Skip to main content

Configuration Drift Detection

Compare intended configuration against actual host state to find drift.

Overview

Configuration drift occurs when actual infrastructure state diverges from intended configuration. Infracast detects drift by comparing your configuration management definitions against discovered host state, helping you maintain compliance and reduce security risk.

Supported Sources

Ansible

Upload Ansible playbooks and roles to establish your intended state.

What we analyze:

  • Package installations
  • Service states (running, enabled)
  • File permissions
  • User/group configurations
  • Firewall rules

Kubernetes

Upload Kubernetes manifests or Helm charts.

What we analyze:

  • Deployment configurations
  • Resource limits and requests
  • Security contexts
  • Network policies
  • Pod security settings

Terraform

Upload Terraform configurations and state files.

What we analyze:

  • Resource configurations
  • Security group rules
  • IAM policies
  • Encryption settings
  • Tagging compliance

DISA STIGs

Automated STIG compliance checking with CKL export.

Supported STIGs:

  • Red Hat Enterprise Linux 8/9
  • Ubuntu 20.04/22.04
  • Windows Server 2019/2022
  • Amazon Linux 2

Drift Detection

How It Works

  1. Upload your intended configuration (Ansible playbook, K8s manifest, etc.)
  2. Infracast parses the expected state
  3. Compares against discovered host configuration
  4. Reports differences as drift findings

Drift Categories

CategoryDescriptionExample
MissingExpected configuration not presentPackage not installed
ExtraUnexpected configuration presentUnauthorized service running
ModifiedConfiguration differs from expectedDifferent file permissions

Using Configuration Drift

  1. Go to Operations → Configuration Drift
  2. Click Upload Configuration
  3. Select your source type and upload files
  4. Choose target hosts to compare against

View Results

  • Drift items grouped by host
  • Severity based on security impact
  • Remediation guidance for each finding

Export Reports

  • PDF summary for management
  • CKL files for STIG compliance (DISA-compatible)
  • CSV for custom analysis

STIG Compliance

Automated STIG Checking

Infracast automates STIG compliance assessment by:

  • Parsing STIG requirements
  • Checking host configuration
  • Generating findings for non-compliant items

CKL Export

Export results in Checklist (CKL) format for:

  • DISA eMASS submission
  • Auditor review
  • Compliance documentation

Supported Checks

  • File permissions and ownership
  • Service configurations
  • Password policies
  • Audit logging settings
  • Network configurations

Best Practices

  1. Version Control Configs — Keep configuration sources in Git for tracking
  2. Run Regularly — Check for drift weekly or after changes
  3. Remediate Quickly — Address high-severity drift immediately
  4. Document Exceptions — Track intentional differences with justification
  5. Integrate with CI/CD — Check drift before deployments

Integration with IaC Scanning

Configuration Drift complements IaC scanning:

CapabilityIaC ScanningConfig Drift
WhenPre-deploymentPost-deployment
WhatCode analysisActual vs intended
FocusSecure defaultsOperational drift

Use both for complete coverage: IaC scanning catches issues before deployment, Configuration Drift catches drift after.

Troubleshooting

No Drift Detected

  • Verify configuration files are correctly formatted
  • Ensure target hosts were discovered
  • Check that host discovery includes the relevant configuration data

Parsing Errors

  • Validate Ansible YAML syntax
  • Verify Kubernetes manifests are complete
  • Check Terraform files for syntax errors