=Paper=
{{Paper
|id=Vol-3800/paper3
|storemode=property
|title=Shadow IT risk analysis in public cloud infrastructure
|pdfUrl=https://ceur-ws.org/Vol-3800/paper3.pdf
|volume=Vol-3800
|authors=Yevhenii Martseniuk,Andrii Partyka,Oleh Harasymchuk,Elena Nyemkova,Mikolaj Karpinski
|dblpUrl=https://dblp.org/rec/conf/csdp/MartseniukPHNK24
}}
==Shadow IT risk analysis in public cloud infrastructure==
Shadow IT risk analysis in public cloud infrastructure⋆
Yevhenii Martseniuk1,*,†, Andrii Partyka1,†, Oleh Harasymchuk1,†, Elena Nyemkova1,†
and Mikolaj Karpinski2,†
1
Lviv Polytechnic National University, 12 Stepana Bandery str., 79000 Lviv, Ukraine
2
University of the National Education Commission, 2 Podchorazych str., 30-084 Krakow, Polska
Abstract
Shadow IT, where IT systems and services are used without explicit approval from an organizational IT
department, has risen to be an important issue for cloud computing. Its growth emanates from the growing
capabilities and accessibility of cloud services that often circumvent the IT pre-established policies and
governance mechanisms. This paper aims to research and investigate the complex nature of Shadow IT
within public cloud environments, focusing on the risks it poses, its effects, and the strategies to manage it
effectively. These risks are varied and significant, with great concern over data protection and security.
Thus, unauthorized use of cloud services exposes organizational data to vulnerabilities. Furthermore, cloud
environments could face a situation of policy shadowing in which higher-level policies shadow more
granular but potentially conflicting policies, therefore leading to unnoticed security gaps. There are also
great threats associated with legal and compliance risks, through which companies might have to incur
huge penalties because of unauthorized cloud service usage. This research explains the various types of
Shadow IT: from unauthorized software and hardware to unapproved cloud computing services and
unsanctioned development activities. Additionally, the paper will detail the major Shadow IT risks related
to security, compliance, cost, and interoperability problems. It further deals with strategic management
towards the mitigation of risks involved in Shadow IT. More so, it focuses on IT governance models that
can cope with the increasing need for control against the pressures for more flexibility and swifter
innovation. Such effective strategies include implementing Cloud Access Security Broker (CASB) solutions,
adopting secure information-sharing models in public clouds, and the proactive management of usage in
clouds. Moreover, the paper shows the potential advantages of Shadow IT in terms of innovation and
exploration of real user needs and preferences. By recognizing and exploiting the good sides of Shadow IT,
organizations can turn the challenges into opportunities for growing and improving their IT strategies. By
doing so, all of these challenges help concretely frame Shadow IT in a way that enables it to be handled
with a structured and proactive management strategy to achieve a comprehensive approach to maintaining
security, compliance, and operational efficiency. The paper underlines the need for changing IT
management practices as per the emerging changes brought in by rapid developments in cloud technology
and the ever-changing needs of enterprise IT.
Keywords
shadow IT, public clouds, AWS, cyber security risks, compliance, cloud operations, automation, risk
analysis, cloud infrastructure 1
1. Introduction to sensitive information, posing substantial risks to
organizational data integrity and security. Similarly, Akello
Shadow IT, defined as the use of information technology (2021) [2] explored the volitional non-malicious insider
systems, solutions, and services without explicit threats associated with Shadow IT, especially in the context
organizational approval, has become an increasingly critical of Work-From-Home (WFH) arrangements during the
issue with the advent and widespread adoption of cloud COVID-19 pandemic. This research emphasized the
computing. Recent studies have extensively examined the heightened risk of data exposure and security breaches due
multifaceted risks and challenges associated with Shadow to the uncontrolled use of cloud-based applications by
IT, particularly within public cloud environments. employees working remotely.
For example, Edwards et al. (2019) [1] highlighted that Furthermore, Selvam (2022) [3] discussed the efficacy of
Shadow IT introduces significant security vulnerabilities Cloud Access Security Broker (CASB) solutions in
due to the lack of oversight and proper security measures. mitigating Shadow IT risks. The study demonstrated how
Their study illustrated how unauthorized cloud services CASBs could help organizations monitor and control cloud
could lead to severe data breaches and unauthorized access traffic, thereby reducing the unauthorized use of SaaS
CSDP-2024: Cyber Security and Data Protection, June 30, 2024, Lviv, 0009-0009-2289-0968 (Y. Martseniuk); 0000-0003-3037-8373
Ukraine (A. Partyka); 0000-0002-8742-8872 (O. Harasymchuk); 0000-0003-0690-
∗ Corresponding author. 2657 (E. Nyemkova); 0000-0002-8846-332X (M. Karpinski)
†
These authors contributed equally.
© 2024 Copyright for this paper by its authors. Use permitted under
yevhenii.v.martseniuk@lpnu.ua (Y. Martseniuk); Creative Commons License Attribution 4.0 International (CC BY 4.0).
andrii.i.partyka@lpnu.ua (A. Partyka); garasymchuk@ukr.net (O.
