Chuck Leaver – How To Deal With Unmanaged Assets In The Cloud

Written By Logan Gilbert And Presented By Chuck Leaver


All of us identify with the image of the masked villain bending over his computer late at night – accessing a corporate network, stealing important data, vanishing without a trace. We personify the enemy as smart, determined, and crafty. But the reality is the large bulk of attacks are enabled by basic human negligence or recklessness – making the task of the cyber criminal an easy one. He’s checking all the doors and windows constantly. All it takes is one error on your part and he’s in.

Exactly what do we do? Well, you know the answer. We spend a good piece of our IT budget on security defense-in-depth layers – created to discover, trick, fool, or outright block the villains. Let’s park the discourse on whether we are winning that game. Since there is a far much easier game taking place – the one where the opponent enters your network, business vital application, or IP/PPI data through a vector you didn’t even comprehend you had – the unmanaged asset – often described as Shadow IT.

Believe this is not your business? A current study recommends the typical business has 841 cloud apps in use. Remarkably, most IT executives believe the variety of cloud apps in use by their company is around 30-40 – indicating they are incorrect by a factor of 20X. The exact same report discloses that more than 98% of cloud apps are not GDPR prepared, and 95 percent of enterprise-class cloud apps are not SOC 2 ready.

Defining Unmanaged Assets/Shadow IT

Shadow IT is specified as any SaaS application utilized – by employees, departments, or whole business units – without the comprehension or authorization of the company’s IT department. In addition, the arrival of ‘everything as a service’ has made it even simpler for workers to gain access to whatever software they feel is required to make them more efficient.

The Impact

Well intentioned staff members normally don’t realize they’re breaking business rules by triggering a new server instance, or downloading unapproved apps or software application offerings. However, it occurs. When it does, 3 issues can emerge:

1. Corporate requirements within an organization are jeopardized because unauthorized software implies each computer system has different abilities.

2. Rogue software typically comes with security defects, putting the whole network at risk and making it a lot more difficult for IT to handle security threats.

3. Asset blind spots not only drive up security and compliance threats, they can increase legal risk. Information retention policies created to restrict legal liability are being skirted with info included on unauthorized cloud assets.

3 Essential Considerations for Resolving Unmanaged Asset Dangers

1. Initially, deploy tools that can supply comprehensive visibility into all cloud assets- managed and unmanaged. Know what new virtual machines have actually been activated this week, along with exactly what other machines and applications with which each VM instance is communicating.

2. Second, make sure your tooling can provide continuous inventory of licensed and unauthorized virtual devices running in the cloud. Make certain you have visibility into all IP connections made to each asset.

3. Third, for compliance and/or forensic analysis purposes search for a service that supplies a capture of any and all assets (virtual and physical) that have actually ever been on the network – not just a solution that is restricted to active assets – and within a brief look back window.

Ziften approach to Unmanaged Asset Discovery

Ziften makes it simple to quickly find cloud assets that have actually been commissioned outside of IT’s province. And we do it continually and with deep historic recall within your reach – consisting of when each device initially connected to the network, when it last appeared, and how typically it reconnects. And if a virtual device is decommissioned, this is not a problem, we still have all its historic habits data.

Recognize and secure covert attack vectors coming from shadow IT – prior to a catastrophe. Know what’s going on in your cloud environment.