Shadow IT Discovery and Management: Finding, Classifying, and Governing Unauthorized Applications in Your Enterprise
The era of shadow IT being primarily about employees running unauthorized spreadsheet macros or installing unapproved desktop software is over. Modern shadow IT is primarily SaaS: employees signing up for productivity tools, AI assistants, collaboration platforms, and data analysis services using work email addresses and corporate data -- with no visibility into what data leaves the organization, how the vendor handles it, or whether it meets compliance requirements. Netskope's 2025 cloud report found the average mid-market enterprise has over 1,000 cloud apps in use, with IT and security teams aware of fewer than 100. This guide covers how to discover, classify, and govern shadow IT effectively, with particular attention to Shadow AI -- the fastest-growing and highest-risk shadow IT category.
Defining Shadow IT and Its Scope in 2026
Shadow IT has three distinct categories that require different discovery methods and governance approaches.
Category 1 -- Unauthorized SaaS applications: Employees signing up for cloud services using work email addresses or company SSO. Common examples: personal Slack workspaces for team communication outside company-monitored channels, Notion or Airtable databases containing business data outside corporate document management, Dropbox or Google Drive personal accounts storing files that should be in corporate-approved storage, Zoom accounts not under corporate licensing and logging controls.
Category 2 -- Shadow AI (the highest-growth category in 2026): Employees using AI tools to process work content without organizational approval or data classification controls. Common examples: pasting customer data or internal code into ChatGPT, Claude, or Gemini for analysis; using AI writing assistants that train on submitted content; using AI coding assistants connected to work code repositories without organizational licensing and data handling agreements. Shadow AI is particularly high-risk because employees frequently paste sensitive content (customer PII, financial data, internal strategic documents, source code) into AI systems that may use submitted data for model training.
Category 3 -- Unauthorized hardware and network devices: Consumer routers, wireless access points, personal NAS devices, and IoT devices connected to the corporate network without IT knowledge. This category is the traditional definition of shadow IT and remains relevant, particularly in manufacturing, healthcare, and remote office environments.
Shadow IT vs. approved applications used outside policy: Distinguish between unauthorized applications (shadow IT) and approved applications used outside their intended scope. An employee using the corporate-approved Slack to share customer data in a way that violates data handling policy is a compliance issue, not a shadow IT issue. The governance approach differs: shadow IT requires discovery and authorization decisions; policy violation by approved applications requires policy enforcement and user education.
Discovery Methods: How to Find What You Do Not Know About
Shadow IT discovery requires multiple methods because no single approach provides complete visibility.
CASB (Cloud Access Security Broker) for SaaS discovery: A CASB deployed in API mode connects to approved SaaS platforms and discovers usage patterns, data movement, and connected applications. In proxy mode (forward proxy or reverse proxy), the CASB inspects all traffic to and from cloud services, providing visibility into any SaaS application an employee accesses. CASB proxy mode provides the broadest shadow IT discovery: it sees all HTTPS traffic and can identify application destinations even for services the organization did not know were in use. Major CASB vendors: Netskope, Zscaler, Microsoft Defender for Cloud Apps (formerly MCAS), Cisco Cloudlock. Netskope and Zscaler provide the broadest application database (100,000+ cloud apps cataloged with risk scores).
DNS query log analysis: DNS resolvers generate query logs that reveal every domain name employees are looking up, which correlates to every application they are attempting to access. Filter DNS logs for known SaaS provider domains (the top 500 SaaS platforms resolve to a small set of root domains). This is a lightweight discovery method available to any organization with DNS logging enabled, without deploying additional tools. DNS analysis identifies what applications are being accessed but not the data flowing to them.
SSO and identity provider telemetry: Modern SSO platforms (Okta, Entra ID, Ping Identity) log every application that uses SSO authentication. Applications that employees have connected to your SSO reveal a subset of shadow IT -- those applications that employees have authorized via OAuth consent to access corporate identity. Review OAuth consent grants in Entra ID Admin Center or Okta Administration for unexpected applications with data access permissions. OAuth consent grant reporting often reveals high-risk shadow apps that have been granted access to email, calendar, and files.
