← All frameworks

Risk

Shadow system risk assessment framework

Every org has hidden systems — quiet spreadsheets, personal drives, shared folders that bypass controls. Find them, assess their risk, and decide what to fix, formalise or retire. Built for real-world teams who need clarity, not judgement.

Who it's for

Security teams, data protection officers, and operational leaders who suspect (correctly) that the official systems aren't the whole story.

When to use it

Before a major audit, after an incident, or when onboarding a newly acquired team. Also: any time someone says "oh, we just use a spreadsheet for that."

Why shadow systems exist

People don't build workarounds because they want to break the rules. They build them because the official tools don't work for how they think, what they need to see, or the assistive tech they rely on. Shadow systems are a symptom — usually of an accessibility or usability failure upstream.

How to find them without blame

The framework includes a discovery script designed to surface workarounds without triggering defensiveness. Frame the conversation as "help us understand what's working" rather than "what are you doing wrong".

  • Start with the team most likely to have them — finance, HR, customer support.
  • Ask what they email to themselves, what spreadsheets they keep, what they print.
  • Ask why — the why is more important than the what.

Decide: fix, formalise or retire

Not every shadow system needs to be killed. Some are sensible. The framework gives you a scoring matrix across data sensitivity, user count, and business criticality so you can decide each one on its merits.

In practice

How to run it

  1. 1

    Run discovery interviews with three to five teams. Promise no blame, mean it.

  2. 2

    Log each shadow system against the scoring matrix.

  3. 3

    For each, choose: formalise (move into a sanctioned tool), fix (improve the official tool so the workaround isn't needed), or retire (with a migration plan).

  4. 4

    Report the count and direction of travel — not the names — to leadership quarterly.

Want the full story?

The frameworks are most powerful alongside the case studies, research, and playbooks in the book.

Buy Access Denied →