Asset & Data Management · AD-Q10

Question: Are discovery and approval controls in place for shadow IT and SaaS applications handling organizational data?

Objective — Why This Matters

Unvetted SaaS and unsanctioned tools leak data and expand the attack surface. Lightweight discovery and an approval path keep agility without sacrificing control.

Maturity Levels (0–5)

0 — Unaware
No view of SaaS usage; approvals bypassed.
1 — Ad Hoc
Usage noticed via bills or emails; spreadsheets track a few apps.
2 — Defined
Discovery methods documented; intake/approval checklist created.
3 — Managed
SaaS inventory maintained; risk-tiering and periodic reviews enforced.
4 — Integrated
SSO and provisioning integrated; offboarding and data export defined.
5 — Optimized
Usage analytics drive consolidation; contracts and risks continuously re-evaluated.

How to Level Up

From → To Actions
0 → 1 Capture current SaaS apps from finance and email domains.
1 → 2 Define intake checklist (security, privacy, data location, exit plan).
2 → 3 Maintain SaaS register with owner, data types, tier, last review date.
3 → 4 Enforce SSO and de-provisioning; document data export/offboarding.
4 → 5 Monitor usage and cost; consolidate overlapping tools and reduce risk.

People / Process / Technology Enablers

Evidence Required

Metrics / KPIs

Low-Cost / Open-Source Options (MSME)

Purpose Tool Notes
Discovery Email domain audit, finance ledger Identify sign-ups and spend.
Register Sheets / Notion Tiering, owner, review date.
SSO Free tiers of IDP Enforce SSO for priority apps.

Common Pitfalls

Compliance Mapping

Standard Clauses / Notes
ISO/IEC 27001 A.5.19 (use of cloud services), A.5.30 (supplier).
NIST CSF 2.0 ID.AM-4, ID.SC-1/2.
DPDP Act 2023 Processor obligations and contracts.
NIRMATA Scoring AD-Q10 Level ≥3 requires SaaS register + SSO + reassessment cadence.