Shadow IT: Finding Your Unknown Internet-Facing Assets
Over half of SaaS applications used by organizations are adopted without security team involvement. Learn how external scanning, DNS enumeration, and certificate transparency monitoring discover the internet-facing assets you do not know about.
The Shadow IT Problem
Shadow IT refers to technology resources deployed within an organization without the knowledge or approval of the IT or security team. In the context of external security, shadow IT manifests as internet-facing assets -- subdomains, servers, applications, and services -- that exist outside the organization's documented inventory.
The scale of shadow IT is significant. Research consistently shows that organizations use substantially more SaaS applications and cloud services than their IT teams are aware of. Developers spin up test environments, marketing teams deploy campaign landing pages, business units adopt collaboration tools, and departments procure cloud services independently. Each of these activities can create internet-facing assets that the security team does not know about and therefore cannot protect.
Shadow IT is not inherently malicious. Most shadow IT exists because employees are trying to work more efficiently and the formal procurement process is too slow or too cumbersome. The security risk is not the intent but the outcome: assets that are not inventoried are not monitored, not patched, not configured to organizational security standards, and not decommissioned when their purpose ends.
From an attacker's perspective, shadow IT is a gift. These assets often have default configurations, unpatched software, test data that includes production credentials, and no monitoring. They are the path of least resistance into an organization. Discovering and managing these assets is a core function of external attack surface management.
Where Shadow IT Hides
Understanding where shadow IT typically appears helps focus discovery efforts.
Subdomains
The most common form of shadow IT is unauthorized subdomains. Developers create staging.example.com or test-api.example.com for development work. Marketing sets up campaign.example.com for a product launch. A past employee created old-project.example.com that nobody remembered to decommission -- creating a potential subdomain takeover risk.
Each subdomain may host a web application, API endpoint, or service that was never reviewed by the security team. These subdomains are discoverable through DNS enumeration and certificate transparency logs.
Cloud Services
Teams provision cloud infrastructure -- EC2 instances, Azure App Services, GCP Cloud Run containers -- under organizational cloud accounts or, worse, under personal accounts. These services may serve content under the organization's domain via CNAME records or operate under cloud-provided hostnames with no obvious connection to the organization.
SaaS Applications
Business units adopt SaaS tools and configure them with organizational branding and custom domains. A customer support team might deploy a helpdesk at support.example.com. A sales team might use a landing page builder pointed at get.example.com. Each creates an internet-facing presence that the security team may not know about.
Legacy Infrastructure
Services that were once formally managed but fell off the maintenance schedule. The blog that was migrated to a new platform but the old installation was never removed. The demo server that was set up for a conference presentation three years ago. The test database that was made internet-accessible for a contractor who finished the project a year ago.
Third-Party Integrations
Vendors and partners may set up infrastructure that uses your domain. A managed service provider might create monitoring.example.com. A marketing agency might deploy analytics at track.example.com. These assets are part of your attack surface even though you did not create them.
Discovery Techniques
Effective shadow IT discovery uses multiple techniques because no single method finds everything.
DNS Enumeration
DNS enumeration discovers subdomains by querying DNS records systematically. Techniques include:
Brute-force resolution: Testing a wordlist of common subdomain names against your domain. Names like dev, staging, test, api, admin, mail, vpn, ftp, db, and hundreds of others are tried against your domain to see which ones resolve.
DNS record walking: Querying all record types (A, AAAA, CNAME, MX, NS, TXT, SRV) for discovered subdomains to find additional infrastructure references.
Reverse DNS: Looking up PTR records for IP ranges associated with your organization to find hostnames that map back to your domains.
CyberShield performs DNS enumeration as part of its scanning process, testing common subdomain prefixes and resolving DNS dependencies automatically.
Certificate Transparency Monitoring
Certificate Transparency (CT) logs are a particularly powerful discovery tool because every publicly trusted TLS certificate must be logged before browsers accept it. When someone in your organization obtains a certificate for internal-tool.example.com, that certificate appears in CT logs regardless of whether it is in your DNS records or inventory.
Querying CT logs reveals:
- Every subdomain that has ever had a TLS certificate
- The certificate authority that issued each certificate
- The issuance date, providing a timeline of infrastructure changes
- Certificates for subdomains you may not have known existed
# Query crt.sh for all certificates issued to your domain
https://crt.sh/?q=%.example.com
Port Scanning
Port scanning discovered IP addresses reveals what services are running. A host that was expected to run only a web server (ports 80, 443) but also has SSH (22), MySQL (3306), and a development framework debug port (3000) exposed tells a story about shadow IT -- someone deployed a development environment that was never locked down.