Harasymchuk); garasymchuk@ukr.net (E. Nyemkova);
garasymchuk@ukr.net (M. Karpinski)
CEUR
Workshop
ceur-ws.org
ISSN 1613-0073
22
Proceedings
applications and managing third-party app permissions. Shadow IT more effectively, ensuring data protection,
This underscores the need for advanced security solutions security, and compliance in cloud computing.
to address the unique challenges posed by Shadow IT in
cloud environments. 2. The risks and impacts of shadow
Moreover, Khan, H., Zahoor, E., Akhtar, S., & Perrin, O.
(2022) [4] examined the challenges of secure information
IT
sharing in public clouds, focusing on community-based 2.1. Security risks
secure information sharing models. They argued that while
these models could facilitate controlled collaboration and Shadow IT, by its very nature, introduces significant
data sharing, they also highlighted the inherent risks of security challenges for organizations, as it encompasses the
use of IT resources that have not been vetted or approved
Shadow IT, such as the potential for data leaks and policy
by the official IT department. These rogue applications and
conflicts between different cloud services.
devices may be inherently insecure, potentially packed with
Finally, a study by Vakhula, Kurii, and Opirskyy (2024)
malware, or present exploitable vulnerabilities that hackers
[5] on security challenges in cloud environments
can leverage to gain unauthorized access. The lack of formal
emphasized the importance of adopting a Security-As-Code
oversight means such devices and software are seldom
approach. This research indicated that automated security
updated or patched promptly, if at all, leaving them
measures and continuous monitoring could significantly
perpetually vulnerable to emerging threats. Furthermore,
mitigate the risks associated with unauthorized cloud
the improper configuration of shadow IT resources can
services, thereby enhancing overall cloud security and
inadvertently open up additional security loopholes. The ad
compliance.
hoc management of sensitive data within the shadow IT
This work aims to explore the complex nature of
ecosystem also raises serious concerns, as it may not be
Shadow IT within public cloud environments, focusing on
backed up or stored with the necessary security measures,
the risks it poses, the impacts it incurs, and the strategies
increasing the risk of data loss or exposure. Lastly, the
that can be employed for its effective management. By
unchecked use of shadow IT can lead to unmonitored access
synthesizing recent literature and proposing
to critical and confidential company information,
comprehensive risk mitigation strategies, this study seeks to
provide a robust framework for organizations to manage significantly elevating the risk profile for data breaches and
information theft.
Figure 1: Applications from Shadow IT perspective
Data Protection and Security Risks. The unauthorized corporation recently faced a severe data breach when
adoption of cloud services, a hallmark of Shadow IT, confidential customer information was leaked through an
significantly jeopardizes data protection and security. In the unapproved cloud storage service. This incident
realm of cloud computing, where data is often stored off- underscores the tangible risks of Shadow IT in
premises, the lack of oversight on these services can lead to compromising data integrity and security.
breaches and unauthorized access [6] highlighting how the Policy Shadowing in Cloud Authorization. Another
allure of convenient cloud solutions tempts users to sidestep critical risk associated with Shadow IT in cloud
established IT protocols, thus exposing sensitive data to environments is policy shadowing. As detailed by
potential cyber threats. For instance, a multinational Šedivcová, Lada & Potančok, Martin. [7], higher-level cloud
23
policies may inadvertently obscure or conflict with lower- across the organization. For instance, different departments
level security policies, leading to overlooked vulnerabilities. might adopt varying cloud services for similar tasks, leading
An example of this can be seen in organizations where to inefficiencies and difficulties in data integration and
overarching cloud access policies do not account for the management.
granular permissions required by different user groups, Balancing Flexibility and Control. The rise of
thereby creating security loopholes that can be exploited. Shadow IT also highlights the need for IT governance
models to evolve, balancing the need for control with the
2.2. Compliance risks demand for flexibility and rapid innovation. Traditional
governance models, often seen as rigid and slow to respond
The presence of shadow IT in organizations, particularly
to new technology trends, can drive employees towards
those operating within tightly regulated fields, poses a
Shadow IT as a means to circumvent these limitations.
significant risk from a compliance standpoint. Auditors
Therefore, IT governance must adapt to provide guidelines
tasked with ensuring that organizations adhere to specific
that accommodate the rapid adoption of new technologies
regulatory standards may respond unfavorably upon
while maintaining control over security and compliance
identifying the use of unauthorized IT resources. This
standards. For example, some organizations are now
adverse reaction is due to the potential for such resources to
implementing hybrid governance models that allow for the
circumvent established data protection and security
controlled use of certain cloud services, providing the flexibility
protocols, thereby violating compliance requirements.
that employees need while maintaining oversight [9].
The financial repercussions for organizations can be
IT Governance as a Strategic Partner. To effectively
severe, with hefty fines imposed as a penalty for the lack of
manage Shadow IT, IT governance needs to transition from
adequate data controls. These fines serve as a tangible
being a gatekeeper to a strategic partner. This involves
reflection of the compliance risks associated with shadow
understanding the business needs that drive employees
IT, underscoring the necessity for organizations to establish
towards Shadow IT and providing solutions that meet these
robust governance frameworks to mitigate the risks
needs within the governance framework. By adopting a more
associated with unauthorized IT assets and ensure
collaborative approach, IT departments can better align their
regulatory compliance.
strategies with business objectives, ensuring that technology
Legal Ramifications of Unauthorized Cloud Service
adoption is both effective and secure. Successful cases have
Usage. The use of unapproved cloud services in Shadow IT
shown that when IT governance is closely integrated with
scenarios can lead to serious legal consequences for
business strategy, it can lead to innovative solutions that
organizations. As Walterbusch, Fietz, and Teuteberg [8]
enhance productivity without compromising security and
discuss, many employees engaging in Shadow IT activities
compliance.
are often unaware of the legal implications of using
unauthorized cloud services. These can range from breaches
of data privacy laws to violations of regulatory compliance
2.3. Cost risks
standards. For instance, a healthcare provider might The allure of public cloud platforms lies in their ease of
unknowingly violate the Health Insurance Portability and access, scalability, and the perception of cost-effectiveness.
