The Terraform plan was green. The pull request was merged. Two weeks later, production was running code no one remembered writing.
That’s the quiet danger of IaC drift. Infrastructure-as-Code promises a single source of truth, but the moment live cloud resources drift from the repo, the truth fractures. A manual tweak at 2 a.m., an urgent hotfix bypassing CI/CD, a forgotten experiment left in place — each breaks the contract between code and reality. And with security-critical services like Identity-Aware Proxy (IAP), unnoticed drift can turn into open exposure.
IaC drift detection is not optional for teams protecting authentication gates. When you rely on Google Cloud Identity-Aware Proxy to restrict access to internal apps, any drift in network rules, policies, or backends is a blind spot attackers can exploit. Code may still declare that an app is private, but in the cloud console someone may have punched a hole weeks ago. Automated drift detection closes that gap.
Effective drift detection works by continuously comparing deployed infrastructure against what’s versioned in your IaC templates. For Identity-Aware Proxy resources, this means scanning for changes in iap_web_backend_service, iap_tunnel_instance_iam_member, iap_web_type_app_engine_service, and related components. If a setting doesn’t match the code, you get alerted before your perimeter erodes.