
can demystify technology and empower users to
leverage official channels for their IT needs. This
includes workshops, newsletters, and one-on-one
consultations to discuss potential IT solutions.
Collaborative Solution Development: Involving
users in evaluating and selecting new
technologies fosters a sense of ownership and
partnership. Collaborative decision-making ensures that
IT investments are directly linked to enhancing
productivity and achieving business goals.</p>
        </sec>
        <sec id="sec-3-2-3">
          <title>Policy Development: Employees need to be made</title>
          <p>
            aware of the potential security threats and legal
implications of using unauthorized cloud services.
Alongside education, organizations should
develop IT policies that clearly define acceptable
and unacceptable uses of cloud services, thus
providing a framework that guides employee
behavior in a secure and compliant manner [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ].
          </p>
          <p>Impact of an IT-Business Partnership. When the IT
department operates as an integrated business partner, it
achieves a deeper understanding of the organization’s needs
and is better positioned to develop solutions that are both
effective and strategically aligned. This partnership:</p>
        </sec>
        <sec id="sec-3-2-4">
          <title>Reduces the prevalence of shadow IT by providing</title>
          <p>timely and relevant solutions that meet users’
needs.</p>
          <p>Enhances organizational agility by enabling
quicker adaptation to market changes and
technology advancements.</p>
          <p>
            Improves risk management by ensuring that
security and compliance are integral to all IT
solutions and practices [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ].
          </p>
          <p>Transforming IT into a strategic business partner is a
journey that requires commitment, communication, and
continuous improvement. By focusing on streamlining
processes and fostering a collaborative relationship with the
rest of the business, IT can significantly contribute to the
organization’s success and innovation capacity.</p>
          <p>As organizations continue to confront the complexities of
Shadow IT, the implementation of automated solutions
becomes increasingly vital. Automation can provide the
necessary tools to manage and monitor cloud environments
more efficiently, reducing manual oversight and minimizing
human error.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Automation approach for public cloud provisioning which helps exclude shadow IT</title>
      <p>
        The adoption of an automation approach for public cloud
provisioning plays a pivotal role in mitigating the risks
associated with Shadow IT, primarily by streamlining the
deployment of cloud resources and ensuring compliance
with organizational policies. Automating the provisioning
process [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] can significantly enhance efficiency, security,
and governance across public cloud environments, directly
addressing the factors that often lead to the emergence of
Shadow IT. Here are key aspects illustrating the importance
of automation in this context.
      </p>
      <sec id="sec-4-1">
        <title>4.1. Enhancing cloud security and efficiency with self-service automated configuration scanning</title>
        <p>Automated configuration scanning emerges as a pivotal
strategy for maintaining cloud security and operational
efficiency, leveraging a self-service model. This approach
utilizes a central orchestrator, specifically the Rundeck
platform, complemented by a robust toolkit including
•
•
•
•</p>
        <p>
          Ansible for IT automation and Python for scripting [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
These tools are integral to a continuous integration
development process, characterized by rigorous code control
and testing. The orchestrator and its scenario scripts are
meticulously designed to avoid storing any cloud
environment data directly, instead relying on REST API
communications with Rundeck for job execution and status
updates. This architecture is pivotal for scalability, system
availability, and enhanced security [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ].
        </p>
        <p>To bolster the security framework of the orchestrator,
particularly in the context of cloud environment
assessments, integration with HashiCorp Vault is
recommended for secure information storage.</p>
        <p>
          The core of configuration scanning lies in its ability to
identify discrepancies within cloud configurations by
analyzing environment logs (Audit logs, Flow logs). This
analysis is juxtaposed against established cybersecurity
standards such as NIST 800-53, HIPAA, PCI-DSS, SOC, and
ISO, ensuring configurations adhere to the highest security
protocols [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. The implementation of continuous
integration, facilitated by audit and flow logs between cloud
environments and platforms like Prisma Cloud, ensures
ongoing monitoring and compliance. This setup offers an
instantaneous overview of the cloud infrastructure,
enabling swift identification and correction of deviations
from security standards or operational benchmarks. The
adoption of continuous integration not only bolsters
security measures but also enhances the reliability and
efficiency of operations [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ].