Accountability Act (HIPAA) if sensitive patient data is However, when employees or departments bypass official
stored or transmitted via an unauthorized cloud service. channels to leverage these services without proper oversight,
Such violations can result in substantial fines and damage the organization faces multifaceted financial risks.
to the organization’s reputation. Economic Redundancy in Public Cloud Usage. The
Compliance Risks in Shadow IT. Compliance risks in use of unauthorized public cloud services for functionalities
Shadow IT are predominantly related to the failure to meet already provided by sanctioned organizational resources
industry-specific regulations and standards. In sectors like epitomizes economic redundancy. Organizations find
finance or healthcare, where data security and privacy are themselves paying for duplicate services, as official and
paramount, the uncontrolled use of cloud services can lead shadow public cloud instances run in parallel to fulfill the
to non-compliance with standards like Sarbanes-Oxley or same operational needs. This redundancy not only inflates
GDPR. This non-compliance is not merely about facing IT expenditures unnecessarily but also complicates data
penalties but also concerns the broader aspect of trust and management and integration processes, leading to
reliability in the eyes of customers and stakeholders. A inefficiencies that further strain organizational resources.
notable example includes a financial institution that faced Hidden Costs and Security Implications. Even free or
regulatory scrutiny and hefty fines due to its failure to seemingly low-cost public cloud applications can entail
monitor and control Shadow IT practices, leading to non- significant hidden costs. Unauthorized use of public cloud
compliance with financial reporting standards. services elevates the risk of data breaches, as these platforms
Impact on IT Governance. Erosion of Traditional IT might not conform to the organization’s security and
Governance Structures. Shadow IT represents a significant compliance standards. The consequences of such breaches
challenge to traditional IT governance structures. In an include not just the direct costs of incident response and data
environment where decisions about IT resources and recovery but also longer-term financial liabilities stemming
services are increasingly made outside the purview of the IT from regulatory fines, legal actions, and reputational damage.
department, the centralized control and strategic planning The indirect costs associated with the loss of customer trust
of IT resources are undermined. This decentralization not and potential business disruptions can far exceed any
only disrupts the established IT governance framework but perceived savings from using unsanctioned cloud services.
also leads to inconsistencies in IT standards and policies
24
Duplicitous Spending and Operational Risks. Choosing organization. When employees turn to unauthorized tools
unauthorized public cloud solutions over approved and services, it often indicates that existing IT solutions do
organizational options leads to duplicative spending on not fully meet their requirements or that there are gaps in
cloud services. This practice not only represents an the available technology offerings. This direct feedback
unnecessary financial outlay but also introduces operational from the user base provides the IT department with critical
risks. The lack of coordination between shadow and insights into where improvements are needed, allowing for
sanctioned IT resources can result in data silos, inconsistent more user-centric IT planning and development.
data management practices, and inefficiencies in resource Key Advantage 1: Shadow IT acts as a grassroots
utilization. Additionally, the unmonitored use of public feedback mechanism, highlighting the specific needs and
cloud services can lead to compliance gaps, exposing the workflow preferences of different departments. By
organization to regulatory scrutiny and potential penalties analyzing the types of solutions employees seek out on their
and expenses arising from their risks, illustrating the own, the IT department can better understand the evolving
financial pitfalls of shadow IT beyond mere duplication of technology needs of the organization and adapt its strategy
costs [10]. accordingly.
Collective Problem-Solving and Innovation. Shadow
2.4. Interoperability IT represents collective problem-solving in action. Employees
engaging in shadow IT are not just bypassing official channels
Interoperability Challenges in Public Cloud
but are actively seeking solutions to their challenges. This
Infrastructure: Bridging Shadow IT and Official IT
proactive approach to problem-solving can lead to the
Department Activities. The emergence of shadow IT
discovery of innovative tools and workflows that the IT
within an organization, particularly when it involves public
department may not have considered. Many successful IT
cloud services, significantly complicates interoperability
programs and tools used today originated from such
between different departments and the official IT
grassroots initiatives and were later formally adopted and
department. This complexity arises due to the adoption of
integrated into the organization’s official IT infrastructure.
various programs and cloud services without a coordinated
Key Advantage 2: Embracing shadow IT as a form of
strategy, leading to a fragmented IT landscape that hampers
collective innovation encourages a culture of creativity and
data cohesion and operational efficiency.
problem-solving within the organization. It acknowledges
Data Harmonization Challenges. The use of
the valuable contributions employees can make to the IT
disparate software solutions across departments
landscape and leverages their firsthand experience to
necessitates additional processes to ensure data
improve and innovate IT services and solutions [11].
harmonization. This involves converting and formatting
data into a universally recognized format that can be
seamlessly integrated and utilized across the organization.
