top of page

Shadow SaaS Is Not an IT Problem. It’s an Identity Problem.

Shadow SaaS isn’t just unsanctioned software.

It’s unmanaged identity.

And that’s why traditional IT controls fail to contain it.


Shadow SaaS Is Not an IT Problem. It’s an Identity Problem.
Shadow SaaS Is Not an IT Problem. It’s an Identity Problem.

We’ve Been Framing Shadow SaaS Wrong

Shadow SaaS is usually described as:

  • Employees adopting tools without IT approval

  • Departments bypassing procurement

  • Unsanctioned cloud usage


That framing makes it sound like a governance issue.

Or worse — a user behavior issue.

It’s neither.


Shadow SaaS is fundamentally an identity control failure.


Apps Don’t Create Risk. Access Does.

An unknown SaaS app sitting unused creates no exposure.

Risk begins the moment:

  • An employee signs up with a corporate email

  • OAuth access is granted to files or inboxes

  • A service account connects to a CRM

  • A contractor provisions an admin account


Shadow SaaS becomes dangerous when identity connects to data.

That’s not an IT procurement problem.

That’s a perimeter problem.


The Data Makes This Clear

According to Waldo Security’s 2025 SaaS & Cloud Discovery Report:

  • 97% of SaaS applications are unknown to IT

  • 100% of organizations have unauthorized AWS, Azure, or GCP accounts

  • Less than 1% of SaaS accounts enforce MFA


That means the vast majority of identity-based access is happening outside centralized enforcement.

The real issue isn’t that IT doesn’t know about every app.

It’s that identities are operating beyond governance.


Read the full findings in the 2025 SaaS & Cloud Discovery https://www.waldosecurity.com/2025-saas-and-cloud-discovery-report


Why IT-Centric Controls Don’t Work

Traditional controls focus on:

  • Vendor reviews

  • Network filtering

  • CASB alerts

  • Procurement approvals


But modern SaaS adoption bypasses all of them.

Employees don’t deploy infrastructure anymore.

They authenticate.

And authentication is controlled by identity systems — not IT ticket queues.


This is why the CISA Zero Trust Maturity Model places identity at the center of modern security architecture:https://www.cisa.gov/zero-trust-maturity-model


If identity is the control plane, Shadow SaaS is an identity visibility failure.


OAuth Turned Shadow SaaS Into Infrastructure

OAuth made SaaS frictionless.

With one click, users grant:

  • File system access

  • Inbox access

  • Calendar permissions

  • CRM data visibility

Often permanently.


CISA’s Secure Cloud Business Applications (SCuBA) guidance explicitly warns that unmanaged OAuth permissions create persistent access paths that survive offboarding and evade traditional monitoring:

That’s not Shadow IT.

That’s Shadow Identity.


Compliance Already Treats This as an Identity Issue

Modern frameworks don’t ask:

“Was this app approved?”

They ask:

  • Who has access?

  • Can you prove it’s appropriate?

  • Can you revoke it everywhere?


The NIST Privacy Framework and ISO/IEC 27001 require accountability and traceability across systems — not just sanctioned ones:

If you can’t enumerate identities across SaaS, you can’t demonstrate compliance — regardless of procurement policy.


Why Shadow SaaS Keeps Growing

Because identity is frictionless.

Users:

  • Reuse corporate emails

  • Grant OAuth access casually

  • Sync data across tools

  • Adopt AI platforms instantly


SaaS spreads at the speed of authentication.

IT reviews can’t keep up.

Identity visibility must.


Reframing the Solution

If Shadow SaaS were purely an IT problem, the solution would be tighter procurement controls.

But since it’s an identity problem, the solution is different:

  • Continuous discovery of SaaS usage

  • Visibility into identity and OAuth access

  • Enforcement of SSO and MFA coverage

  • Lifecycle alignment for humans and integrations

  • Governance of non-human identities


The perimeter is no longer the network.

It’s every authenticated access path.


Why Discovery Comes First

You can’t govern identities in apps you don’t know exist.

Waldo Security’s SaaS & Cloud Discovery Engine helps organizations:

  • Discover known and unknown SaaS apps

  • Identify identities bypassing SSO

  • Surface OAuth tokens and delegated access

  • Detect Shadow CSP environments

  • Map identity exposure to compliance frameworks


This shifts Shadow SaaS from an unknown problem to a measurable perimeter.


Conclusion: Stop Blaming Users. Start Governing Identity.

Shadow SaaS isn’t rebellion.

It isn’t carelessness.

It isn’t an IT failure.

It’s what happens when identity governance doesn’t extend far enough.

Apps don’t create exposure. Identities do.

If identity is the new perimeter, then Shadow SaaS is simply the part of that perimeter you haven’t mapped yet.

See how organizations are uncovering Shadow SaaS and identity blind spots in the https://www.waldosecurity.com/2025-saas-and-cloud-discovery-report


About Waldo Security

Waldo Security helps organizations discover, classify, and secure every SaaS and cloud service in use — known or unknown. By exposing unmanaged identities, OAuth risk, and Shadow IT, Waldo enables security teams to defend the identity perimeter with clarity and continuous evidence.




Comments


bottom of page