        </p>
        <p>Advanced analytics play a crucial role in interpreting
log data, shedding light on usage trends and potential
security vulnerabilities. This proactive stance towards
security is further enriched by the application of machine
learning algorithms, which predict possible issues based on
historical data, allowing for anticipatory risk mitigation
strategies.</p>
        <p>
          Operational flexibility and adaptability are also central
to this system’s design. The modular nature of the scenario
architecture affords quick adaptability and customization,
catering to the dynamic needs of businesses and evolving
technological landscapes. The choice of Ansible and Python
for automation and scripting places the system at the
cutting edge of technology, backed by extensive community
support and regular updates [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ].
        </p>
        <p>In essence, this self-service automated configuration
scanning model achieves continuous control over cloud
configurations, external security perimeters, costs, and
compliance with security standards, underscoring a
commitment to security, operational efficiency, and
adaptability (Fig 2).</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Financial advantages of implementing automated configuration scanning</title>
        <p>
          Operational Efficiency and Cost Savings: The transition
to automated configuration scanning significantly lowers
operational expenses. By streamlining routine checks and
maintenance through automation, the need for manual
oversight is drastically reduced. This efficiency not only
cuts down on the labor and time involved but also redirects
staff efforts towards higher-value activities, resulting in
direct financial benefits [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
Mitigation of Security-Related Financial Risks: Early
identification of vulnerabilities through automated
scanning is crucial in averting security breaches, which can
be financially draining and damaging to reputation. By
proactively addressing these vulnerabilities, organizations
can sidestep the extensive costs associated with data
breaches, making automated scanning a wise investment for
safeguarding assets.
        </p>
        <p>
          Cloud Resource Optimization: Automated scanning
provides insights into the usage of cloud resources,
pinpointing areas of waste or underutilization. Adjusting
these resources accordingly can lead to considerable savings
on cloud spending, while also boosting the efficiency and
performance of cloud-based operations [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ].
        </p>
        <p>Avoidance of Compliance-Related Fines: Keeping up
with compliance requirements is essential to avoid financial
penalties and legal issues. Automated configuration
scanning facilitates ongoing adherence to regulatory
standards, helping organizations avoid the financial pitfalls
of non-compliance and reinforcing their standing in
regulated sectors.</p>
        <p>
          Enhancement of System Reliability: Proper
configuration management through automated scanning
contributes to the reliability and uptime of systems. The cost
implications of downtime—lost revenue and recovery
efforts—are significant, making the stability ensured by
regular scanning a valuable asset in maintaining continuous
business operations [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ].
        </p>
        <p>Strategic Organizational Growth: Beyond immediate
financial gains, automated configuration scanning aligns with
broader strategic objectives, nurturing an organizational
ethos of efficiency, security, and regulatory compliance.
While these advantages may not be immediately quantifiable,
they play a critical role in sustaining the long-term vitality
and competitive edge of the business.</p>
        <p>The financial analysis of automated configuration
scanning underscores its substantial value proposition. The
initial investment in automation technology is quickly offset
by savings in operational expenditures, enhanced security
measures, efficient resource management, reduced
compliance costs, improved system uptime, and strategic
organizational benefits. This analysis highlights automated
configuration scanning as an indispensable tool in
contemporary cloud management frameworks.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Engagement and communication</title>
        <p>Automated Feedback and Communication Systems:
Utilizing automation for regular feedback collection, such as
through automated surveys and quick polls, facilitates
constant dialogue between IT and users. Automated
ticketing systems for IT requests can update users on the
status of their queries or problems in real time, improving
transparency and trust.</p>
        <p>
          Automated Reporting: Dashboards and automated
reports on service usage, incident resolutions, and project
statuses can be shared with stakeholders, keeping everyone
informed and aligned with organizational goals and IT
capabilities [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Education and awareness</title>
        <p>E-Learning Platforms: Automated deployment of
elearning modules tailored to different roles within the
organization helps in systematically educating employees
about the safe and effective use of IT resources, including
cloud services. These platforms can track progress and
adapt learning paths based on user performance and
feedback.</p>
        <p>
          Automated Notifications: Regular, automated
communications such as newsletters, security alerts,
updates on new tools, and best practices help keep all users
informed and aware of the resources available to them and
the importance of following security and compliance
guidelines [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Collaborative solution development</title>
        <p>Self-Service Portals: Automation can power self-service
portals where users can request new tools, access trial
software, and provide feedback on their needs and
experiences. Such platforms can aggregate user requests
and feedback, facilitating data-driven decision-making in
technology selection and implementation.</p>
        <p>
          Automated Prototyping Tools: For development
teams, automated environments for testing and prototyping
new solutions can accelerate the innovation process. These
tools allow for the quick setup and teardown of test
environments, encouraging experimentation and iterative
development with direct user involvement [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-6">
        <title>4.6. Policy development</title>
        <p>Automated Policy Enforcement: Automation tools can
monitor the IT environment to ensure compliance with
established policies, automatically flagging or restricting the
use of unauthorized services. This includes the deployment
of security configurations and compliance standards across
cloud services.</p>
        <p>
          Dynamic Policy Updates: As policies evolve, automated
systems can update users on changes and ensure that all
employees complete acknowledgment or training sessions
related to new policies. This ensures that policy awareness is
consistent and up-to-date [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ].