Network traffic analysis (NTA): Deploy NTA tools (Darktrace, Vectra, Zeek-based solutions) to analyze network traffic patterns and identify outbound connections to cloud service provider IP ranges outside the known-application list. This provides discovery of applications that do not use DNS-resolvable hostnames or that employees access via API connections rather than browser sessions.
Employee self-disclosure: Surveys, voluntary registration programs, and amnesty programs where employees can report tools they are using without fear of disciplinary action. Self-disclosure is the only method that discovers applications accessed entirely outside the corporate network (employees using personal devices and personal network access for work tasks). It is also the least reliable discovery method if employees fear consequences for disclosure.
Briefings like this, every morning before 9am.
Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.
Risk Classification Framework for Discovered Applications
Not all shadow IT represents equal risk. Classifying discovered applications by risk level enables proportionate governance responses: blocking high-risk applications, requiring authorization for medium-risk applications, and formally approving low-risk applications that employees are clearly going to use regardless.
Risk classification dimensions:
| Dimension | Low Risk | Medium Risk | High Risk |
|---|---|---|---|
| Data handling | No data storage | Stores non-sensitive business data | Stores PII, financial, or confidential data |
| Vendor security posture | SOC 2 Type II, ISO 27001 certified | Partial security documentation | No security documentation |
| Data residency | Known, compliant jurisdictions | Multiple jurisdictions with documentation | Unknown or non-compliant |
| Privacy compliance | GDPR, CCPA compliant | Partial compliance claims | No compliance documentation |
| Training on submitted data | Explicit opt-out available | Default opt-in | Trains on all submitted content |
| Category | Productivity utility | Business process application | AI/LLM, data analysis, code |
The AI-specific risk classification: AI tools require a separate risk tier because the training data question changes the risk profile fundamentally. An AI tool that uses submitted content to train models effectively transmits that data to a shared model accessible by other users -- a form of data exfiltration that traditional DLP controls do not detect as data loss because the data is submitted to an apparently legitimate service.
Classify AI shadow IT as:
- Approved: Enterprise licensing with data processing agreement, no training on submitted content (ChatGPT Enterprise, Claude for Enterprise, Microsoft Copilot under M365 E3/E5)
- Restricted: Consumer AI tools that can be used for non-sensitive tasks only (no PII, no customer data, no financial data, no code from proprietary repositories)
- Blocked: AI tools with opaque data handling practices, no enterprise agreements available, or explicit training on submitted content
The Govern-Not-Block Approach
Blocking shadow IT without providing sanctioned alternatives is the least effective shadow IT management strategy. Employees use shadow IT because corporate-approved alternatives do not meet their needs. Blocking without replacement drives shadow IT further underground (mobile devices, personal email, personal cloud accounts accessed entirely outside corporate visibility) or drives the most productive employees out of the organization.
The govern-not-block framework:
Step 1 -- Understand why the shadow IT is being used. A team using a personal Slack workspace is signaling that the corporate communication tool does not meet their collaboration needs. A team exporting data to personal Google Sheets is signaling that the corporate data analysis platform is too slow, too complex, or unavailable for their use case. Discovery without understanding the underlying need produces governance that the organization will resist.
Step 2 -- Evaluate whether the need can be met with an approved tool. If a corporate alternative exists that meets the need, invest in user education and onboarding to the approved tool. If no corporate alternative meets the need, evaluate the shadow IT tool for formal approval: require a vendor security assessment, negotiate a data processing agreement, establish data classification requirements for use, and add it to the approved application list.
Step 3 -- Block only what cannot be approved and cannot be mitigated. Apply blocking to applications in the high-risk category where no enterprise agreement is available and no data processing controls are possible. Block AI tools that train on submitted content for corporate use cases. Block consumer file sharing services where the data residency is unknown. Use CASB blocking rules or DNS filtering to enforce these blocks.
Step 4 -- Monitor approved applications for policy violations. Formal approval of a SaaS application is not the end of the governance process. Monitor CASB telemetry for data exfiltration patterns (unusually large uploads, bulk file sharing outside the organization), watch for OAuth permission creep (an approved application requesting expanded access to corporate data), and review vendor security posture annually against SOC 2 and ISO 27001 certification currency.