2.6. Strategic approaches to leveraging
Such efforts require not only technical resources but also shadow IT
time and financial investment, often necessitating the use of Formalize a Process for Innovation Submission: Create
specialized data integration tools or platforms. channels through which employees can propose the tools
Cloud Service Fragmentation and Associated Costs. and solutions they have found useful, allowing the IT
When departments independently select different public department to evaluate and potentially adopt these
cloud services, the organization faces a multi-cloud innovations officially.
environment where data resides in siloed ecosystems. Each Conduct Regular Needs Assessments: Engage with
cloud provider may have its own set of protocols, standards, users across the organization to understand their
and services, complicating data interoperability. Moreover, technology needs and frustrations, aiming to reduce the
transferring data between these services can incur additional necessity of seeking shadow IT solutions.
fees, especially if large volumes of data are involved or if Foster a Collaborative IT Culture: Develop an IT
frequent data sharing across platforms is necessary. Cloud department ethos that is seen as approachable and
service providers often charge for egress or API calls, which responsive to user needs, encouraging open dialogue about
can accumulate significant costs unbeknownst to the central new tools and technologies.
IT department. By shifting the narrative around shadow IT from a risk
to be mitigated to an opportunity for user-driven
2.5. The silver lining of shadow IT innovation, organizations can harness the creativity and
Embracing Innovation and User-Driven Solutions. ingenuity of their workforce to enhance their IT strategies
Shadow IT is often viewed through a lens of caution due to and solutions.
the potential risks it poses to data security, compliance, and In conclusion, the pervasive use of Shadow IT within
financial management. However, this perspective overlooks organizations represents a considerable threat to data
the valuable insights and innovative potential that shadow security, compliance, and overall IT governance. The
IT activities can bring to an organization. Recognizing and unauthorized adoption of cloud services, policy shadowing,
harnessing the positive aspects of shadow IT can transform and inadequate oversight collectively contribute to a
perceived challenges into opportunities for growth and heightened risk environment. Traditional IT governance
improvement in IT strategies. structures must evolve to address the complexities
Insight into User Needs and Preferences. One of the introduced by Shadow IT. As organizations increasingly
most significant benefits of shadow IT is its ability to reveal rely on cloud computing, the need for robust strategies to
the genuine needs and preferences of users within an mitigate these risks becomes imperative.
25
3. Risk mitigation strategies and business and security needs of the organization. This
collaborative approach can significantly reduce the
reducing shadow IT proliferation of Shadow IT and ensure that cloud services
Understanding the scope and impact of shadow IT within an are used safely and effectively [15].
organization, particularly in the context of public cloud
environments, is crucial for developing effective 3.2. Optimizing IT operations for strategic
management strategies. The ease of access and widespread business alignment
adoption of public cloud services has significantly increased In the dynamic landscape of organizational technology
the prevalence of shadow IT, as departments and individuals management, the balance between meeting user demands
can readily procure cloud services without IT department and adhering to security, compliance, and budget
approval. Both technology solutions and proactive constraints presents a significant challenge. Addressing this
engagement are essential in gaining insights into these challenge requires not just managing IT resources but
unauthorized IT activities. By focusing on public cloud transforming the IT department into a strategic partner that
environments, organizations can tailor their management is closely aligned with the business’s needs and goals.
strategies to address the unique challenges and risks Streamlining IT Processes. Efficiency in IT operations
associated with the unauthorized use of cloud services, is crucial for meeting the fast-paced demands of today’s
ensuring a comprehensive approach to maintaining business environment. Streamlining IT processes involves
security, compliance, and operational efficiency. critically evaluating existing procedures to identify
bottlenecks and redundancies. This process includes:
3.1. Automated approach for risk
mitigation strategy • Automation: Implementing automation for
In addressing the risks associated with shadow IT, especially routine tasks, such as software updates, user
within public cloud environments, it’s crucial to identify and account management, and data backups, can
prioritize key risk areas. By focusing on these domains, significantly reduce the time and resources
organizations can develop a more effective strategy for required for these activities, allowing IT staff to
mitigating the potential threats shadow IT poses. The main focus on more strategic initiatives.
areas of risk include: • Simplifying Approval Processes: Revising
Implementing Cloud Access Security Broker (CASB) approval workflows to eliminate unnecessary
Solutions. One of the primary strategies for mitigating the steps without compromising security or
risks of Shadow IT involves the adoption of Cloud Access compliance can expedite the provisioning of IT
Security Broker (CASB) solutions. CASBs serve as a security resources and services, thereby enhancing user
policy enforcement point, placed between cloud service satisfaction and reducing the temptation to seek
consumers and cloud service providers to combine and shadow IT solutions.
interject enterprise security policies as cloud-based • Frequent Review and Adaptation: Continuously
resources are accessed. CASBs can provide visibility into monitoring and adapting IT processes to address
unauthorized cloud applications, helping organizations to evolving business needs ensures that the IT
control and monitor cloud traffic. Selvam [12] emphasizes department remains agile and responsive [16].
the effectiveness of CASBs in addressing unauthorized SaaS
Becoming a Business Partner. Transitioning from a
applications and managing third-party app permissions,
traditional service-oriented role to that of a strategic
thereby reducing the risks posed by Shadow IT.
