Unauthorized SaaS Applications and Corporate Policy

Identifying the Reason for Non-compliance

Question

A report identified that several of a company's SaaS applications are against corporate policy.

Which of the following is the MOST likely reason for this issue?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

The most likely reason for the issue identified in the report is A. Shadow IT.

Shadow IT refers to the use of technology systems, software, or applications within an organization without the approval or knowledge of the IT department or other governing bodies. It usually arises when employees use unauthorized or non-compliant applications or services to perform their job functions.

In this scenario, employees may have subscribed to SaaS applications without consulting with the IT department or following the company's policies and procedures. This could lead to various issues, such as security risks, compliance violations, and potential data breaches.

Sensitive data and encryption are important factors to consider when using any application, but they are not the most likely reason for the issue in this scenario. If sensitive data is being stored in the unauthorized SaaS applications, it may increase the risk of data exposure or breach. However, the root cause of the issue is still Shadow IT.

Vendor lock-in refers to a situation where a company is unable to switch to another vendor or provider because of dependencies on the existing vendor's products or services. This is not related to the scenario at hand since it does not explain why the SaaS applications are against corporate policy.

In summary, the most likely reason for the issue identified in the report is Shadow IT. The use of unauthorized SaaS applications by employees can lead to various problems, including security risks, compliance violations, and potential data breaches.