The Terraform plan said nothing had changed. The console showed green lights. But the infrastructure in production was not the same as the code in Git. Somewhere, silently, Infrastructure as Code had drifted.
Drift in IaC is more than a nuisance. It’s a breach in trust between code and reality. It means the source you validate is no longer the system that runs. And if your access layer is a Unified Access Proxy, drift can turn a known architecture into something fragile and exposed.
Infrastructure drift happens when changes bypass the pipeline. A hotfix in the cloud console. A manual tweak to a security group. An urgent role assignment for a partner. Each small deviation moves production away from the state your repository claims exists. For a Unified Access Proxy—often the single control point for authentication and authorization—this risk is amplified. Configuration drift here can lead to serious breakage or vulnerability, undermining its purpose.
Drift detection is the discipline of continuously verifying that the deployed resources still match the declared code. It is not enough to run terraform plan once before a deploy. You need automatic checks, frequent baselines, and alerts on divergence. With a Unified Access Proxy, drift detection must also validate dynamic rules, certificates, and policy bindings.