{"id":9125,"date":"2022-12-08T07:11:19","date_gmt":"2022-12-08T15:11:19","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=9125"},"modified":"2026-02-02T13:43:26","modified_gmt":"2026-02-02T21:43:26","slug":"start-reducing-your-organizations-shadow-it-risk-in-3-steps","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/","title":{"rendered":"Start reducing your organization\u2019s Shadow IT risk in 3 steps"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-7479 size-medium\" style=\"margin-top: 0px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-perspectives-300x106.png\" alt=\"Microsoft Digital Perspectives\" width=\"300\" height=\"106\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-perspectives-300x106.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-perspectives.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><em>We periodically update our stories, but we can&#8217;t verify that they represent the full picture of our current situation at Microsoft. We leave them on the site so you can see what our thinking and experience was at the time.<\/em><\/p>\n<p>You\u2019ve heard a lot about Shadow IT risk, but what is it and what should you do about it?<\/p>\n<p>Shadow IT is the set of applications, services, and infrastructure that are developed and managed outside of defined engineering standards. Experts predict somewhere between one-third to one-half of successful cyberattacks this year will be on Shadow resources (data via Gartner, Spin Technologies). With the average cost of a breach at $4.2 million in the US, it is critical to address Shadow IT risk.<\/p>\n<p>While this sounds scary, it\u2019s also important to remember that most Shadow solutions are created with good intentions, and in some cases, there\u2019s legitimate business need for a separately built solution.<\/p>\n<p>Often, teams want to build or buy their own solutions because they can engineer them more affordably or faster themselves, or they have more control over decision making to meet specific needs. These benefits are immediately tangible to teams and often appear to be the right approach. However, the homemade solutions become a risk to the company if teams don\u2019t comply with company standards.<\/p>\n<h2>Building a team at Microsoft<\/h2>\n<p>Shadow IT can exist in any department or group across the company. At Microsoft, we focused our efforts on addressing Shadow IT within business functions\u2014groups that sit outside of traditional engineering organizations\u2014such as Marketing, Sales, and Human Resources, since they need the most technical support.<\/p>\n<p>In 2020, we created a centralized team to address Shadow IT across the company with a focus on Security and Engineering Fundamentals. After two years, we added a workstream for Accessibility as well. While this work is ongoing as we continue to raise the bar on our compliance standards, we\u2019ve made significant progress in all of these areas and learned many lessons along the way.<\/p>\n<h2>How to approach Shadow IT in 3 steps<\/h2>\n<p>It\u2019s time to get to work, but where should you start? Here are three of the most important steps to take.<\/p>\n<h3>Set up the right team<\/h3>\n<p>Create and fund a Shadow team within your security department that is fully responsible and accountable for driving forward your plan every day. This team should be sponsored by the Chief Information Security Officer (CISO) or Chief Information Officer (CIO) and supported by both the IT and Finance departments. Ensure that the central Shadow team has dedicated resources to assist with inventory, driving engineering tooling adoption, and the ability to provide engineering guidance.<\/p>\n<figure id=\"attachment_9129\" aria-describedby=\"caption-attachment-9129\" style=\"width: 950px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-9129\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_fig1-1024x416.jpg\" alt=\"Graphic depicting the centralized shadow team comprised of both security and engineering leads that support partner teams.\" width=\"950\" height=\"386\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_fig1-1024x416.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_fig1-300x122.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_fig1-768x312.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_fig1-1536x624.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_fig1-2048x832.jpg 2048w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_fig1-1920x780.jpg 1920w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><figcaption id=\"caption-attachment-9129\" class=\"wp-caption-text\">Create a structure for your centralized Shadow IT team.<\/figcaption><\/figure>\n<p>Once the Shadow team is set up, appoint a Directly Responsible Individual (DRI) within each department across the company who will be accountable for their respective division\u2019s security compliance. The DRI will become your security champion and primary point of contact. The Shadow team and the DRIs will work together to empower teams to self-manage their own assets.<\/p>\n<h3>Set up standardized reporting<\/h3>\n<p>Create a measurement system with a scorecard to provide metric-based, actionable progress reports to teams and leadership. Focus your reports and discussions on the level of risk instead of compliance. This allows you to prioritize work and look past non-compliant areas that have exceptions. It\u2019s also important to note that red metrics on a scorecard are valuable indications of where you have gaps and how to prioritize resources. Once a red metric gets to green, it should be replaced with a new metric or a broader scope so that you can continuously improve your security posture.<\/p>\n<p>Communicating status to the right stakeholders is key. At the beginning of your journey, conduct reviews with executives frequently to build momentum and reinforce accountability. Over time, teams will be empowered to continue this work as a regular part of their business rhythm.<\/p>\n<h3>Drive culture change<\/h3>\n<p>Foster a culture of security among all employees and vendors who own Shadow assets and services through trainings and customized support. Throughout the ongoing Shadow journey, encourage teams to break down compliance tasks into small, actionable tasks each quarter.