当前位置:网站首页>Five Steps to Detect and Control Shadow IT
Five Steps to Detect and Control Shadow IT
2022-08-03 20:47:00 【software testnet】

Enterprise employees usually want to use the best tools to do their job.对于大多数员工来说,This usually means using the onlineSaaS应用程序,But these applications and tools may not be the enterpriseITDepartment approval and license.Many employees are using shadowIT(Or now call it more“业务主导的IT”)To describe the without businessITApproved by the team technology.随着SaaS应用程序数量的增加,People naturally the use of a large number of online tools,Now most of the shadowIT都是SaaS应用程序.Although the enterprises from all walks of life toITThe team do the best,But the shadowITThe application of not only failed to reduce,而且一直在增加,And close to legalize,Eventually become a feasible can provide competitive advantageIT战略.
由于存在安全风险,Enterprises to adopt the traditional strategy is usually stop employees adopt various forms of shadowIT.然而,A variety of shadowITRisk is not the same,And enterprises of these shadowITThe benefits of record is,Allowing employees to get they think is the best work tools technology.因此,For enterprise's chief information officer and chief information security officer,To prevent the shadowIT的策略相比,Better strategy is to implement tools to set up the proper security fence to control it,To ensure that the staff compliance with company safety and compliance policy tools.
According to the investigation and research,In the framework of the following five steps to help enterprises create safety feasible security framework is very effective.
1、Find the shadowIT
控制影子ITThe first step is to identify,With a comprehensive understanding of the shadowIT在企业中的流行程度.Many shadowITIs a kind of service,Even hardware technology also almost always useSaaSThe component to run it.Most companies will cloud access security agent(CASB)用于SaaSDiscovery and security,But often receive employee feedback,Said cloud access security agent(CASB)干扰太大.They are collecting data and identify who will go to which website has done very well,But not good at found that employees are using the newSaaS应用程序.The data may be in there,But analysts often have to do extra work to determine whether the created account,Especially if the user is using a local user credentials rather than identity provider.If the relevant data can be presented to the analyst,So they only need to take action and achieve the required safety results.
Find the shadowITThe solution is to choose an automated tools or methods and provide the right trigger,Also is to use other identity and access management(IAM)Solutions outside business credentials to create account.Record all of this information in the log or should be merged data on a regular basis,It is certainly a doomed to failure process.
2、Give priority to reduce the shadowIT的风险
Never know when employees get technology,会面临哪些问题.可以确定的是,Enterprise employees will receive and start using the new technology are always present.The number of employees according to enterprise,It can range from a week a few to dozens or even hundreds of.Considering the shadowITAccess to the number of,Faced with the risk of different,Priority becomes extremely important.
Prioritize risk mitigation is the key step.Companies cannot take some fixed patterns and methods to reduce the shadowIT的风险,Because they are constantly changing.A technology for enterprises constitute the risk degree is beyond the supplier whether theSOC2或ISO27001等行业认证.This certification is common,Even now startups are also accept the certification.With its focus on supplier control the risk of,Not according to the following factors to assess risk,例如:
- Whether employees understand about using the enterprises purchase and use of technology、软件或SaaSSafety and risk policy?
- Whether can use any sensitive、Confidential or regulated data?
- In the business organization,Who is to approve the use of the technology?
- The technology will with which system integration?
- Any non employees will be the user of this technology?
- In the enterprise and many other users?
3、Protect the shadowIT帐户
Protect the shadowITOften this is easier said than done.Assumptions can be found in one location or network physical device,则很简单.但软件(几乎都是SaaS)要困难得多,Because you can from the managed device on the enterprise network or use unmanaged devices to access it from the different position.SaaS安全产品(例如CASB)Assuming that can control network、Identity or equipment,But the reality is that might not be able to control any of them.
保护SaaSIs the best way in thoughtSaaSAccount in violation of the corporate policy or lock when employees work in enterprises no longerSaaSThe account itself.Cancel the account itself is still desirable measures,But to protect it so that no one can access the account is a critical first step.
4、Coordination across the control points of security,Reduce the shadowIT的风险
Once the shadow technology protected,The next step is to through other security, to coordinate the protection of the application.例如,如果SaaSApplication is considered too risky,So every user of the application to an enterprise should stop using the.作为额外的安全层,Companies may want to prevent access to the network on theSaaSSite or set an alarm when every time someone to create a new account.
When the threat from intelligence source or third party risk management system of data show thatSaaSApplication has been damaged or had been in the market to find the credential when,Coordination is also important.Users should be forced to check their credentials leaked with each account and reset the password.Although all of these can all be done through existing tools in some,But the actual work process is not generally designed.With the out-of-the-box automationSaaSSecurity products in ensuring security team unified control points、分析、Remote sensing and operation in order to protect and control the shadowSaaSThere is a big help.
5、Safely accept shadowIT
无论如何努力,影子SaaSWill continue to grow.在许多方面,It is like most of the enterprise standard cabin equipment now(BYOD)The development trend of.As consumer technology become as strong and enterprise products,Workers found using consumer devices work easier、更方便.Enterprise will eventually compromise,And use to supportBYOD的产品,Because the gains more than the cost.
The same thing happens in the shadowIT上,更具体地说是SaaS.Employees are no longer neededITTeam's help or permission to buy a more powerful application.They only need to use an email address and your credit card,Often use can upgrade free account.ITAnd security team need to acknowledge these benefits and create a frame,Let employees use the right tools at work,At the same time to the enterprise to better governance and control technology and data.
边栏推荐
猜你喜欢

尚医通项目总结

2022-8-3 第七组 潘堂智 锁、多线程

双线性插值公式推导及Matlab实现

Power button 206 - reverse list - the list

tRNA甲基化偶联3-甲基胞嘧啶(m3C)|tRNA-m3C (3-methylcy- tidine)

手动输入班级人数及成绩求总成绩和平均成绩?

李沐动手学深度学习V2-BERT微调和代码实现

9月1日起我国给予多哥等16国98%税目产品零关税待遇

敏捷交付的工程效能治理
[email protected] 594/[email prote"/>RNA核糖核酸修饰Alexa 568/[email protected] 594/[email prote
随机推荐
RNA-ATTO 390|RNA-ATTO 425|RNA-ATTO 465|RNA-ATTO 488|RNA-ATTO 495|RNA-ATTO 520近红外荧光染料标记核糖核酸RNA
不专业面试官的经验总结
Auto.js实现朋友圈自动点赞
From September 1st, my country has granted zero-tariff treatment to 98% of tax items from 16 countries including Togo
检测和控制影子IT的五个步骤
LeetCode_位数统计_中等_400.第 N 位数字
chartjs自定义柱状图插件
2022-8-3 第七组 潘堂智 锁、多线程
leetcode 326. Powers of 3
力扣203-移除链表元素——链表
解决This application failed to start because no Qt platform plugin could be initialized的办法
tkwebview2创作心得
ECCV 2022 | 清华&腾讯AI Lab提出REALY:重新思考3D人脸重建的评估方法
charles配置客户端请求全部不走缓存
wordpress建立数据库连接时出错
error: C1083: 无法打开包括文件: “QString”: No such error: ‘QDir‘ file not found
染料修饰核酸RNA|[email protected] 610/[email protected] 594/Alexa 56
Edge box + time series database, technology selection behind Midea's digital platform iBuilding
2022/08/03 学习笔记 (day23)多线程(补充)
李沐动手学深度学习V2-自然语言推断与数据集SNLI和代码实现