Cloud Is Eroding Campus Cybersecurity Perimeters
Ed Skoudis, president of SANS Technology Institute, explains that the traditional campus perimeter has largely dissolved because institutional data, user identities and critical services now live across dozens or even hundreds of cloud and SaaS platforms.
“In higher education, that creates a much broader and more fluid attack surface, where risk comes not just from campus systems but from misconfigured cloud storage, compromised identities, unmanaged third-party apps and inconsistent security controls across distributed environments,” he says.
This means universities must now defend an entire ecosystem spread across many fuzzy boundaries, not a single perimeter clearly defined by firewalls, as in the past.
In a distributed or multicloud environment, identity and application access become the key control points.
Rich Campagna, senior vice president for network security at Palo Alto Networks, says universities need security that can consistently verify users and monitor activity across cloud services, SaaS platforms and campus infrastructure.
“We are no longer defending a ‘castle with a moat,’” he explains. “We are defending a distributed ecosystem where the identity of the user and the integrity of the application are the only true perimeters left.”
RESEARCH INSIGHTS: Find out how your peers are evolving their cloud strategies.
SaaS Sprawl and Shadow IT: Inventorying What Students and Faculty Actually Use
Campagna says shadow IT is common in higher education because researchers and students often adopt new tools quickly to support their work.
“Blocking every new application is rarely practical and can slow research and collaboration,” he says. “A more effective approach is to focus on continuous discovery and risk-based management of applications.”
Security teams should be able to automatically identify new SaaS applications and cloud workloads as they appear on the network. From there, they can assess the risk of each service and apply appropriate policies, such as access controls or data protection measures.
“This allows institutions to support innovation while still maintaining visibility and security oversight,” Campagna says.
Kurtz adds that colleges and universities can only manage shadow IT if they treat it as an ongoing program that blends technical discovery with governance and culture, rather than a one‑time cleanup.
“Publish an approved services catalog and use shadow IT insights to guide your roadmap — standardizing on secure, supported options in the categories users clearly want, rather than trying to suppress demand,” he advises.
DISCOVER: Watch these four cloud trends in 2026.
Cloud Security Management for Universities: Continuous Visibility Without Disruption
Cloud visibility is foundational for university security because core teaching, research and administrative workloads have moved into SaaS and multicloud platforms that sit outside traditional perimeter and endpoint controls.
“Improving cloud visibility in higher education is less about tightening the screws and more about instrumenting what already exists, so security can keep pace with teaching and research, not slow it,” says Splunk Chief Cybersecurity Advisor Paul Kurtz.
He advises leaders to “observe first” on existing services, aggregating logs and security telemetry from identity providers, major SaaS platforms and cloud infrastructure into a single analytics layer before changing access patterns.
“This allows leaders to see who is using which applications and data sets, from where and on what devices, without altering academic workflows,” Kurtz says.