business partner involves a proactive approach to
Developing Secure Information Sharing Models in
understanding and addressing the technology needs of the
Public Clouds. The creation of secure information-sharing
organization:
models within public clouds is another crucial strategy. As
noted by Pandita, U., Katy, H., Kalpana, & Sonawane, D. • Engagement and Communication: Regularly
[13], these models are essential for mitigating the risks engaging with users and stakeholders to discuss
associated with Shadow IT in public clouds. By enabling their challenges and requirements helps build
secure and controlled collaboration, these models ensure trust and ensures that IT solutions are closely
that even when employees use cloud services outside the aligned with business objectives.
formal IT infrastructure, the data remains protected. This • Education and Awareness: Actively educating
approach promotes a balance between the flexibility of users about available IT resources and solutions
cloud services and the security requirements of the can demystify technology and empower users to
organization. leverage official channels for their IT needs. This
Active Management and Control of Cloud Usage. includes workshops, newsletters, and one-on-one
Proactively managing and controlling cloud usage within an consultations to discuss potential IT solutions.
organization is key to preventing the spread of Shadow IT. • Collaborative Solution Development: Involving
This involves not just the implementation of technological users in evaluating and selecting new techno-
solutions but also the fostering of a culture where logies fosters a sense of ownership and partner-
employees understand the risks associated with ship. Collaborative decision-making ensures that
unauthorized cloud services. [14] suggests that IT IT investments are directly linked to enhancing
departments should work closely with other departments to productivity and achieving business goals.
identify and approve cloud services that meet both the
26
• Policy Development: Employees need to be made Ansible for IT automation and Python for scripting [20].
aware of the potential security threats and legal These tools are integral to a continuous integration
implications of using unauthorized cloud services. development process, characterized by rigorous code control
Alongside education, organizations should and testing. The orchestrator and its scenario scripts are
develop IT policies that clearly define acceptable meticulously designed to avoid storing any cloud
and unacceptable uses of cloud services, thus environment data directly, instead relying on REST API
providing a framework that guides employee communications with Rundeck for job execution and status
behavior in a secure and compliant manner [17]. updates. This architecture is pivotal for scalability, system
availability, and enhanced security [21].
Impact of an IT-Business Partnership. When the IT To bolster the security framework of the orchestrator,
department operates as an integrated business partner, it particularly in the context of cloud environment
achieves a deeper understanding of the organization’s needs assessments, integration with HashiCorp Vault is
and is better positioned to develop solutions that are both recommended for secure information storage.
effective and strategically aligned. This partnership: The core of configuration scanning lies in its ability to
identify discrepancies within cloud configurations by
• Reduces the prevalence of shadow IT by providing
analyzing environment logs (Audit logs, Flow logs). This
timely and relevant solutions that meet users’
analysis is juxtaposed against established cybersecurity
needs.
standards such as NIST 800-53, HIPAA, PCI-DSS, SOC, and
• Enhances organizational agility by enabling
ISO, ensuring configurations adhere to the highest security
quicker adaptation to market changes and
protocols [22]. The implementation of continuous
technology advancements.
integration, facilitated by audit and flow logs between cloud
• Improves risk management by ensuring that
environments and platforms like Prisma Cloud, ensures
security and compliance are integral to all IT
ongoing monitoring and compliance. This setup offers an
solutions and practices [18].
instantaneous overview of the cloud infrastructure,
Transforming IT into a strategic business partner is a enabling swift identification and correction of deviations
journey that requires commitment, communication, and from security standards or operational benchmarks. The
continuous improvement. By focusing on streamlining adoption of continuous integration not only bolsters
processes and fostering a collaborative relationship with the security measures but also enhances the reliability and
rest of the business, IT can significantly contribute to the efficiency of operations [23].
organization’s success and innovation capacity. Advanced analytics play a crucial role in interpreting
As organizations continue to confront the complexities of log data, shedding light on usage trends and potential
Shadow IT, the implementation of automated solutions security vulnerabilities. This proactive stance towards
becomes increasingly vital. Automation can provide the security is further enriched by the application of machine
necessary tools to manage and monitor cloud environments learning algorithms, which predict possible issues based on
more efficiently, reducing manual oversight and minimizing historical data, allowing for anticipatory risk mitigation
human error. strategies.
Operational flexibility and adaptability are also central
to this system’s design. The modular nature of the scenario
4. Automation approach for public architecture affords quick adaptability and customization,
cloud provisioning which helps catering to the dynamic needs of businesses and evolving
exclude shadow IT technological landscapes. The choice of Ansible and Python
for automation and scripting places the system at the
The adoption of an automation approach for public cloud cutting edge of technology, backed by extensive community
provisioning plays a pivotal role in mitigating the risks support and regular updates [24].
associated with Shadow IT, primarily by streamlining the In essence, this self-service automated configuration
deployment of cloud resources and ensuring compliance scanning model achieves continuous control over cloud
with organizational policies. Automating the provisioning configurations, external security perimeters, costs, and
process [19] can significantly enhance efficiency, security, compliance with security standards, underscoring a
and governance across public cloud environments, directly commitment to security, operational efficiency, and
addressing the factors that often lead to the emergence of adaptability (Fig 2).