<\/p>\n<p>By initially addressing the low hanging fruit, you\u2019ll set teams up for early wins and success. Once they achieve these initial goals, they should set new, bigger goals. This means they\u2019ll reset their metrics and KPIs back to a red state, continually expanding their scope and impact over time. At Microsoft, we celebrated teams who \u201cembraced the red.\u201d This allows for candid conversations about what\u2019s causing the red and what support teams need to get to green.<\/p>\n<p>To drive culture change successfully, it\u2019s important to have support from the top down and bottom up. Senior leadership should reinforce your messaging. Meanwhile, your centralized Shadow team should provide customized support and specific guidance to each department about the resources, funding, and skill requirements they\u2019ll need. Finally, remember to show empathy and appreciation for the work that is taking place. This often adds additional scope and creates a big learning opportunity for many employees and leaders.<\/p>\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"74\" class=\"wp-image-7448\" style=\"width: 300px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/key-takeaways.png\" alt=\"Key Takeaways\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/key-takeaways.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/key-takeaways-300x74.png 300w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<p>Once you&#8217;re ready to reduce your organization\u2019s risk from Shadow IT, you can start putting plans in place to build and fund your centralized Shadow team, create a reporting system to measure and communicate progress, and drive culture change among leaders and employees.<\/p>\n<p>At first, your Shadow team will focus on the biggest engineering and security priorities. As your program gains traction, you will be able to empower departments to start managing this line of work on their own.<\/p>\n<p>To learn more about our ongoing journey on this topic and gain insights that can help you in your own efforts, read our <a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/shining-a-light-on-how-microsoft-manages-shadow-it\/\">article about how we manage Shadow IT<\/a>. There\u2019s no time like the present to get started!<\/p>\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"81\" class=\"wp-image-7482\" style=\"width: 300px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/related_links.png\" alt=\"Related links\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/related_links.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/related_links-300x81.png 300w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<ul class=\"c-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"c-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"c-list\">\n<li><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/shining-a-light-on-how-microsoft-manages-shadow-it\/\">Read more about the ways we&#8217;re shining a light on how Microsoft manages Shadow IT<\/a>.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/modernizing-the-support-experience-with-servicenow-and-microsoft\/\">Check out how we\u2019re modernizing our internal Help Desk experience with ServiceNow<\/a>.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/enabling-modern-support-at-microsoft-with-ai\/\">Learn how we\u2019re enabling a modern support experience at Microsoft with AI<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" style=\"width: 580px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2023\/05\/Customer-Survey-580x85-1.png\" alt=\"We'd like to hear from you!\" \/><\/figure>\n<p><a href=\"mailto:msitstaff@microsoft.com\">Want more information? Email us and include a link to this story and we\u2019ll get back to you.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We periodically update our stories, but we can&#8217;t verify that they represent the full picture of our current situation at Microsoft. We leave them on the site so you can see what our thinking and experience was at the time. You\u2019ve heard a lot about Shadow IT risk, but what is it and what should [&hellip;]<\/p>\n","protected":false},"author":136,"featured_media":9130,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[383,850,115,849,689,848],"coauthors":[651],"class_list":["post-9125","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-azure-networking","tag-end-user-services-and-support","tag-microsoft-azure","tag-network-and-infrastructure","tag-network-security","tag-security-and-risk-management","program-microsoft-digital-perspectives","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Start reducing your organization\u2019s Shadow IT risk in 3 steps<\/title>\n<meta name=\"description\" content=\"Learn three steps to reduce Shadow IT security risks, including how to set up the right team, create a reporting system, and drive culture change.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Start reducing your organization\u2019s Shadow IT risk in 3 steps\" \/>\n<meta property=\"og:description\" content=\"Learn three steps to reduce Shadow IT security risks, including how to set up the right team, create a reporting system, and drive culture change.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-08T15:11:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-02T21:43:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2300\" \/>\n\t<meta property=\"og:image:height\" content=\"1293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Summer Frederickson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Summer Frederickson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\\\/\"},\"author\":{\"name\":\"Summer Frederickson\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/d04eedb7abb24a1fd818d24a4292dc47\"},\"headline\":\"Start reducing your organization\u2019s Shadow IT risk in 3 steps\",\"datePublished\":\"2022-12-08T15:11:19+00:00\",\"dateModified\":\"2026-02-02T21:43:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\\\/\"},\"wordCount\":1057,\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2022\\\/12\\\/10458_hero.jpg\",\"keywords\":[\"Azure networking\",\"End user services and support\",\"Microsoft Azure\",\"Network and infrastructure\",\"Network Security\",\"Security and risk management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\\\/\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\\\/\",\"name\":\"Start reducing your organization\u2019s Shadow IT risk in 3 steps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2022\\\/12\\\/10458_hero.jpg\",\"datePublished\":\"2022-12-08T15:11:19+00:00\",\"dateModified\":\"2026-02-02T21:43:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/d04eedb7abb24a1fd818d24a4292dc47\"},\"description\":\"Learn three steps to reduce Shadow IT security risks, including how to set up the right team, create a reporting system, and drive culture change.