HTTP Probing
Discovered hosts are probed with HTTP requests to identify web applications, APIs, and services. Response headers, page content, and redirect behavior reveal the technology stack and purpose of each service.
Cloud Asset Enumeration
For organizations using cloud providers, cloud-specific techniques can discover shadow IT:
- AWS: Checking for S3 buckets, CloudFront distributions, and API Gateway endpoints associated with your domain
- Azure: Checking for App Service and Blob Storage endpoints
- GCP: Checking for Cloud Storage and App Engine instances
From Discovery to Action
Finding unknown assets is only the first step. Each discovered asset requires evaluation and action.
Asset Classification
For each discovered asset, determine:
-
Is it legitimate? Does someone in the organization own and use this asset? If yes, it needs to be brought under security management. If no, it needs to be decommissioned.
-
Who owns it? Identify the team or individual who created or manages the asset. This may require investigating DNS records, certificate issuance history, and server content.
-
What is its purpose? Understanding the asset's function determines what security controls it needs.
-
What data does it process? Assets handling sensitive data (customer PII, financial data, credentials) require stricter security controls.
-
Is it still needed? Many shadow IT assets were created for temporary purposes that have long since ended.
Response Actions
For active, legitimate assets:
- Add to the formal asset inventory
- Apply organizational security standards (TLS, headers, authentication)
- Include in regular scanning and monitoring
- Assign a responsible owner
For inactive or unnecessary assets:
- Decommission the service
- Remove DNS records pointing to it
- Revoke any associated certificates
- Remove cloud resources to stop billing
For assets that cannot be immediately classified:
- Restrict access (add firewall rules, require authentication)
- Monitor for activity
- Investigate ownership through change management records, cloud billing, and team inquiries
Building a Continuous Discovery Program
Shadow IT is not a one-time problem. New assets appear continuously as teams deploy services, create integrations, and experiment with technology. A sustainable discovery program runs continuously rather than as a periodic audit.
Weekly scanning of all organizational domains catches new assets within days of their creation. CyberShield's scheduled scanning automates this process, comparing each scan against previous results to highlight new discoveries.
Certificate transparency monitoring provides near-real-time alerts when new certificates are issued for your domains. This is often the earliest indicator of a new service being deployed.
Baseline comparison between scans highlights changes: new subdomains that appeared, new ports that opened, new services that were deployed. Treating every change as a potential shadow IT indicator ensures nothing slips through.
Asset inventory reconciliation compares discovered assets against the formal inventory at regular intervals. Any asset found in scans but not in the inventory warrants investigation.
Onboarding and change management integration catches shadow IT at creation time. When new DNS records are created, new cloud resources are provisioned, or new certificates are requested, those events should trigger a security review. Maintaining clean domain registration and WHOIS hygiene is a key part of this process.
What CyberShield Discovers
CyberShield's scanning process acts as a continuous shadow IT discovery tool:
DNS enumeration tests common subdomain patterns against your domains, finding subdomains that are actively resolving. Each discovered subdomain is then scanned for TLS, HTTP, port, and other security configurations.
Certificate transparency queries identify every certificate issued for your domains and subdomains, including certificates for assets not in your DNS records.
Port scanning discovers services running on discovered hosts, revealing not just web servers but databases, development tools, administrative interfaces, and other services that may indicate shadow IT.
Asset tracking maintains an inventory of all discovered hosts across scans, showing when each was first seen, when it was last seen, and whether it is still active. Hosts that appear between scans are flagged as new discoveries.
Score assessment of discovered assets immediately indicates their security posture. A newly discovered subdomain with an expired certificate, no security headers, and exposed development ports is clearly shadow IT that needs attention.
The most effective approach to shadow IT is not trying to prevent it entirely -- that tends to push employees toward even less visible workarounds. Instead, focus on rapid discovery and governance: find new assets quickly, assess their security posture, bring them under management, and decommission those that are no longer needed. Continuous external scanning provides the discovery engine that makes this approach practical.
Continue Reading
What Is External Attack Surface Management (EASM)? A Complete Guide
External Attack Surface Management is the continuous discovery, inventory, and monitoring of all internet-facing assets. Learn how EASM differs from pentesting and vulnerability scanning, and how to implement it for your organization.
Open Ports and Service Exposure: Assessment and Remediation
Identify unnecessarily exposed services, close risky ports, suppress version banners, and configure firewall rules to minimize your attack surface.
Understanding Your Security Score: How It's Calculated
A detailed guide to how CyberShield calculates your security posture score, including weighted category scoring, score decay over time, grade thresholds, and actionable strategies for improving each category.