Shadow IT. Here are key aspects illustrating the importance
of automation in this context. 4.2. Financial advantages of implementing
automated configuration scanning
4.1. Enhancing cloud security and
efficiency with self-service Operational Efficiency and Cost Savings: The transition
automated configuration scanning to automated configuration scanning significantly lowers
operational expenses. By streamlining routine checks and
Automated configuration scanning emerges as a pivotal maintenance through automation, the need for manual
strategy for maintaining cloud security and operational oversight is drastically reduced. This efficiency not only
efficiency, leveraging a self-service model. This approach cuts down on the labor and time involved but also redirects
utilizes a central orchestrator, specifically the Rundeck staff efforts towards higher-value activities, resulting in
platform, complemented by a robust toolkit including direct financial benefits [25].
27
Figure 2: Automation cloud provisioning process
Mitigation of Security-Related Financial Risks: Early by savings in operational expenditures, enhanced security
identification of vulnerabilities through automated measures, efficient resource management, reduced
scanning is crucial in averting security breaches, which can compliance costs, improved system uptime, and strategic
be financially draining and damaging to reputation. By organizational benefits. This analysis highlights automated
proactively addressing these vulnerabilities, organizations configuration scanning as an indispensable tool in
can sidestep the extensive costs associated with data contemporary cloud management frameworks.
breaches, making automated scanning a wise investment for
safeguarding assets. 4.3. Engagement and communication
Cloud Resource Optimization: Automated scanning
Automated Feedback and Communication Systems:
provides insights into the usage of cloud resources,
Utilizing automation for regular feedback collection, such as
pinpointing areas of waste or underutilization. Adjusting
through automated surveys and quick polls, facilitates
these resources accordingly can lead to considerable savings
constant dialogue between IT and users. Automated
on cloud spending, while also boosting the efficiency and
ticketing systems for IT requests can update users on the
performance of cloud-based operations [26].
status of their queries or problems in real time, improving
Avoidance of Compliance-Related Fines: Keeping up
transparency and trust.
with compliance requirements is essential to avoid financial
Automated Reporting: Dashboards and automated
penalties and legal issues. Automated configuration
reports on service usage, incident resolutions, and project
scanning facilitates ongoing adherence to regulatory
statuses can be shared with stakeholders, keeping everyone
standards, helping organizations avoid the financial pitfalls
informed and aligned with organizational goals and IT
of non-compliance and reinforcing their standing in
capabilities [28].
regulated sectors.
Enhancement of System Reliability: Proper 4.4. Education and awareness
configuration management through automated scanning
contributes to the reliability and uptime of systems. The cost E-Learning Platforms: Automated deployment of e-
implications of downtime—lost revenue and recovery learning modules tailored to different roles within the
efforts—are significant, making the stability ensured by organization helps in systematically educating employees
regular scanning a valuable asset in maintaining continuous about the safe and effective use of IT resources, including
business operations [27]. cloud services. These platforms can track progress and
Strategic Organizational Growth: Beyond immediate adapt learning paths based on user performance and
financial gains, automated configuration scanning aligns with feedback.
broader strategic objectives, nurturing an organizational Automated Notifications: Regular, automated
ethos of efficiency, security, and regulatory compliance. communications such as newsletters, security alerts,
While these advantages may not be immediately quantifiable, updates on new tools, and best practices help keep all users
they play a critical role in sustaining the long-term vitality informed and aware of the resources available to them and
and competitive edge of the business. the importance of following security and compliance
The financial analysis of automated configuration guidelines [29].
scanning underscores its substantial value proposition. The
initial investment in automation technology is quickly offset
28
4.5. Collaborative solution development 5. Analysis of results after
Self-Service Portals: Automation can power self-service implementation of the proposed
portals where users can request new tools, access trial approach
software, and provide feedback on their needs and
experiences. Such platforms can aggregate user requests This comprehensive case study showcases a strategic and
and feedback, facilitating data-driven decision-making in structured approach to managing a multi-cloud
technology selection and implementation. infrastructure (AWS, Azure, and GCP) that began in late
Automated Prototyping Tools: For development 2020 and continued through 2023. Here is an overarching
teams, automated environments for testing and prototyping summary of the project’s progression, achievements, and
new solutions can accelerate the innovation process. These significant milestones:
tools allow for the quick setup and teardown of test End of 2020: The infrastructure comprised 230 known
environments, encouraging experimentation and iterative accounts, setting the baseline for the forthcoming
development with direct user involvement [30]. enhancements.
2021 Timeline and Strategic Initiatives:
4.6. Policy development 1. Audit and Monitoring: Initiation of active audit
Automated Policy Enforcement: Automation tools can processes and implementation of monitoring
monitor the IT environment to ensure compliance with systems on all discovered accounts to ensure full
established policies, automatically flagging or restricting the visibility and control.
use of unauthorized services. This includes the deployment 2. Compliance Enhancement: Rigorous correction
of security configurations and compliance standards across of compliance issues according to NIST 800-53
cloud services. rev.4 standards, raising the security and regulatory
Dynamic Policy Updates: As policies evolve, automated standards across the board (Fig. 3).
systems can update users on changes and ensure that all 3. Discovery and Management: Identification of
employees complete acknowledgment or training sessions over 120 previously unknown cloud accounts,
related to new policies. This ensures that policy awareness is integrating them into the organization’s formal
consistent and up-to-date [31]. management system.