SSO Expansion as a Shadow IT Reduction Strategy
The most effective long-term shadow IT reduction strategy is SSO expansion: connecting discovered shadow IT applications to corporate SSO (Okta, Entra ID, Ping Identity) rather than blocking them. SSO expansion gives the organization three controls over previously unmanaged applications:
1. Visibility: Every login through SSO is logged. You can see who is using the application, how frequently, and from what device posture.
2. Access control: When an employee leaves or moves roles, deprovisioning their SSO account removes access to all SSO-connected applications simultaneously. Without SSO, orphaned accounts in shadow applications persist indefinitely after offboarding.
3. Conditional access enforcement: Entra ID Conditional Access or Okta Adaptive MFA can require MFA, device compliance, or geographic location checks for every SSO-connected application, regardless of whether the application itself enforces those controls.
The SSO expansion workflow: Identify high-use shadow applications from CASB discovery. Evaluate each for SSO support (most SaaS platforms support SAML 2.0 or OIDC). Negotiate enterprise licensing that includes SSO at no additional cost (many vendors include SSO in enterprise tiers). Connect the application to corporate SSO, migrate existing users, and disable direct username/password login for the application.
The result: the shadow IT application becomes a managed application without requiring the employee to change tools. User adoption resistance is eliminated because you are not blocking anything; compliance posture improves because access is now controlled, logged, and deprovisioned on offboarding.
Shadow AI SSO limitation: Not all AI tools support enterprise SSO or offer data processing agreements. For AI tools that cannot be governed via SSO, the options are limited to: block entirely, provide a corporate-licensed alternative that provides comparable functionality with data governance controls, or accept the risk with user awareness training about what data must not be submitted to consumer AI tools.
Metrics: Measuring Shadow IT Risk Reduction Over Time
Shadow IT governance programs need metrics that demonstrate risk reduction, not just discovery volume.
Discovery metrics (program health):
- Total applications discovered (baseline and trend)
- Applications by risk tier (High, Medium, Low)
- New shadow applications discovered per month (declining trend indicates governance maturity)
- Discovery coverage: what percentage of corporate traffic is inspected by CASB or DNS logging?
Governance metrics (risk reduction):
- Percentage of discovered applications formally classified (approved, restricted, or blocked)
- Percentage of high-risk applications blocked or replaced with approved alternatives
- SSO adoption rate: percentage of SaaS applications connected to corporate SSO
- Offboarding completeness: are deprovisioned users removed from all SSO-connected applications within the defined SLA?
- Data exfiltration events: CASB-detected bulk uploads to shadow applications (trend declining indicates governance effectiveness)
Shadow AI specific metrics:
- Percentage of AI tool usage flowing through corporate-approved AI platforms vs. consumer AI platforms
- DLP policy match rate for sensitive data upload attempts to AI services
- User training completion rate for AI data handling policy
Board reporting summary: Shadow IT risk is most effectively communicated in terms of data exposure risk: of the sensitive data handled by your organization (customer PII, financial data, proprietary code), what percentage flows through applications where the organization has no data processing agreement, no access controls, and no visibility? This framing -- percentage of sensitive data at risk in unmanaged applications -- is more actionable for board-level decision-making than "we found 1,000 shadow apps."
The bottom line
Shadow IT is not an employee behavior problem -- it is a governance gap. Employees use unauthorized tools because approved tools do not meet their needs. The most effective shadow IT management combines discovery (CASB, DNS analysis, SSO telemetry), proportionate governance (block high-risk, approve and govern medium-risk), and SSO expansion to bring discovered applications under identity and access management without requiring behavior change. Shadow AI is the most urgent priority: employees pasting customer data and proprietary code into consumer AI tools is the fastest-growing source of uncontrolled data exposure in most organizations, and the remediation requires both policy and enterprise-licensed AI alternatives that meet employee productivity needs.
Frequently asked questions
What is the difference between shadow IT and BYOD?
