- Features
- Pricing
- English
- français
- Deutsche
- Contact us
- Docs
- Login

Is your team losing 12 hours a week to manual glue work?
The blunt technical reality is that shadow IT does not usually start with malicious intent: it starts with a developer trying to move faster than the central IT ticketing system allows. When the process for requesting a new PostgreSQL instance takes three weeks and involves four different departments, highly productive contributors bypass friction by spinning up unvetted, off-the-books cloud resources to meet a deadline.
This decentralized adoption creates an invisible architecture of orphaned S3 buckets, dormant test environments, and legacy database snapshots that operate outside routine patching cycles.
This is the "Hidden Factory" of IT management: a massive, unmeasured layer of rework loops, manual adjustments, and off-the-books problem solving that consumes a significant portion of a company’s total capacity without adding a single unit of value to the end product.
In software development, this translates to the "glue work" that keeps everything from falling apart but remains invisible to leadership: coordinating between teams, unblocking stuck tasks, and manually syncing environments.
Modern platform engineering aims to solve this by making the "right way" the "easy way." By utilizing a platform like Upsun, organizations can transform their governance from "Policy as a PDF" into "Policy as Code," ensuring that every resource is versioned, reviewable, and automatically enforced through the .upsun/config.yaml file.
Traditional IT governance relies on documentation: massive PDF files and static spreadsheets that outline security standards, compliance requirements, and naming conventions. The failure of this model is rooted in its "manual interpretation" requirement.
A security policy sitting in a folder on a SharePoint drive does nothing to prevent a developer from misconfiguring a public-facing bucket at 2:00 AM on a Friday.
Policy-as-code (PaC) is a massive improvement because it treats policies with the same lifecycle management rigor as application logic.
PaC represents a fundamental shift where rules are written in machine-readable languages and integrated directly into the deployment pipeline.
On the Upsun platform, this is achieved through the .upsun/config.yaml file. Instead of a developer reading a document on how to configure a PHP runtime or a Redis service, the platform enforces the configuration defined in the repository.
This approach ensures consistency in security standards across all cloud resources and mitigates protection gaps caused by human error.
| Feature | Policy as a PDF | Policy as Code (Upsun) |
|---|---|---|
| Enforcement | Manual, reactive audits | Automated, proactive gates |
| Speed | Weeks: due to human review | Seconds: automated validation |
| Auditability | Scrambled spreadsheets | Git history and commit logs |
| Consistency | Subject to human error | Identical across environments |
| Updates | Emails that get ignored | Automated pull requests |
| Compliance | Interpretation based | Machine-readable rules |
When policy is codified, it becomes part of the platform logic.
If a security team requires that all production databases use a specific version of MariaDB, this can be hardcoded into the platform's templates. Any attempt to deploy a version that violates this policy results in a build failure.
Timely scans of these code-based configuration files help identify compliance missteps, incorrectly coded credentials, and misconfigurations before they escalate into larger issues.
The hidden factory thrives on rework: correcting defective outputs or over-processing work. In a PDF-based governance model, rework occurs when a security audit discovers a misconfiguration three months after deployment. The developer then has to pivot back to old code, reconstruct the context, and fix the issue. This contextual pivot is a major drain on productivity.
By shifting security "left" into the .upsun/config.yaml, the feedback loop is reduced from months to seconds. The platform acts as a continuous automated auditor, ensuring that only compliant code reaches production.
Shadow data is the ultimate “known unknown”.
Research indicates that approximately 15% of all enterprise data exists as shadow data: information copied, backed up, or stored outside the formal management framework.
These repositories often contain personally identifiable information (PII) or intellectual property that attackers actively seek. Shadow data frequently hides in forgotten cloud storage, dormant test environments, or personal folders.
Developers often create shadow databases because the official provisioning process is too slow.
In a traditional setup, creating a database involves multiple manual steps: filing a ticket, waiting for a cloud admin, requesting a security review, and manually configuring connection strings.
On Upsun, this bottleneck is removed through managed service definitions in the .upsun/config.yaml. A developer can add a database by adding a few lines of YAML code.14
services:
db:
type: postgresql:15
disk: 1024This simple block replaces a three-week ticketing cycle with a three-second code change. Because the platform handles the provisioning, the database is automatically created within the organization's governed perimeter.
By defining relationships in the YAML configuration, the platform automatically handles the "wiring" between the application and the service. These services are not exposed to the public internet: they communicate over a secure, isolated internal network.
This prevents developers from accidentally leaving a database open to the world, a common cause of data breaches in unmanaged shadow IT setups.
| Risk category | Shadow database (unmanaged) | Upsun managed service |
|---|---|---|
| Network exposure | Often public or misconfigured | Isolated internal network only |
| Patching | Manual, often neglected | Automated background updates |
| Credentials | Hard-coded in source code | Injected via environment variables |
| Audit logs | Missing or inaccessible | Centralized and immutable |
| Backups | Ad-hoc or non-existent | Automated and triple-redundant |
One of the primary drivers of shadow data is the need for "realistic" testing.
Developers often clone production data into unmanaged dev environments to debug issues. Upsun solves this through "production-perfect clones”.
Every Git branch can spin up an isolated environment that inherits a copy of the production data.