By leveraging automation in these critical areas, 4. Account Optimization: Closure of more than 30
organizations can foster a more engaged, informed, and obsolete accounts, streamlining operations and
collaborative culture regarding IT resource use. This not eliminating unnecessary security risks.
only reduces the reliance on Shadow IT by making
authorized channels more accessible and responsive to user 2022–2023: Expansion and Stabilization:
needs but also strengthens compliance and security 1. Growth in Infrastructure: Systematic increase in
postures. Automating engagement, education, solution the number of cloud accounts to 447, reflecting an
development, and policy management processes thus expanded and more robust infrastructure.
becomes a cornerstone strategy in aligning IT practices with 2. Security and Compliance: Continued
business objectives and user requirements [32]. improvements in security measures leading to an
advanced and stable infrastructure adept at risk
analysis and incident response.
Figure 3: Compliance trend analysis
29
End of 2023. Key Insights and Achievements: management and mitigation strategies employed,
ensuring a highly secure cloud environment.
1. Total resources managed: 35,493.
5. Compliance Increase: The significant rise in the
2. Vulnerability levels: Zero critical and high
compliance level from 67% to 82% within three
vulnerabilities; 954 medium; 1,870 low; 3,667
years underscores the successful enhancement in
informal (Fig. 4).
governance and adherence to stringent security
3. Compliance level: An increase from 67% to 82%,
standards.
indicating enhanced governance and adherence to
6. Account Management: The proactive
high standards.
management of both known and previously
4. Security Improvement: The elimination of
unknown accounts illustrates a decisive action
critical and high-level vulnerabilities by the end of
against shadow IT practices, improving control
2023 is a testament to the effective security
and visibility across the cloud environment.
Figure 4: Compliance trend analysis per alert priority
This case study exemplifies the importance of a structured The deployment of automated tools and processes fosters a
and proactive approach to cloud infrastructure culture of transparency, efficiency, and security, which is
management. Through regular audits, continuous essential for mitigating the risks associated with Shadow IT.
monitoring, and a strong focus on compliance and security, These risks, including security vulnerabilities, legal
the organization not only improved its operational security ramifications, and compliance breaches, pose significant
but also aligned its cloud resources more closely with threats to the integrity and operational efficacy of cloud
organizational goals. The strategic management of cloud computing frameworks.
accounts, including the identification and elimination of Furthermore, proactive engagement strategies
unnecessary or redundant accounts, played a crucial role in facilitated by automation—such as continuous feedback
enhancing cost efficiency and resource management. mechanisms, personalized educational programs, and
Overall, this journey reflects a model for effective cloud inclusive technology evaluation platforms—encourage a
governance that can serve as a benchmark for similar more informed and collaborative approach to IT resource
enterprises aiming to secure and optimize their cloud utilization. This not only enhances the user experience by
environments. making approved IT channels more accessible but also
aligns IT initiatives with the dynamic requirements of the
6. Conclusions modern enterprise.
Ultimately, addressing the challenges of Shadow IT
In conclusion, the strategic application of automation across through automation underscores a commitment to
various facets of IT management—ranging from user maintaining a secure, efficient, and adaptable cloud
engagement and education to collaborative solution environment. It highlights the necessity of evolving IT
development and policy enforcement—emerges as a pivotal management strategies to keep pace with the rapid
solution to the pervasive challenge of Shadow IT, advancements in cloud technology and the changing
particularly within public cloud environments. By landscape of enterprise IT needs. Adopting these automated
harnessing automation, organizations can significantly approaches signifies a decisive step towards empowering
enhance their IT governance, ensuring that IT practices are organizations to leverage the full potential of cloud
not only aligned with business objectives but also computing, ensuring that it serves as a catalyst for
responsive to user needs, thereby reducing the inclination innovation and growth rather than a source of risk and
towards unauthorized IT solutions. inefficiency.
30
References Deployment Made Easy By Rundeck and Kubernetes.
IEEE International Conference on Electronics,
[1] K. Edwards, Expected and Realized Costs and Benefits Computing and Communication Technologies (2019)
when Implementing Product Configuration Systems, 1–3. doi: 10.1109/CONECCT47791.2019.9012811.
Mass Customization for Personalized Communication [18] T. Kenaza, et al., A Secure and Interoperable
Environments: Integrating Human Factors (2010) Architecture for Blockchain/IPFS Assisted Electronic
216–231. doi: 10.4018/978-1-60566-260-2.ch012. Health Record Access Control and Sharing (2023) doi:
[2] P. Akello, Volitional Non-Malicious Insider Threats: 10.21203/rs.3.rs-3209163/v1.
At The Intersection of COVID-19, WFH and Cloud- [19] K. Murakami, et al., A Cloud Architecture for
Facilitated Shadow-Apps, 27th Annual Americas Protecting Guest’s Information from Malicious
Conference on Information Systems, AMCIS 2021 Operators with Memory Management (2014) 155–158.
(2021). doi: 10.1145/2557547.2557585.
