
Strategic Insight: MSPs must stop viewing Shadow AI as a single category. It is a distributed condition spanning five control planes. A governance model that ignores any one of these surfaces is structurally incomplete.
The Five Surfaces of Risk
| Surface | Description |
|---|---|
| Shadow Endpoint | Local AI tools (Claude, Ollama) interacting with endpoint data. |
| Shadow Identity | High-frequency usage of AI tools by specific, high-risk user roles. |
| Shadow Infrastructure | Outbound API calls & egress to external inference endpoints. |
| Shadow OAuth | Durable tokens with broad access to M365/GWS resources. |
| Shadow Agent | Autonomous agents/workflows operating as non-human entities. |
Operational Recommendations
- Consent Inventory: Implement fleet-wide, continuous inventory of all OAuth grants.
- The 2-Minute Audit: If you cannot trace an AI alert to a raw log event within 120 seconds, your detection is noise.
- Documentation as Defense: Enumerating the absence of AI tools is a defensible artifact for cyber insurance and audits.