Crucially, this inheritance includes built-in sanitization workflows. Organizations can define hooks that automatically scrub PII from the data as it is cloned, ensuring that developers work with realistic but safe data sets.
This satisfies regulatory requirements like GDPR and HIPAA without requiring manual data preparation.
Governance at scale fails when it requires linear human intervention. If an IT manager must approve every environment change for 500 developers, that manager becomes a massive bottleneck.
The secret weapon of high-velocity engineering organizations is "inheritance."
In the Upsun ecosystem, inheritance describes how resources and configurations propagate from a parent environment to child environments.
When a developer creates a new feature branch, that branch automatically inherits the entire stack:
This hierarchical model ensures that the "Golden Path" established by IT is the path of least resistance.
Developers do not need to "go off-road" to find the resources they need because those resources are automatically provided and inherited from the production baseline.
The hidden factory is often fueled by "waiting stations": delays in processes due to various inefficiencies.
Waiting for a shared staging environment to be free or waiting for a manual data sync is a non-value-adding activity. Inheritance eliminates these waiting stations by providing isolated, production-identical environments on demand for every branch.
This ensures 100% parity. If a configuration works in the preview environment, it will work in production because the infrastructure is defined by the same code and inherited from the same source of truth.
During an active breach investigation, the greatest enemy of the security team is "the investigative gap."
Analysts often find themselves trapped in a reactive loop, hopping between fragmented tools and disconnected spreadsheets to reconstruct what happened. Traditional tools are often designed to alert you once a threat is already inside, leaving analysts to manually reconstruct infrastructure relationships.
A unified platform acts as a "single source of truth" by consolidating all infrastructure metrics, application logs, and access records into one deterministic view.
Because every resource on Upsun is provisioned via Git-driven YAML, the audit trail is absolute and verifiable.
In a breach, every second counts. A unified platform reduces the Mean Time to Triage (MTTT) by providing the forensic context necessary to understand a threat immediately.
Instead of querying multiple cloud providers to find an orphaned S3 bucket, analysts can view the entire fleet of applications and services from a single console.
| Forensic requirement | Fragmented environment | Unified platform (Upsun) |
|---|---|---|
| Asset discovery | Manual scan: hours/days | Instant: YAML inventory |
| Change history | Logs may be deleted or fragmented | Git history: immutable and versioned |
| Network topology | Complex, manual mapping required | Explicitly defined in config.yaml |
| Data lineage | Nearly impossible to trace | Single source of truth for data flow |
| Access controls | Fragmented across providers | Centralized and auditable |
The time it takes for a new hire to make their first productive commit is a key indicator of organizational efficiency.
In organizations plagued by shadow IT and fragmented tools, this process can take three weeks or more.
Cognitive load increases when developers must frequently interact with operations teams for infrastructure changes or resolve permission issues.
The "agility paradox" suggests that giving developers too many choices leads to cognitive overload.
When a new developer has to learn how to provision a local database, configure a CI/CD pipeline, and navigate a complex security policy, they are not writing code. Platform-led governance uses "Golden Paths" to provide a paved road from code to production.
By using standardized templates and automated scaffolding, new hires can spin up a sandbox environment in less than a day.
When governance is built into the platform, developers can be granted autonomy without increasing risk. A developer can "self-service" a new microservice or an AI-augmented application because the guardrails are already programmed into the system.
This eliminates the need for constant back-and-forth communication, removing the "manual glue work" that bloats development cycles.
| Metric | Before Golden Paths | After Golden Paths (Upsun) |
|---|---|---|
| Time to first commit | Weeks | Days |
| Service provisioning | Months (via tickets) | Hours (self-service) |
| Onboarding sandbox | Multiple days | Less than 1 day |
| Developer autonomy | Low: blocked by Ops | High: automated guardrails |
Building an internal developer platform (IDP) from scratch is a massive undertaking that often leads to "Day 50" problems: once the initial Golden Paths are built, the platform team becomes a bottleneck for every custom request.
Maintenance of a DIY platform consumes engineering resources that could be spent on product innovation.
| Category | DIY Internal Developer Platform | Upsun Platform-as-a-Service |
|---|---|---|
| Initial Build Time | Months | Minutes: via upsun project:init |
| Maintenance Burden | High: platform team is the bottleneck | Zero: fully managed by Upsun |
| Security Patches | Manual: risk of lag or missed updates | Automated: background security updates |
| Data Cloning | Custom scripting: complex and fragile | Native: instant branching and sync |
| Compliance | Interpretation based: manual audits | Built-in: SOC2, ISO27001, PCI-DSS |
| Scalability | Linear: depends on Ops team size | Elastic: scales automatically with code |
Shadow IT is not a personnel problem: it is a tooling problem. When the official path is slow and bureaucratic, the hidden factory will always emerge to meet the demands of the business.
To regain control, IT Middle Management must provide a platform that is faster and easier to use than the alternatives.
By centralizing the data layer and utilizing inheritance-based governance, organizations can eliminate Shadow IT while simultaneously accelerating developer velocity. Stop being the bottleneck and start being the enabler.
Request a technical demo to see how Upsun codifies your governance and reclaims your team's velocity.