[3] P. Selvam, (2022). Secure Cloud Services by [20] Y. Martseniuk, et al., Automated Conformity
Integrating CASB based Approach, Int. J. Sci. Res. Eng. Verification Concept for Cloud Security, in:
Manag. 6(7) (2022) 1–5. doi: 10.55041/IJSREM15210. Cybersecurity Providing in Information and
[4] H. Khan, et al., A Blockchain-Based Approach for Telecommunication Systems, vol. 3654 (2024) 25–37.
Secure Data Migration from the Cloud to the [21] H. Wang, Proxy Provable Data Possession in Public
Decentralized Storage Systems, Int. J. Web Services Clouds. Services Computing, IEEE Transactions 6
Res. 19(1) (2022) 1–20. doi: 10.4018/ijwsr. 296688. (2013) 551–559. doi: 10.1109/TSC.2012.35.
[5] O. Vakhula, I. Opirskyy, O. Mykhaylova, Research on [22] V. Susukailo, I. Opirsky, O. Yaremko, Methodology of
Security Challenges in Cloud Environments and ISMS Establishment Against Modern Cybersecurity
Solutions based on the “Security-as-Code” Approach, Threats, Future Intent-Based Networking, LNEE 831
in: Cybersecurity Providing in Information and Tele- (2022). doi: 10.1007/978-3-030-92435-5_15.
communication Systems-II, vol. 3550 (2023) 55–69. [23] O. Deineka, et al., Designing Data Classification and
[6] I. Kirin, Shadow IT: Data Protection and Cloud Secure Store Policy According to SOC 2 Type II, in:
Security (2017). doi: 10.2139/ssrn.3020880. Cybersecurity Providing in Information and
[7] L. Šedivcová, M. Potančok, Shadow IT Management Telecommunication Systems, vol. 3654 (2024) 398–
Concept for Public Sector (2019) 65–73. doi: 409.
10.1007/978-3-030-37632-1_6. [24] V. Rajaraman, Cloud Computing, Resonance 19 (2014)
[8] M. Walterbusch, A. Fietz, F. Teuteberg, Missing Cloud 242–258. doi: 10.1007/s12045-014-0030-1.
Security Awareness: Investigating Risk Exposure in [25] An Assessment of the National Institute of Standards
Shadow IT, J. Enterprise Inf. Manag. 30 (2017) doi: and Technology Center for Neutron Research,
10.1108/JEIM-07-2015-0066. Technology, Panel & Programs, Committee & Board,
[9] R. Taylor, Everything You Need to Know About Laboratory & Sciences, Division & Medicine, National
Shadow IT, Bluecat Networks (2021). URL: (2016). doi: 10.17226/21878.
https://bluecatnetworks. com/blog/everything-you- [26] R. Buyya, et al., Cloud Computing and Emerging IT
need-to-know-about-shadow-it/ Platforms: Vision, Hype, and Reality for Delivering
[10] M. Silic, A. Back, Shadow it—A View from Behind the Computing as the 5th Utility, Future Gener. Comput.
Curtain, Inf. Syst. Econom. eJ. (2014). Syst. 25 (2009) 599-616. doi:
[11] R. Walters, Bringing IT Out of the Shadows, Netw. 10.1016/j.future.2008.12.001.
Secur. 2013(4) (2013) 5–11. doi: 10.1016/S1353- [27] S. Çevik, A. Ustundag, Smart and Connected Product
4858(13)700 49-7. Business Models (2018). doi: 10.1007/978-3-319-57870-
[12] X. Zeng, et al., Flow Context and Host Behavior Based 5_2.
Shadowsocks’s Traffic Identification, IEEE Access [28] R. Clark, R. Mayer, W. Thalheimer, E-Learning and
(2019). the Science of Instruction: Proven Guidelines for
[13] U. Pandita, et al., Effective Management of Proofs Of Consumers and Designers of Multimedia Learning,
Log, Int. J. Adv. Res. Innov. Ideas Educ. 3(3) (2017). Performance Improvement 42 (2003). doi:
[14] D. Shevchuk, et al., Designing Secured Services for 10.1002/pfi.4930420510.
Authentication, Authorization, and Accounting of [29] A. Nordby, et al., System Thinking in Gamification, SN
Users, in: Cybersecurity Providing in Information and Comput. Sci. 5 (2024). doi: 10.1007/s42979-023-02579-2.
Telecommunication Systems–II, vol. 3550 (2023) 217– [30] F. Yaseen, Chapter 2 2. Literature Review 2.1.
225. Information Security Policy Availability and
[15] M. Silic, D. Silic, G. Oblakovic, Influence of Shadow IT Compliance Literature. (2024).
on Innovation in Organizations, Complex Systems [31] V. Khoma, et al., Comprehensive Approach for
Informatics and Modeling Quarterly (2016) 68–80. doi: Developing an Enterprise Cloud Infrastructure, in:
10.7250/csimq. 2016-8.06. Cybersecurity Providing in Information and Telecom-
[16] H. Fujinoki, S. Dehkordi, Split Clouds: New Security munication Systems, vol. 3654 (2024) 201–215.
Architecture for Protecting User Information from [32] S. Yevseiev, et al., Models of Socio-Cyber-Physical
Cloud Insiders—Designs, Implementation, and Systems Security: monograph, PC Technology Center
Performance Evaluations (2012) 824–829. (2023). doi: 10.15587/978-617-7319-72-5.
[17] H. Rajavaram, T. Balasubramanian, V. Rajula,
Automation of Microservices Application
31