- Enterprise Architecture: The Struggle is Real
- Posts
- Shadow Systems and Stealth IT: When the Business Takes Matters Into Their Own Hands
Shadow Systems and Stealth IT: When the Business Takes Matters Into Their Own Hands
Greetings, architects of sanctioned structure and unsanctioned chaos!
This week, we descend into the dimly lit underworld of Shadow Systems — where business teams, tired of waiting for “the official roadmap,” spin up their own tools like renegade technologists with a corporate credit card.
The Main Story: The Case of the Mysterious Spreadsheet Colony
Picture this: You walk into a meeting, and someone casually mentions “the dashboard.”
You freeze. What dashboard?
Your architecture repository hasn’t seen a dashboard since 2021.
But there it is — a homegrown Excel empire with 14 tabs, 76 hidden columns, 800 formulas, and one brave pivot table holding the organisation together with duct tape and hope.
And it doesn’t stop there.
Soon you uncover:
A “temporary” Access database from 2008 still running mission-critical reporting
A rogue SaaS subscription for a tool named something like ZapNinja360
A “quick prototype” built by an intern that somehow made it to production
A team using Trello, Notion, Miro, and a whiteboard… simultaneously
Welcome to Stealth IT: where innovation blossoms, governance shivers, and integration cries quietly in a corner.
TOGAF to the Rescue (With a Knowing Side-Eye)
TOGAF, ever the wise-but-slightly-sarcastic friend, looks at the proliferation of shadow solutions and whispers:
“If you don’t give them an architecture… they will build one anyway.”
Enter the Architecture Vision and Stakeholder Management techniques:
Clarify pain points early before teams go tool-shopping
Co-create capability roadmaps so the business feels heard
Provide guardrails, not handcuffs
And yes, let them innovate — but inside a sandbox that won’t set the enterprise on fire
Educational Twist: Making Peace With the Shadows
A few real-world TOGAF-aligned practices to tame the stealthy beasts:
Conduct Capability Assessments to reveal why Shadow IT emerges
Provide Approved Technology Patterns that are easy to adopt
Use Architecture Contracts to keep solutions compliant without being oppressive
Treat Shadow Systems as Signals, not threats — they show where architecture must improve
Humor in Diagrams

Reader Engagement
Poll:
Which Shadow IT artifact have you discovered in the wild?
Excel Monolith
SaaS Subscription Surprise
The Forgotten Access Database
“Oh, that? We thought IT knew.”
Next Week’s Tease
Episode 46: The Integration Tango — where APIs dance, data stumbles, and someone always steps on governance’s toes.