BYOD (Bring Your Own Device) refers to employee-owned hardware (laptops, phones, tablets) being used for work purposes. Shadow IT refers to unauthorized applications and cloud services, regardless of what device they run on. The two overlap: employees frequently use personal devices to access shadow IT applications outside corporate monitoring. A shadow IT governance program and a BYOD security program address complementary risks: BYOD programs control the endpoint; shadow IT programs control the applications and data flows. Both are necessary for comprehensive data governance, as a BYOD policy with MDM enrollment but no shadow IT governance still allows employees to exfiltrate data through unmanaged applications on their enrolled devices.
How does Shadow AI differ from traditional shadow IT in terms of risk?
Traditional shadow IT risks are primarily access control and data residency: an unauthorized application stores data without the organization's knowledge, in an unknown jurisdiction, without a data processing agreement. Shadow AI adds a training data risk that traditional DLP controls do not address: consumer AI tools may use submitted content to train models, effectively making that content part of a shared model accessible to all users. An employee pasting customer PII into ChatGPT for analysis may not be violating the organization's DLP policy (the content is going to a legitimate HTTPS endpoint) but may be contributing that data to OpenAI's training dataset. Enterprise AI licensing agreements (ChatGPT Enterprise, Claude for Enterprise) typically include explicit no-training commitments; consumer AI products may not.
Can I use a CASB to block shadow AI specifically?
Yes. CASB solutions can identify traffic to AI service providers (OpenAI, Anthropic, Google AI, Cohere, Mistral, Hugging Face) by destination IP range and hostname. You can block specific consumer AI endpoints while allowing traffic to enterprise-licensed AI endpoints (api.openai.com for enterprise contracts, claude.ai for Claude for Enterprise). CASB can also apply DLP policies to traffic destined for AI services -- detecting and blocking upload of content matching sensitive data patterns (credit card numbers, SSNs, healthcare identifiers) to AI endpoints. This combination of application-level blocking and DLP scanning for allowed AI applications provides a layered shadow AI governance approach.
What is SSPM and how does it relate to shadow IT management?
SSPM (SaaS Security Posture Management) monitors approved SaaS applications for misconfiguration, excessive user permissions, and compliance drift -- the equivalent of CSPM for SaaS platforms. While shadow IT discovery focuses on finding unauthorized applications, SSPM focuses on hardening the authorized SaaS application portfolio: identifying over-privileged users in Salesforce, misconfigured sharing settings in SharePoint, or disabled MFA requirements in approved collaboration tools. Platforms like AppOmni, Obsidian Security, and Wing Security provide SSPM capability. Shadow IT governance (finding the unknown) and SSPM (securing the known) are complementary programs that together address the full SaaS security surface.
How do I build a shadow IT policy that employees will actually follow?
A policy employees will follow has three characteristics: it is easy to comply with, it explains the why behind the rules, and it provides a clear path for requesting exceptions. Make compliance easy by providing an approved application catalog with pre-vetted alternatives for common use cases. Explain the why by communicating concrete examples of shadow IT risk (the AI tool that uses submitted data for training, the file sharing service with unknown data residency). Make exception requests fast: a 2-week approval SLA for new application requests means employees will use the unauthorized tool while waiting, then never go back. Target 3 business days for new application review. Include an amnesty provision: employees who voluntarily report shadow applications they are using should face education, not discipline.
What CASB should I use for shadow IT discovery?
The right CASB depends on your environment and existing vendor relationships. Netskope provides the broadest cloud application catalog (100,000+ apps with risk scores) and the strongest inline proxy capabilities for real-time traffic inspection. Zscaler Internet Access includes CASB functionality as part of its SASE platform -- the right choice if you are already deploying Zscaler for secure web gateway. Microsoft Defender for Cloud Apps (formerly MCAS) integrates natively with M365 and Entra ID, provides deep API-mode integration with Microsoft's SaaS applications, and is included in many Microsoft E5 licensing bundles -- the lowest-cost starting point for M365-heavy environments. For API-mode discovery of approved SaaS applications without inline proxy deployment, any of these vendors provide adequate discovery capability at lower operational complexity than full proxy deployment.
Sources & references
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
The Mythos Brief is free.
AI that finds 27-year-old zero-days. What it means for your security program.
