Infrastructure drift is silent until it breaks production. Drift detection is how you catch it before it catches you. For infrastructure as code (IaC), that means scanning deployed resources against your source of truth, flagging differences fast, and fixing them before the gap widens.
TLS configuration drift is one of the most dangerous forms. A changed cipher suite, downgraded protocol, or expired certificate can expose data in transit. With IaC drift detection, TLS settings are checked against versioned configuration files. If your Terraform, Pulumi, or CloudFormation definitions say TLS 1.3 and the live environment slips back to TLS 1.2, the system alerts you instantly.
Automated drift detection pipelines pull the current state via provider APIs, compare it to the IaC definitions, and surface any mismatch. For TLS, this includes: