6 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
This article discusses the tension between security teams and IT staff regarding shadow IT. It emphasizes the need for collaboration and shared responsibility to streamline processes, allowing teams to use necessary tools without compromising security. By changing how security requirements are managed, organizations can reduce delays and foster innovation.
If you do, here's more
The article highlights the ongoing friction between security teams and employees who want to use tools that improve their productivity. Employees often turn to shadow IT—unauthorized tools and services—when company-approved resources fall short. This creates a cycle where security teams react to shadow IT by enforcing stricter controls, which frustrates employees further. Engineers need quick access to innovative tools, but security protocols can delay product releases and complicate configurations. As a result, both parties end up feeling adversarial, with security teams caught in a whack-a-mole game of controlling unauthorized tech usage.
A shift is proposed where security teams should focus on setting clear requirements and allowing non-security teams to take responsibility for their choices. Developers and IT staff can use integrated security tools to ensure compliance with practices that avoid common vulnerabilities. If they adhere to these practices, security approvals could happen much faster. The article emphasizes that if developers mismanage security, they should be held accountable, rather than placing all the burden on the security team. This model promotes trust and responsibility while reducing the need for shadow IT.
The article also draws a parallel to how finance teams manage company charge cards. They set policies and review usage without micromanaging every transaction. The same could be applied to security, where IT workers agree to security standards and can deploy tools as long as they maintain compliance. This change would reduce delays in getting necessary tools and minimize risks associated with shadow IT. However, with this freedom comes a catch: individuals must own the consequences of their decisions. If they fail to meet security standards, they face repercussions, ensuring that both security and operational efficiency are maintained.
Questions about this article
No questions yet.