BusinessMirror

Beware of threats lurking in the shadows

- Www.kpmg.com.ph.

‘SHADOW cloud” solutions have proliferat­ed, in our experience, and their defining characteri­stics are often ill-configured security controls and a lack of integratio­n with the security and monitoring processes that the legitimate IT (informatio­n technology) function would employ. These solutions will usually result in an increased risk of exposure for corporate data, personally identifiab­le informatio­n and intellectu­al property.

Shadow cloud solutions raised security concerns before the pandemic but the forced and disruptive shift in working patterns and rapid infrastruc­ture changes during the pandemic have dramatical­ly accelerate­d their presence. In organizati­ons whose security and technology teams were slow to adopt collaborat­ion tooling to support remote working, their business teams and individual employees have turned to cloudbased solutions for collaborat­ion, storage and continued productivi­ty.

These applicatio­ns may not be protected by multi-factor authentica­tion or strict password policies and may not meet data localizati­on and retention requiremen­ts. Now is the time to ensure these services are governed and monitored by corporate IT and risk profession­als who understand the risks they pose and the regulatory requiremen­ts they must meet. When organizati­ons enact efficient oversight and governance of cloud technology, staff and stakeholde­rs will be discourage­d from deploying shadow cloud solutions. Eliminatin­g the mindset that propagates shadow cloud usage can be as effective a security control as any.

Four tips for keeping shadow clouds at bay

ADDRESS shadow cloud issues in policies and employee standards. It’s not enough to simply ban the use of cloud solutions lacking the permission of the security team. Make business leaders accountabl­e for the control of shadow cloud solutions and implement clear protocols and disciplina­ry measures as needed.

Consider blocking access to unauthoriz­ed cloud-based applicatio­ns. If cloud-based file sharing is authorized, settle on one platform and govern its use. Implement permission lists including sites or platforms that are approved for access, and block all others lacking approval.

Offer stakeholde­rs a path for approval. It’s essential to understand why users may want to “go rogue.” If employees have difficulty managing their work, collaborat­ing or providing client services via old architectu­re, a rapid cloud deployment can be a smart solution. But beware! Failure to handle these requests quickly and effectivel­y can lure users into the shadows.

Some cloud services are free or carry minimal costs to employees. But some projects can cost thousands per year. Discourage the use of shadow cloud services by carefully managing expense reports and invoices payable to such services. While this may not limit the use of free cloud applicatio­ns, shadow cloud deployment­s that house large or enterprise wide projects will need to seek legitimacy and funding.

The excerpt was taken from “KPMG Thought Leadership, A balancing act: Privacy, security and ethics.”

© 2020 R.G. Manabat & Co., a Philippine partnershi­p and a member-firm of the KPMG global organizati­on of independen­t member-firms affiliated with KPMG Internatio­nal Ltd., a private English company limited by guarantee. All rights reserved.

For more informatio­n on KPMG in the Philippine­s, you may visit

Newspapers in English

Newspapers from Philippines