        </p>
        <p>
          By leveraging automation in these critical areas,
organizations can foster a more engaged, informed, and
collaborative culture regarding IT resource use. This not
only reduces the reliance on Shadow IT by making
authorized channels more accessible and responsive to user
needs but also strengthens compliance and security
postures. Automating engagement, education, solution
development, and policy management processes thus
becomes a cornerstone strategy in aligning IT practices with
business objectives and user requirements [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ].
1.
2.
3.
4.
1.
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Analysis of results after implementation of the proposed approach</title>
      <p>This comprehensive case study showcases a strategic and
structured approach to managing a multi-cloud
infrastructure (AWS, Azure, and GCP) that began in late
2020 and continued through 2023. Here is an overarching
summary of the project’s progression, achievements, and
significant milestones:</p>
      <p>End of 2020: The infrastructure comprised 230 known
accounts, setting the baseline for the forthcoming
enhancements.</p>
      <p>2021 Timeline and Strategic Initiatives:</p>
      <sec id="sec-5-1">
        <title>Audit and Monitoring: Initiation of active audit processes and implementation of monitoring systems on all discovered accounts to ensure full visibility and control.</title>
        <p>Compliance Enhancement: Rigorous correction
of compliance issues according to NIST 800-53
rev.4 standards, raising the security and regulatory
standards across the board (Fig. 3).</p>
        <p>Discovery and Management: Identification of
over 120 previously unknown cloud accounts,
integrating them into the organization’s formal
management system.</p>
        <p>Account Optimization: Closure of more than 30
obsolete accounts, streamlining operations and
eliminating unnecessary security risks.</p>
      </sec>
      <sec id="sec-5-2">
        <title>Growth in Infrastructure: Systematic increase in</title>
        <p>the number of cloud accounts to 447, reflecting an
expanded and more robust infrastructure.</p>
        <p>Security and Compliance: Continued
improvements in security measures leading to an
advanced and stable infrastructure adept at risk
analysis and incident response.
2022–2023: Expansion and Stabilization:
End of 2023. Key Insights and Achievements:</p>
        <p>Total resources managed: 35,493.</p>
        <p>Vulnerability levels: Zero critical and high
vulnerabilities; 954 medium; 1,870 low; 3,667
informal (Fig. 4).</p>
        <p>Compliance level: An increase from 67% to 82%,
indicating enhanced governance and adherence to
high standards.</p>
        <p>Security Improvement: The elimination of
critical and high-level vulnerabilities by the end of
2023 is a testament to the effective security</p>
        <p>management and mitigation strategies employed,
ensuring a highly secure cloud environment.</p>
        <p>Compliance Increase: The significant rise in the
compliance level from 67% to 82% within three
years underscores the successful enhancement in
governance and adherence to stringent security
standards.</p>
        <p>Account Management: The proactive
management of both known and previously
unknown accounts illustrates a decisive action
against shadow IT practices, improving control
and visibility across the cloud environment.
This case study exemplifies the importance of a structured
and proactive approach to cloud infrastructure
management. Through regular audits, continuous
monitoring, and a strong focus on compliance and security,
the organization not only improved its operational security
but also aligned its cloud resources more closely with
organizational goals. The strategic management of cloud
accounts, including the identification and elimination of
unnecessary or redundant accounts, played a crucial role in
enhancing cost efficiency and resource management.
