No one had touched it. No commit. No merge. And yet the infrastructure state had drifted.
Infrastructure as Code (IaC) breaks when drift goes undetected. Okta group rules are especially vulnerable: small changes in role assignments or conditions can slip past reviews, leaving identities exposed or permissions bloated. When drift is invisible, compliance slips. Security gaps open. Automation loses trust.
IaC drift detection for Okta group rules solves that. It compares the desired state in your code to the actual state in Okta. Every mismatch is flagged. Every rule that mutates outside your pipeline is caught. You can run detection as part of CI/CD, on a schedule, or on-demand after suspicious changes. Once you see the difference, you choose: align Okta to code, or update code to match reality.
For Okta group rules, this means checking: