By Tim Nackos Published on March 18, 2026
Shadow AI—the use of AI-powered tools by company personnel without IT approval—can create SOC 2 audit gaps because it introduces unvetted third-party services into the system, may send confidential data outside governed channels, and bypasses the change management, access control, and vendor oversight processes that auditors examine. This article explains what shadow AI is, how [...]