Overall, this journey reflects a model for effective cloud
governance that can serve as a benchmark for similar
enterprises aiming to secure and optimize their cloud
environments.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>In conclusion, the strategic application of automation across
various facets of IT management—ranging from user
engagement and education to collaborative solution
development and policy enforcement—emerges as a pivotal
solution to the pervasive challenge of Shadow IT,
particularly within public cloud environments. By
harnessing automation, organizations can significantly
enhance their IT governance, ensuring that IT practices are
not only aligned with business objectives but also
responsive to user needs, thereby reducing the inclination
towards unauthorized IT solutions.</p>
      <p>The deployment of automated tools and processes fosters a
culture of transparency, efficiency, and security, which is
essential for mitigating the risks associated with Shadow IT.
These risks, including security vulnerabilities, legal
ramifications, and compliance breaches, pose significant
threats to the integrity and operational efficacy of cloud
computing frameworks.</p>
      <p>Furthermore, proactive engagement strategies
facilitated by automation—such as continuous feedback
mechanisms, personalized educational programs, and
inclusive technology evaluation platforms—encourage a
more informed and collaborative approach to IT resource
utilization. This not only enhances the user experience by
making approved IT channels more accessible but also
aligns IT initiatives with the dynamic requirements of the
modern enterprise.</p>
      <p>Ultimately, addressing the challenges of Shadow IT
through automation underscores a commitment to
maintaining a secure, efficient, and adaptable cloud
environment. It highlights the necessity of evolving IT
management strategies to keep pace with the rapid
advancements in cloud technology and the changing
landscape of enterprise IT needs. Adopting these automated
approaches signifies a decisive step towards empowering
organizations to leverage the full potential of cloud
computing, ensuring that it serves as a catalyst for
innovation and growth rather than a source of risk and
inefficiency.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K.</given-names>
            <surname>Edwards</surname>
          </string-name>
          , Expected and
          <string-name>
            <given-names>Realized</given-names>
            <surname>Costs</surname>
          </string-name>
          and
          <article-title>Benefits when Implementing Product Configuration Systems, Mass Customization for Personalized Communication Environments: Integrating Human Factors (</article-title>
          <year>2010</year>
          )
          <fpage>216</fpage>
          -
          <lpage>231</lpage>
          . doi:
          <volume>10</volume>
          .4018/978-1-
          <fpage>60566</fpage>
          -260-2.
          <year>ch012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Akello</surname>
          </string-name>
          ,
          <article-title>Volitional Non-Malicious Insider Threats: At The Intersection of COVID-19, WFH</article-title>
          and
          <string-name>
            <given-names>CloudFacilitated</given-names>
            <surname>Shadow-Apps</surname>
          </string-name>
          ,
          <source>27th Annual Americas Conference on Information Systems</source>
          ,
          <string-name>
            <surname>AMCIS</surname>
          </string-name>
          <year>2021</year>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Selvam</surname>
          </string-name>
          , (
          <year>2022</year>
          ).
          <article-title>Secure Cloud Services by Integrating CASB based Approach</article-title>
          ,
          <source>Int. J. Sci. Res. Eng. Manag</source>
          .
          <volume>6</volume>
          (
          <issue>7</issue>
          ) (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .55041/IJSREM15210.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>H.</given-names>
            <surname>Khan</surname>
          </string-name>
          , et al.,
          <article-title>A Blockchain-Based Approach for Secure Data Migration from the Cloud to the Decentralized Storage Systems</article-title>
          ,
          <source>Int. J. Web Services Res</source>
          .
          <volume>19</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          . doi:
          <volume>10</volume>
          .4018/ijwsr. 296688.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.</given-names>
            <surname>Vakhula</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Opirskyy</surname>
          </string-name>
          ,
          <string-name>
            <surname>O. Mykhaylova,</surname>
          </string-name>
          <article-title>Research on Security Challenges in Cloud Environments and Solutions based on the “Security-as-Code” Approach, in: Cybersecurity Providing in Information and Telecommunication Systems-II, vol</article-title>
          .
