When an employee bypasses an "approved" tool for a frictionless, web-based alternative, they aren’t just being productive—they are effectively "hiring" a new vendor outside the scope of security governance. Multiply this across an entire enterprise, and you no longer have a few rogue apps; you have a shadow supply chain.
Our latest research report, The Shadow Supply Chain, reveals how this hidden ecosystem is driven by user behavior and accelerated by Shadow AI. Moreover, our report revealed an almost haunting reality: the average security team is currently blind to 72.9% of its active vendor supply chain, a massive inventory gap that renders every compliance certification you hold technically inaccurate.
In this first installment of a three-part series, we explore the inventory gap in more detail: the distance between the list of vendors security teams think they have and what is actually happening on the ground. We’ll explore how this gap forms and why it's time to stop looking at what we intended to buy and start looking at what our employees are actually using.
Traditional Vendor Risk Management (VRM) is built on a foundation of "Intent"—the purchase order, the contract, and the legal review. But in a world driven by product-led growth, modern infrastructure is built on behavior—specifically, user behavior.
To quantify the gap between this intended control and operational reality, we analyzed anonymized telemetry from 20 security-conscious organizations, covering 3,470 application usage records and over 1,400 unique vendors. Of those applications we scanned, 2,531 instances were operating completely unmonitored, a 72.9% gap between what is being monitored and what’s being used on the ground.
The data from this forensic analysis is clear: the real vendor inventory is 8x larger than what appears on the official "approved" list. Users can now engage vendors with a single click, often sharing sensitive corporate information with unauthorized tools. This results in a "shadow supply chain" of vendors you simply cannot see—and what you cannot see, you cannot govern.
This isn't a failure of diligence by your procurement team or a failure of detection by your Security Operations Center (SOC); it is a structural failure of legacy tools designed for a pre-SaaS era. When a user can sign up for a tool in seconds, "Intent" becomes a trailing indicator that arrives months after the risk has already been introduced.
We often frame Shadow IT usage as negligent, but the reality is much more nuanced: people are simply trying to do their jobs. However, in attempts at doing their job faster and more efficiently, the modern enterprise’s supply chain is no longer driven by centralized procurement—it is driven by individual employee behavior.
So, how has the user become the primary architect of the hidden supply chain? It typically boils down to three human-centric factors:
These aren't one-off visits; these interactions happen daily. Our report outlines how this usage has become so deeply ingrained in core workflows that it has created a new vendor landscape that is completely invisible to the security team.
When users interact with unapproved applications, they are effectively engaging a new vendor entirely outside the scope of security. This usage typically falls into three distinct "risk architectures" that drive the hidden supply chain:
Note: The data below is cited directly from The Shadow Supply Chain report.
The "shadow" impact isn't just about the number of users; it's about the sensitivity of the data—from internal network maps to unvetted document processing—moving beyond the organization's defensive perimeter.
When 73% of your supply chain is invisible, your incident response is decoupled from reality. You are effectively hunting threats in only a quarter of the forest. Because users are now the driving force behind your true supply chain, following a shortlist of "approved" vendors means you are missing both the scale of your exposure and the risks that lie dormant in unmonitored tools.
We need a new governance model that follows the user, not the purchase order.
Be sure to stick around for our next blog, where we dive into why SSO fails to address this gap and how Shadow AI is worsening the problem.
Or, Read the full Shadow Supply Chain report here to see how UpGuard User Risk enables governance over this hidden supply chain through usage-based discovery.