Don’t Let Unmanaged Assets In The Cloud Cause You A Big Problem – Charles Leaver

By | May 2, 2018

Written By Logan Gilbert And Presented By Charles Leaver


We all relate to the image of the hooded bad guy hovering over his computer late at night – accessing a corporate network, stealing important data, vanishing without a trace. We personify the assailant as smart, persistent, and crafty. However the reality is the vast majority of attacks are made possible by simple human negligence or recklessness – making the task of the hacker a simple one. He’s inspecting all the doors and windows constantly. All it takes is one mistake on your part and he’s in.

Exactly what do we do? Well, you know the action you need to take. We invest a hefty piece of our IT budget on security defense-in-depth systems – created to discover, trick, fool, or outright block the villains. Let’s forget the discourse on whether or not we are winning that game. Since there is a far simpler game taking place – the one where the enemy enters your network, company critical application, or IP/PPI data through a vector you didn’t even comprehend you had – the asset that is unmanaged – frequently referred to as Shadow IT.

Think this is not your company? A recent study recommends the average business has 841 cloud apps in use. Remarkably, most IT executives think the variety of cloud apps in use by their organization is around 30-40 – suggesting they are off by a factor of 20X. The very same report discloses that over 98% of cloud apps are not GDPR ready, and 95% of enterprise class cloud apps are not SOC 2 compliant.

Defining Unmanaged Assets/Shadow IT

Shadow IT is defined as any SaaS application utilized – by workers, departments, or whole organization groups – without the comprehension or permission of the business’s IT department. And, the development of ‘everything as a service’ has made it even easier for workers to gain access to whatever software they feel is needed to make them more productive.

The Effect

Well intentioned workers typically don’t realize they’re breaking business guidelines by activating a brand-new server instance, or downloading unapproved apps or software offerings. However, it occurs. When it does, three problems can develop:

1. Business standards within a company are compromised given that unauthorized software implies each computer has different abilities.

2. Rogue software frequently includes security flaws, putting the entire network at risk and making it a lot more tough for IT to manage security dangers.

3. Asset blind spots not only drive up security and compliance risk, they can increase legal threats. Info retention policies created to limit legal liability are being compromised with details contained on unapproved cloud assets.

3 Essential Considerations for Resolving Unmanaged Asset Threats

1. First, deploy tools that can provide thorough visibility into all cloud assets- managed and unmanaged. Know what new virtual machines have been activated recently, in addition to what other machines and applications with which each VM instance is communicating.

2. Second, make certain your tooling can provide constant inventory of licensed and unauthorized virtual devices operating in the cloud. Make certain you have visibility into all IP connections made to each asset.

3. Third, for compliance and/or forensic analysis functions try to find a solution that provides a capture of any and all assets (physical and virtual) that have ever been on the network – not just a service that is restricted to active assets – and constrained with a short look back window.

Ziften approach to Unmanaged Asset Discovery

Ziften makes it simple to quickly find cloud assets that have actually been commissioned beyond IT’s province. And we do it continually and with deep historical recall within your reach – including when each device first connected to the network, when it last appeared, and how often it reconnects. And if a virtual machine is decommissioned, this is not a problem, we still have all its historic habits data.

Identify and secure surprise attack vectors coming from shadow IT – prior to a calamity. Know exactly what’s going on in your cloud environment.

Leave a Reply

Your email address will not be published. Required fields are marked *