Inside The Shadows Of SHADOW IT

Inside The Shadows Of SHADOW IT

Inside The Shadows Of SHADOW IT 

Recent NASA audit report brings an interesting perspective on IT & Cloud Governance.

A recent report from the office of the inspector general of NASA regarding the adoption of cloud computing technologies across the organization provide an interesting look at the phases NASA is going in cloud computing adoption. NASA was a cloud pioneer with the development of OpenStack cloud platform and project Nebula for providing private cloud services. Currently 10% of NASA 1.5 Billion $ IT budget is spent on cloud computing, but the prediction is that in the next 5 years all NASA public data will move to the public cloud and 75% of all new IT program will begin in the cloud.shadow-IT

The Inspector General report uncovers that several NASA applications moved into the cloud without the knowledge and authorization of the office of the CIO. On one occasion, two moderate impact applications “moved to a public cloud and operated for 2 years without authorization, a security or contingency plan, or a test of the system’s security controls.”

On other occasions, the inspector general reviewed 5 different contracts for the procurement of cloud services and found they “failed to fully address the business and IT security risks unique to the cloud environment“.

Cloud governance is a challenge to all CIO’s. NASA is no different although one can imagine that if this is how things are for NASA (a respectable organization in all terms) then what is the situation for others?

Shadow IT is not a new phenomenon, but cloud computing surely contribute for it heavily. According to Gartner, in 2015, 35% of organizations overall IT spending will be managed outside of the IT department. Cloud offerings that target the business users of the organizations by providing fast flexible solutions without the pains of involving the IT department are responsible for the majority of those “hide from IT” spending.

Not everyone thinks that Shadow IT is bad. Some researches indicate that Shadow IT promote innovation in the business and allow the business users to reach their goals faster. PWC 2013 digital IQ survey demonstrates a strong linkage between being “strong performer” and reduced control on IT spending.

In NASA report, the inspector office finds that lack of “enterprise-wide cloud-computing strategy” caused some of the failures described in the report. The slow adoption of such a program resulted in systems migrating to the cloud without authorization or proper risk management process.

So what lessons should be learned from the report? That lack of cloud strategy is the worst possible option. The business users across the organizations will continue to search for fast and flexible solutions for their applications, and SaaS vendor will continue to target them and bypass IT functions. Lack of cloud strategy will result in application moving to the cloud without any authorization and knowledge of IT functions and probably without any risk management at all. CIO’s across the globe should understand that formalizing cloud strategy today is not an option, it is a must.

By Moshe Ferber,

Moshe Ferber is an entrepreneur and security expert, with 20 years’ experience in information security.  Mr. Ferber has focused on various aspects of cloud technology as an entrepreneur and investor. After founding cloud7, a Managed Security Services Provider, He is also invested in startups FortyCloud and Clarisite –  innovative solutions for information security and governance. For more information can be found at www.onlinecloudsec.com.

(Image Source: Shutterstock)

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Recent

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Wearable Technology is a very exciting industry and the sky’s the limit with new possibilities for businesses and consumers. The new technologies will make our lives easier in terms of convenience, while in other ways more complicated due to learning curve of each new product. Lets take a look at wearable tech in…

How M2M Differs From IoT Internet of Things

How M2M Differs From IoT Internet of Things

What Is M2M Machine To Machine? When it comes to communications between machines, the terms Machine to Machine (M2M) and the Internet of Things (IoT) are seemingly similar to each other. In fact, there is a very strong connection between both terms which is why they are often used as the same. However, that is…

Cloud Infographic – Top Vulnerable Applications

Cloud Infographic – Top Vulnerable Applications

Top Vulnerable Applications  As you use the Internet on a daily basis, you probably come across cyber security topics, but rarely glance at them twice. After all, cyber security threats don’t concern you, right? Well, that’s not exactly true. Cyber attacks are more widespread than you can imagine and they may be targeting your devices as…

Popular Archives

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

The Growth Of Rampant Digital Diseases

The Growth Of Rampant Digital Diseases

Rampant Digital Diseases Keeping ‘Rombertik’ at Bay – The New Malware that Destroys Hard-Drives A new form of malware is still on the loose, and this one takes malicious to a whole new level. Nicknamed ‘Rombertik’ by Cisco Systems, the malware attempts to infiltrate the victim’s browser to procure confidential information; fairly standard operating procedure…

Sponsors

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising