Skip to main content

Shadow IT in K–12: Identifying and Managing Unsanctioned Tools Safely

One of the most overlooked cybersecurity challenges in schools isn’t ransomware, phishing, or even outdated systems; it’s the tools teachers and staff use every day without IT knowing about them.

This hidden world of applications, cloud services, and browser extensions is known as Shadow IT, and while it often starts with good intentions, it can quietly create serious data privacy and security risks.


What Is Shadow IT?

“Shadow IT” refers to any software, app, website, or service used within your district that hasn’t been formally approved, secured, or monitored by IT.

In schools, it often includes:

  • Chrome extensions added by teachers or students.
  • Free SaaS tools used for classroom engagement.
  • Shared Google Sheets or Forms handling sensitive data.
  • Apps that connect to Google Workspace or Microsoft 365 without review.

Most of these tools are adopted out of necessity, creativity, or convenience, not malice; teachers simply want to make learning more engaging and efficient. The problem arises when those tools access student data, sync to district systems, or bypass security controls.


Why Shadow IT Is a Problem

When staff use unapproved tools, several issues emerge:

  1. Data Privacy Risk – Many tools collect student or staff information without FERPA or COPPA compliance.
  2. Unknown Integrations – OAuth-connected apps can access Gmail, Drive, or OneDrive data without oversight.
  3. Account Compromise – Reused or weak passwords on third-party apps create new attack vectors.
  4. Compliance Gaps – ITEC 7230a and NIST CSF 2.0 require districts to manage and monitor systems handling sensitive data.
  5. Support Burden – IT may not even know an issue exists until something breaks or data is leaked.

Shadow IT is rarely about rule-breaking; it’s about unmet needs. Teachers often find solutions faster than procurement or IT policy can keep up. The challenge isn’t to eliminate this behavior, but to manage it safely.


Step 1: Identify What’s Already in Use

The first step is visibility. You can’t manage what you don’t know exists.

In Google Workspace:

  • Admin Console → Security → Access and Data Control → API Controls → App Access Control.
  • Review OAuth-connected apps and mark which are trusted, restricted, or blocked.
  • Export the list regularly to track new integrations.

In Microsoft 365 / Entra:

  • Use the Cloud App Security (Defender for Cloud Apps) dashboard to detect unmanaged apps connected to Microsoft accounts.
  • Review and revoke risky OAuth apps.
  • Check the Audit Log for new third-party app consents.

Network and Endpoint Logs:

  • DNS filters (e.g., Cloudflare, Cisco Umbrella, FortiGuard) can log outbound connections to cloud tools.
  • Review software inventories via RMM tools, Intune, or Mosyle to spot unsanctioned installs.


Tip: Start small. Focus on identifying tools that connect directly to student data systems or core accounts first.


Step 2: Define an Approval and Review Process

Instead of blocking everything, create a process that allows staff to request new tools safely.

Example Workflow:

  1. Teacher submits a quick Google Form or helpdesk ticket requesting app approval.
  2. IT/Data Governance reviews for:
    • Data type collected (student info, login credentials, etc.)
    • Vendor’s privacy policy and terms of service.
    • Security practices (encryption, MFA support, SSO options).
  3. If approved, add to the Approved App List.
  4. If denied, communicate why and suggest alternatives.

This approach turns IT from a gatekeeper into a partner, helping staff innovate safely.


Step 3: Educate and Empower Staff

Teachers want to do the right thing; they just need clarity.

Strategies That Work:

  • Publish an Approved App Catalog: Create a living document or web page listing approved and pending apps.
  • Explain the “Why”: Include brief notes like “Approved, vendor signs SDPC agreement” or “Denied, requires access to sensitive data.”
  • Q&A Sessions: Let teachers ask about tools before they try them.
  • Recognize Good Digital Citizenship: Highlight staff who follow safe tech practices.

When teachers feel included, they’re more likely to bring IT in early, reducing the risk of surprises later.


Step 4: Review and Clean Up Regularly

Once per semester or school year, review all connected third-party apps and browser extensions.

  • Remove unused or inactive apps.
  • Reassess vendor compliance.
  • Revoke access for discontinued tools or expired contracts.
  • Monitor OAuth scopes. What data vendors are accessing in Google or Microsoft.


Shadow IT isn’t going away, and that’s okay. It’s a reflection of passionate educators finding creative ways to enhance learning.


The goal of IT shouldn’t be to eliminate that creativity but to channel it safely. By building visibility, communication, and trust, districts can empower teachers while keeping student data secure.

Security in education works best when it supports innovation, rather than stifling it.


Disclaimer: Platform interfaces and security controls evolve over time. Always consult the most current documentation for Google Workspace and Microsoft when reviewing app access and permissions.

Comments

Popular posts from this blog

Why Securing Things “Backwards” Is So Difficult in K–12 IT

Many K–12 districts are facing a difficult reality: after years of convenience-first technology use, the time has come to adopt a more secure, structured approach. Cyber insurance requirements are tightening. State and federal regulations are growing. Threats are increasing. And school systems are expected to modernize their security posture quickly and without disrupting learning. But strengthening security in a district that has operated with wide-open access for years isn’t just a technical challenge; it’s a cultural renovation. Transitioning from “anything goes” to “secured by design” is one of the hardest shifts for schools to make. Not because people don’t care about security, but because securing things backwards means undoing years of habits, expectations, and legacy decisions. Here’s why it’s so difficult , and how districts can make the transition without breaking what’s working. Why Securing Things Backwards Is Hard 1. You’re Taking Away What People Are Used To When classr...

Vendor and Third-Party Risk Management in K–12: Protecting Student Data Beyond Your Walls

Modern school districts rely on hundreds of third-party applications, ranging from learning management systems and browser extensions to assessment platforms and parent communication tools. Each of these vendors connects to your network, accesses your data, or processes sensitive student information. Every one of them represents potential risk. While internal defenses like patching, MFA, and backups are essential, vendor risk management ensures your district is protected from vulnerabilities that originate outside your network . Why Vendor Risk Management Matters for Schools School technology ecosystems have expanded rapidly over the last decade. What used to be a handful of software systems is now a web of cloud tools, integrations, and data sharing agreements. Without strong oversight, this complexity creates real-world risk: Data Breaches via EdTech Vendors: Many school breaches occur not from internal attacks, but through compromised third-party systems. Privacy Compliance Exp...

Incident Response for Schools: Why Playbooks Matter

When a cybersecurity incident occurs, such as a phishing email, ransomware outbreak, or accidental exposure of student data, the first few minutes are crucial. Yet, many school districts lack a clear, step-by-step plan for responding. The result? Confusion, delayed decisions, extended downtime, and even compliance failures. That’s why every school should have Incident Response (IR) playbooks : simple, one-page guides that outline who to call, what to do, and how to contain and recover from common incidents. Why Playbooks Are Critical in Schools Clarity Under Pressure: When panic sets in, playbooks provide structure. Staff know exactly what steps to take. Consistency: Every incident is handled the same way, reducing the risk of mistakes. Compliance: For Kansas schools, ITEC 7230a requires incident response planning and documentation. Playbooks help districts meet that standard. Framework Alignment: The NIST Cybersecurity Framework (CSF) 2.0 emphasizes Respond as o...