Shadow IT
Shadow IT
What you don't know can hurt you. If you know there is a problem and deliberately ignore it, that's irresponsible and dereliction of due diligence.
About the Book
Mark Twain is credited with the saying "It Ain’t What You Don’t Know That Gets You Into Trouble. It’s What You Know for Sure That Just Ain’t So." The more sure you are that your networks and information systems are locked down and comply with your security policies; that they are actually enforced by your nextgen firewalls, fancy URL filtering proxy servers, and SIEM dashboards, the more likely it is, that just ain't so. Shadow IT has a way of taking security policies that you know are Right, and making them Irrelevant because you can't even detect (or are not looking for) that shadow IT is bypassing your security policies and objectives.
A blog will accompany the book https://shadowit.weebly.com/ for information between updates to the book if you are interested.
Read the book for free: send me an email at djilpmh@protonmail.com and describe your suspicion of how Shadow IT is being used in your organization and I'll send you a coupon for the book. Example: Have you shut off the WiFi at home for "family time" or "quiet study/reading time"? So the kids are now using cellular data or the neighbors' WiFi instead, what do they care about your WiFi, and do you really want your kids to be so stupid and compliant they won't think of it?
Table of Contents
-
0. Disclaimer
- 0.1 How to Use / Read This Book
-
1. Shadow IT: An Introduction
- 1.1 What You Know For Sure That Ain't So
- 1.2 Applicability
- 1.3 Types of Shadow IT
- 1.4 Hire Competent People
- 1.5 Whitelist your security
- 1.6 Training, education and "good security practices" are still necessary
- 1.7 End of Scolding
- 1.8 No Secrets Here
- 1.9 Summary and Looking Forward: The Need for Leadership With Vision
-
2. Local Tunnels
- 2.1 What is it, and what's the danger?
- 2.2 How does it work?
- 2.3 How to detect and stop
- 2.4 The Irony of Security Education
- 2.5 Observation
-
3. Zero Knowledge services
- 3.1 What is it, how does it work, and what's the danger?
- 3.2 How Is This Different from File Sharing in the Clouds?
- 3.3 How to detect and stop
-
4. Use of Nonstandard Service Ports
- 4.1 What is it, how does it work, and what's the danger?
- 4.2 How to Detect and Stop
- 4.3 Similarity to Anti-Censorship Strategies
-
5. SSL VPNs
- 5.1 What is it, how does it work, and what's the danger?
- 5.2 How to detect and stop
- 5.3 Observation
- 5.4 (Web) Application Proxies
-
6. Misused Online Conferencing Tools
- 6.1 What is it, how does it work, and what's the danger?
- 6.2 How to detect and stop
- 6.3 Examples of Browser Plugin Based and Application Based Conferencing Services
-
7. Encrypted File Transfer in Browser
- 7.1 What is it, how does it work, and what's the danger?
- 7.2 How to detect and stop
-
8. Cloud Services
- 8.1 Almost anyone with a credit card can start a cloud based server
- 8.2 How to detect and stop
- 8.3 Observation
-
9. File Sync Danger
- 9.1 What is it
- 9.2 How to detect and stop
- 9.3 Observation
-
10. Portable Apps
- 10.1 What is it, how does it work, and what's the danger?
- 10.2 How to detect and stop
- 10.3 Observation
-
11. Desktop Virtualization
- 11.1 What is it
- 11.2 How to block
- 11.3 Observation
- 11.4 Observation 2
-
12. Desktop Virtualization and TOR
- 12.1 What is it, how does it work, and what's the danger?
- 12.2 How to detect and stop
-
13. Unblocked TOR Access
- 13.1 Unblocked TOR access
- 13.2 How to detect and stop
- 13.3 Many Networks Do Not Block TOR
- 13.4 Observation
-
14. Anti-Censorship Services
- 14.1 What is it, how does it work, and what's the danger?
- 14.2 How to detect and stop
-
15. QUIC! Encrypted UDP Transport
- 15.1 What is it, how does it work, and what's the danger?
- 15.2 How to Block
- 15.3 Observation
- 15.4 Observation 2
Causes Supported
Electronic Frontier Foundation
Defending your civil liberties in a digital world.
https://www.eff.org/Based in San Francisco, EFF is a donor-supported membership organization working to protect fundamental rights regardless of technology.
The Leanpub 60 Day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.
You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!
So, there's no reason not to click the Add to Cart button, is there?
See full terms...
Earn $8 on a $10 Purchase, and $16 on a $20 Purchase
We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them