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>55</fpage>
          -
          <lpage>69</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>I. Kirin</given-names>
            ,
            <surname>Shadow</surname>
          </string-name>
          <string-name>
            <given-names>IT</given-names>
            : Data Protection and Cloud
            <surname>Security</surname>
          </string-name>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .2139/ssrn.3020880.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L.</given-names>
            <surname>Šedivcová</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Potančok</surname>
          </string-name>
          ,
          <article-title>Shadow IT Management Concept for Public Sector (</article-title>
          <year>2019</year>
          )
          <fpage>65</fpage>
          -
          <lpage>73</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -37632-
          <issue>1</issue>
          _
          <fpage>6</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Walterbusch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fietz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Teuteberg</surname>
          </string-name>
          , Missing Cloud Security Awareness:
          <article-title>Investigating Risk Exposure in Shadow IT</article-title>
          , J. Enterprise Inf. Manag.
          <volume>30</volume>
          (
          <year>2017</year>
          ) doi: 10.1108/JEIM-07-2015-0066.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Taylor</surname>
          </string-name>
          , Everything You Need to Know About Shadow IT,
          <string-name>
            <surname>Bluecat Networks</surname>
          </string-name>
          (
          <year>2021</year>
          ). URL: https://bluecatnetworks. com/blog/everything-youneed
          <article-title>-to-know-about-shadow-it/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Silic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Back</surname>
          </string-name>
          ,
          <article-title>Shadow it-A View from Behind the Curtain, Inf</article-title>
          . Syst. Econom. eJ. (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Walters</surname>
          </string-name>
          , Bringing IT Out of the Shadows, Netw. Secur.
          <year>2013</year>
          (
          <article-title>4) (</article-title>
          <year>2013</year>
          )
          <fpage>5</fpage>
          -
          <lpage>11</lpage>
          . doi:
          <volume>10</volume>
          .1016/S1353-
          <volume>4858</volume>
          (
          <issue>13</issue>
          )700
          <fpage>49</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zeng</surname>
          </string-name>
          , et al.,
          <article-title>Flow Context and Host Behavior Based Shadowsocks's Traffic Identification</article-title>
          , IEEE Access (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>U.</given-names>
            <surname>Pandita</surname>
          </string-name>
          , et al.,
          <source>Effective Management of Proofs Of Log, Int. J. Adv. Res. Innov. Ideas Educ</source>
          .
          <volume>3</volume>
          (
          <issue>3</issue>
          ) (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Shevchuk</surname>
          </string-name>
          , et al.,
          <source>Designing Secured Services for Authentication</source>
          , Authorization, and
          <article-title>Accounting of Users, in: Cybersecurity Providing in Information and Telecommunication Systems-II, vol</article-title>
          .
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>217</fpage>
          -
          <lpage>225</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Silic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Silic</surname>
          </string-name>
          , G. Oblakovic, Influence of Shadow IT on Innovation in Organizations,
          <source>Complex Systems Informatics and Modeling Quarterly</source>
          (
          <year>2016</year>
          )
          <fpage>68</fpage>
          -
          <lpage>80</lpage>
          . doi:
          <volume>10</volume>
          .7250/csimq. 2016-
          <volume>8</volume>
          .
          <fpage>06</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>H.</given-names>
            <surname>Fujinoki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dehkordi</surname>
          </string-name>
          , Split Clouds:
          <article-title>New Security Architecture for Protecting User Information from Cloud Insiders-Designs, Implementation, and Performance Evaluations (</article-title>
          <year>2012</year>
          )
          <fpage>824</fpage>
          -
          <lpage>829</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>H.</given-names>
            <surname>Rajavaram</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Balasubramanian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rajula</surname>
          </string-name>
          ,
          <article-title>Automation of Microservices Application Deployment Made Easy By Rundeck and Kubernetes</article-title>
          .
          <source>IEEE International Conference on Electronics, Computing and Communication Technologies</source>
          (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          . doi:
          <volume>10</volume>
          .1109/CONECCT47791.
          <year>2019</year>
          .
          <volume>9012811</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>T.</given-names>
            <surname>Kenaza</surname>
          </string-name>
          , et al.,
          <string-name>
            <given-names>A</given-names>
            <surname>Secure</surname>
          </string-name>
          and
          <article-title>Interoperable Architecture for Blockchain/IPFS Assisted Electronic Health Record Access Control and Sharing (</article-title>
          <year>2023</year>
          ) doi: 10.21203/rs.3.rs-
          <volume>3209163</volume>
          /v1.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>K.</given-names>
            <surname>Murakami</surname>
          </string-name>
          , et al.,
          <article-title>A Cloud Architecture for Protecting Guest's Information from Malicious Operators with Memory Management (</article-title>
          <year>2014</year>
          )
          <fpage>155</fpage>
          -
          <lpage>158</lpage>
          . doi:
          <volume>10</volume>
          .1145/2557547.2557585.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Martseniuk</surname>
          </string-name>
          , et al.,
          <source>Automated Conformity Verification Concept for Cloud Security, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>25</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Proxy Provable Data Possession in Public Clouds</article-title>
          .