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2022\\\/12\\\/10458_hero.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2022\\\/12\\\/10458_hero.jpg\",\"width\":2300,\"height\":1293,\"caption\":\"Microsoft has three recommendations for managing Shadow IT: Set up the right team, create a reporting system, and drive culture change.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Start reducing your organization\u2019s Shadow IT risk in 3 steps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/d04eedb7abb24a1fd818d24a4292dc47\",\"name\":\"Summer Frederickson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/14e463679fe9da1c23c3a71c2f2f434927b12e4f1079b005a3355134fa89953f?s=96&d=mm&r=g5ef30dea4a9cc99a3bcafffde8d7b917\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/14e463679fe9da1c23c3a71c2f2f434927b12e4f1079b005a3355134fa89953f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/14e463679fe9da1c23c3a71c2f2f434927b12e4f1079b005a3355134fa89953f?s=96&d=mm&r=g\",\"caption\":\"Summer Frederickson\"},\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/author\\\/summerf\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Start reducing your organization\u2019s Shadow IT risk in 3 steps","description":"Learn three steps to reduce Shadow IT security risks, including how to set up the right team, create a reporting system, and drive culture change.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/","og_locale":"en_US","og_type":"article","og_title":"Start reducing your organization\u2019s Shadow IT risk in 3 steps","og_description":"Learn three steps to reduce Shadow IT security risks, including how to set up the right team, create a reporting system, and drive culture change.","og_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/","og_site_name":"Inside Track Blog","article_published_time":"2022-12-08T15:11:19+00:00","article_modified_time":"2026-02-02T21:43:26+00:00","og_image":[{"width":2300,"height":1293,"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_hero.jpg","type":"image\/jpeg"}],"author":"Summer Frederickson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Summer Frederickson","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/"},"author":{"name":"Summer Frederickson","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/d04eedb7abb24a1fd818d24a4292dc47"},"headline":"Start reducing your organization\u2019s Shadow IT risk in 3 steps","datePublished":"2022-12-08T15:11:19+00:00","dateModified":"2026-02-02T21:43:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/"},"wordCount":1057,"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_hero.jpg","keywords":["Azure networking","End user services and support","Microsoft Azure","Network and infrastructure","Network Security","Security and risk management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/","name":"Start reducing your organization\u2019s Shadow IT risk in 3 steps","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_hero.jpg","datePublished":"2022-12-08T15:11:19+00:00","dateModified":"2026-02-02T21:43:26+00:00","author":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/d04eedb7abb24a1fd818d24a4292dc47"},"description":"Learn three steps to reduce Shadow IT security risks, including how to set up the right team, create a reporting system, and drive culture change.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/#primaryimage","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_hero.jpg","contentUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_hero.jpg","width":2300,"height":1293,"caption":"Microsoft has three recommendations for managing Shadow IT: Set up the right team, create a reporting system, and drive culture change."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/start-reducing-your-organizations-shadow-it-risk-in-3-steps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Start reducing your organization\u2019s Shadow IT risk in 3 steps"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/d04eedb7abb24a1fd818d24a4292dc47","name":"Summer Frederickson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/14e463679fe9da1c23c3a71c2f2f434927b12e4f1079b005a3355134fa89953f?s=96&d=mm&r=g5ef30dea4a9cc99a3bcafffde8d7b917","url":"https:\/\/secure.gravatar.com\/avatar\/14e463679fe9da1c23c3a71c2f2f434927b12e4f1079b005a3355134fa89953f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/14e463679fe9da1c23c3a71c2f2f434927b12e4f1079b005a3355134fa89953f?s=96&d=mm&r=g","caption":"Summer Frederickson"},"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/author\/summerf\/"}]}},"jetpack_featured_media_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/12\/10458_hero.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9hcZA-2nb","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/9125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/136"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=9125"}],"version-history":[{"count":13,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/9125\/revisions"}],"predecessor-version":[{"id":22263,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/9125\/revisions\/22263"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/9130"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=9125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/categories?post=9125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/tags?post=9125"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=9125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}