Blog

The Drift Problem: why your security deteriorates without you noticing

April, 7, 2026

By Rubén Gómez

5 minutes read

We already talked about hardening. We already talked about ransomware. In this new episode comes the uncomfortable part. Because even if you do everything right… your level of security will become unbalanced.

Months ago your security team made a serious effort to improve security.

Everything was in good shape. Everything under control. And today… are you sure it’s still the same?

Security is not lost all at once. It degrades slowly. The environment begins to change with small adjustments: exceptions, temporary access that becomes permanent, and operational changes.

Nothing seems critical. But the environment stops being what you thought it was. This becomes Drift.

Drift is a process where your real configuration gradually moves away from your ideal configuration. It does not happen abruptly. It does not happen because of a single critical change. It happens progressively.

At the beginning, everything is aligned. Your environment meets what you defined: secure configurations, controlled privileges, well-defined access, and applied policies.

Everything makes sense. Everything is under control.

But the environment does not remain static. There is movement, modifications, an operational adjustment, a temporary exception, access that is “only needed for now.” But then another, and another. Each of those changes, on its own, is completely reasonable. In fact, they are often necessary for the business to function.

That is the key point: drift does not come from bad decisions, it comes from correct decisions… in individual contexts.

What begins as an exception, an additional permission, or an enabled service turns into multiple unnecessary accesses, extended privileges, and inconsistent configurations. This is where the concept becomes critical, because the documented configuration no longer matches your real configuration.

And that is exactly what an attacker takes advantage of. They don’t need to find anything extraordinary; they just need to find that difference. Drift, in essence, is that: the gap between what you think you have and what actually exists in your environment.

And that gap grows over time, not because someone is intentionally expanding it, but because no one is continuously closing it. That is why drift is not a technical event, it is an operational phenomenon. And the more dynamic the environment is… the faster it happens. That is why understanding drift is not just understanding configurations, it is understanding how your environment evolves over time.

In the end, you are not protecting a static state; you are protecting something that changes every day. It is like when you start the week with a perfectly organized schedule. On Monday morning everything is clear: you know what you have to do, your time is defined, priorities are well organized, and there are no conflicts. Your schedule reflects exactly how you want to work; everything is optimized.

But without you noticing, an urgent meeting comes in, another one gets moved, someone asks you for “just 15 minutes” for something quick, or an unexpected issue appears. You decide to adjust, because it makes sense. But then on Tuesday you make another adjustment, on Wednesday you move something else, on Thursday you add an extra slot that you’ll “reorganize later,” and by Friday… the schedule no longer resembles the one you designed.

However, the schedule still works. You still have meetings, you keep making progress on pending tasks, and you keep operating. Nothing is broken, but it is no longer optimized. Things start to appear like poorly used time slots, overlapping meetings, idle time at critical moments, disorganized priorities, and overload at certain hours.

The serious problem is that you no longer have real control over your time, even though it seems like you do. That is exactly what happens with drift. The full analogy would be that hardening is organizing your schedule, and drift is everything that happens afterward.

Why it is dangerous

Drift does not generate alerts or break systems. But it reduces your real level of security and creates a false sense of control. Drift comes from normal decisions: urgent access, quick changes, or temporary solutions.

In many organizations in the region, the same team manages multiple fronts at the same time: support, infrastructure, operations, and security. Added to this is the constant pressure to keep the business running, where the priority is often to resolve things quickly rather than maintain consistency.

Additionally, environments are becoming increasingly complex: legacy systems coexisting with the cloud, endpoints outside the corporate network, and tools that are incorporated without clear centralized control. All of this generates continuous changes without standardization, configurations that evolve unevenly, and a gradual loss of control over the environment.

And in the end, where there is inconsistency… there is drift.

Drift reconstructs the attacker’s path because it reopens access, increases privileges, and allows lateral movement. One-time hardening does not survive dynamic environments; without follow-up, it degrades automatically. To control it, you need to define a baseline, measure continuously, detect deviations, and correct at scale.

It is not enough to secure things once; you have to secure them every day. And that implies changing the approach. It is not just about implementing controls, but about keeping them active over time. You have to start with the basics:

  • Define a clear and realistic baseline
  • Continuously measure your environment, not just during audits
  • Detect deviations before they accumulate
  • Correct systematically, not case by case

And above all:

  • Reduce dependence on manual processes
  • Because in dynamic environments, manual work always becomes complicated.
  • The difference is not in who configures better once… but in who can keep their environment under control, constantly.

Sources of Information:

Verizon DBIR 2025

Microsoft Digital Defense Report

CIS Benchmarks

CISA KEV Catalog