Inside The Shadows Of SHADOW IT

Inside The Shadows Of SHADOW IT

SHADOW IT 

Recent NASA audit report brings an interesting perspective on IT & Cloud Governance.

A recent report from the office of the inspector general of NASA regarding the adoption of cloud computing technologies across the organization provide an interesting look at the phases NASA is going in cloud computing adoption. NASA was a cloud pioneer with the development of OpenStack cloud platform and project Nebula for providing private cloud services. Currently 10% of NASA 1.5 Billion $ IT budget is spent on cloud computing, but the prediction is that in the next 5 years all NASA public data will move to the public cloud and 75% of all new IT program will begin in the cloud.

The Inspector General report uncovers that several NASA applications moved into the cloud without the knowledge and authorization of the office of the CIO. On one occasion, two moderate impact applications “moved to a public cloud and operated for 2 years without authorization, a security or contingency plan, or a test of the system’s security controls.”

On other occasions, the inspector general reviewed 5 different contracts for the procurement of cloud services and found they “failed to fully address the business and IT security risks unique to the cloud environment“.

Cloud governance is a challenge to all CIO’s. NASA is no different although one can imagine that if this is how things are for NASA (a respectable organization in all terms) then what is the situation for others?

Shadow IT is not a new phenomenon, but cloud computing surely contribute for it heavily. According to Gartner, in 2015, 35% of organizations overall IT spending will be managed outside of the IT department. Cloud offerings that target the business users of the organizations by providing fast flexible solutions without the pains of involving the IT department are responsible for the majority of those “hide from IT” spending.

Not everyone thinks that Shadow IT is bad. Some researches indicate that Shadow IT promote innovation in the business and allow the business users to reach their goals faster. PWC 2013 digital IQ survey demonstrates a strong linkage between being “strong performer” and reduced control on IT spending.

In NASA report, the inspector office finds that lack of “enterprise-wide cloud-computing strategy” caused some of the failures described in the report. The slow adoption of such a program resulted in systems migrating to the cloud without authorization or proper risk management process.

So what lessons should be learned from the report? That lack of cloud strategy is the worst possible option. The business users across the organizations will continue to search for fast and flexible solutions for their applications, and SaaS vendor will continue to target them and bypass IT functions. Lack of cloud strategy will result in application moving to the cloud without any authorization and knowledge of IT functions and probably without any risk management at all. CIO’s across the globe should understand that formalizing cloud strategy today is not an option, it is a must.

(Image Source: Shutterstock)

By Moshe Ferber,

Moshe Ferber is an entrepreneur and security expert, with 20 years’ experience in information security.  Mr. Ferber has focused on various aspects of cloud technology as an entrepreneur and investor. After founding cloud7, a Managed Security Services Provider, He is also invested in startups FortyCloud and Clarisite –  innovative solutions for information security and governance. For more information can be found at www.onlinecloudsec.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Methodically Plan Your Cloud Design First

Methodically Plan Your Cloud Design First

Are You Sure You Are Ready For The Cloud: Design For the last few months, we have been discussing getting ready to go to the cloud. We have covered topics such as Financial and Business Security reasons. We have even discussed the type of knowledge you should obtain. This month, we are going to take…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Taking Your Access Governance Processes To The Cloud

Taking Your Access Governance Processes To The Cloud

Access Governance Access governance is a growing market in many different industries across the United States and beyond. Companies are investing money in access governance solutions to efficiently improve processes and ensure security of their networks, without a great deal of effort. As the cloud has become more of a standard in every organization, how…

The Four C’s – Cloud, Culture, Clash, Change

The Four C’s – Cloud, Culture, Clash, Change

The Cloud, Culture, Clash, Change “I told the new CTO that this cloud stuff was BS. He came charging in with this ‘cloud first policy’ and look what happened. Previously rock solid systems that had worked for years slowed down and had outages as we tried to run them on the cloud. I doubt that…

The Concept Of Securing IoT To Secure Your Building

The Concept Of Securing IoT To Secure Your Building

Securing IoT Ah, security. It is the dulcet tone of a symphony that we play over and over in the IT world. IoT (Internet of Things) and the myriad of connected devices allow us some intriguing security options. For example, in a mesh array of sensors, you could effectively force users to correctly identify themselves…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor