The screen showed what nobody wanted to see—critical Terraform state had drifted. Infrastructure was no longer the same as the IaC that defined it. Changes crept in outside version control. Now the build pipeline was suspect, and every deployment had a shadow of risk. This is why IaC drift detection for infrastructure access is no longer optional.
Drift happens when live infrastructure diverges from the code in source control. It can be caused by manual changes in the cloud console, emergency hotfixes applied outside IaC workflows, or malicious edits exploiting weak access controls. Without detection, you lose the single source of truth. Audit trails break. Rollbacks fail. Compliance gaps open.
Infrastructure access is the key trigger. Any change made outside provisioning pipelines bypasses IaC. AWS IAM roles expanded on the fly, Kubernetes RBAC modified during incident response, or firewall rules tweaked under pressure—all create drift. If your system cannot detect these changes, you cannot guarantee stability or security.