          <source>Services Computing, IEEE Transactions 6</source>
          (
          <year>2013</year>
          )
          <fpage>551</fpage>
          -
          <lpage>559</lpage>
          . doi:
          <volume>10</volume>
          .1109/TSC.
          <year>2012</year>
          .
          <volume>35</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>V.</given-names>
            <surname>Susukailo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Opirsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yaremko</surname>
          </string-name>
          ,
          <article-title>Methodology of ISMS Establishment Against Modern Cybersecurity Threats, Future Intent-Based Networking</article-title>
          , LNEE
          <volume>831</volume>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -92435-5_
          <fpage>15</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>O.</given-names>
            <surname>Deineka</surname>
          </string-name>
          , et al.,
          <article-title>Designing Data Classification and Secure Store Policy According to SOC 2 Type II</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>398</fpage>
          -
          <lpage>409</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>V.</given-names>
            <surname>Rajaraman</surname>
          </string-name>
          , Cloud Computing,
          <source>Resonance</source>
          <volume>19</volume>
          (
          <year>2014</year>
          )
          <fpage>242</fpage>
          -
          <lpage>258</lpage>
          . doi:
          <volume>10</volume>
          .1007/s12045-014-0030-1.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <article-title>An Assessment of the National Institute of Standards and Technology Center for Neutron Research</article-title>
          , Technology, Panel &amp; Programs, Committee &amp; Board, Laboratory &amp; Sciences,
          <string-name>
            <given-names>Division</given-names>
            &amp; Medicine,
            <surname>National</surname>
          </string-name>
          (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .17226/21878.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>R.</given-names>
            <surname>Buyya</surname>
          </string-name>
          , et al.,
          <source>Cloud Computing and Emerging IT Platforms: Vision</source>
          , Hype, and
          <article-title>Reality for Delivering Computing as the 5th Utility, Future Gener</article-title>
          .
          <source>Comput. Syst</source>
          .
          <volume>25</volume>
          (
          <year>2009</year>
          )
          <fpage>599</fpage>
          -
          <lpage>616</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.future.
          <year>2008</year>
          .
          <volume>12</volume>
          .001.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>S.</given-names>
            <surname>Çevik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ustundag</surname>
          </string-name>
          , Smart and
          <string-name>
            <given-names>Connected</given-names>
            <surname>Product Business Models</surname>
          </string-name>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -57870-
          <issue>5</issue>
          _
          <fpage>2</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>R.</given-names>
            <surname>Clark</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mayer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Thalheimer</surname>
          </string-name>
          ,
          <article-title>E-Learning and the Science of Instruction: Proven Guidelines for Consumers and Designers of Multimedia Learning</article-title>
          ,
          <source>Performance Improvement</source>
          <volume>42</volume>
          (
          <year>2003</year>
          ). doi:
          <volume>10</volume>
          .1002/pfi.4930420510.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>A.</given-names>
            <surname>Nordby</surname>
          </string-name>
          , et al.,
          <source>System Thinking in Gamification, SN Comput. Sci. 5</source>
          (
          <year>2024</year>
          ).
          <source>doi: 10.1007/s42979-023-02579-2.</source>
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>F.</given-names>
            <surname>Yaseen</surname>
          </string-name>
          ,
          <source>Chapter 2 2. Literature Review 2.1. Information Security Policy Availability and Compliance Literature</source>
          . (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>V.</given-names>
            <surname>Khoma</surname>
          </string-name>
          , et al.,
          <article-title>Comprehensive Approach for Developing an Enterprise Cloud Infrastructure</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>201</fpage>
          -
          <lpage>215</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yevseiev</surname>
          </string-name>
          , et al.,
          <article-title>Models of Socio-Cyber-Physical Systems Security: monograph</article-title>
          , PC Technology Center (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .15587/
          <fpage>978</fpage>
          -617-7319-72-5.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>