Infrastructure Drift Detection
Drift detection compares your approved C4 architecture model against the live state of your Azure subscription — automatically, on every scan. When resources are added, removed, or changed without going through IaC, C4CI surfaces the difference as a severity-scored alert and provides a reviewed remediation path.
Drift detection is available on Pro and above. Enterprise and PAYG add compliance reporting plus the reviewed remediation workflow. It is the core differentiator of C4CI — not a bolt-on feature. The platform is built around the loop: connect → see → detect → approve → apply.
What is infrastructure drift?
Infrastructure drift is the difference between what your architecture documentation says should exist and what actually exists in your cloud environment. It happens constantly: a developer provisions a VM directly in the Azure Portal instead of via Terraform, an incident response engineer opens a firewall rule and forgets to close it, a VM SKU gets changed in a cost-cutting exercise without updating the IaC.
In a typical organisation, drift accumulates silently for weeks or months. The architecture diagram becomes a historical artefact rather than a living document. When an audit arrives — or when something breaks — nobody knows what the diagram represents anymore.
For teams subject to NIS2 or DORA, drift is a compliance risk. Both regulations require proof that documented architecture matches live infrastructure. Without automated drift detection, producing that proof means a manual audit — expensive, slow, and only accurate at the moment it was taken.
How C4CI detects drift
Every C4CI scan queries Azure Resource Graph and builds a snapshot of your subscription. Drift detection compares the current snapshot against the last approved baseline — the state you explicitly said represented your intended architecture.
- Scan — C4CI queries Azure Resource Graph with Reader role only. The scan discovers all resources, their properties, and their relationships. No agents, no SDKs, no changes to your infrastructure.
- Compare— the new snapshot is diff'd against the approved baseline. Added resources, removed resources, and changed properties are identified separately.
- Score — each drift item is assigned a severity: Critical, Warning, or Info. Severity is based on the type of change and the resource type affected.
- Present — drift items appear in the Drift panel on the project page and as annotations on the C4 diagram. You see the delta in context.
- Approve or remediate — you review each item and either approve it (update the baseline) or, on Enterprise and PAYG, trigger remediation (generate OpenTofu code to restore the intended state).
Drift severity levels
Every drift item is scored at one of three severity levels. Severity determines notification urgency and where the item appears in the drift panel.
| Severity | Definition | Example | Recommended action |
|---|---|---|---|
| Critical | Resource deleted, security group opened, or SKU downgraded | Production VM deallocated; NSG rule allows 0.0.0.0/0 on port 22 | Immediate review required — do not approve without investigation |
| Warning | Configuration changed but resource still running | VM SKU changed from D4s to D2s; storage replication changed from GRS to LRS | Review and approve or reject in the drift panel |
| Info | New resource added or tag changed | New resource group created; cost-centre tag updated | Acknowledge or approve for baseline update |
The remediation workflow
C4CI never mutates your infrastructure automatically. Every change requires an explicit human approval step. The remediation workflow follows four steps:
- Review the delta — the Drift panel shows each changed resource with before/after property values. Critical items are shown first.
- Choose an action — for each item, you can: approve (the change was intentional — update the baseline), reject and remediate (generate OpenTofu code to restore intended state), or defer (flag for later review).
- Generate OpenTofu code — if you choose to remediate, C4CI generates the OpenTofu diff for the selected items. You review the code in the portal before anything is applied.
- Open a PR — the generated code is pushed to your IaC repository as a pull request via the GitOps integration. You review, approve, and merge through your normal code review process. C4CI never bypasses it.
Drift detection and NIS2 / DORA compliance
NIS2 Article 21 requires organisations to implement technical measures to manage ICT risk — including ensuring that documented architecture reflects the actual operational environment. Drift detection is the automated mechanism that produces that proof on a continuous basis rather than at audit time.
Every drift scan produces an immutable snapshot stored with a timestamp. These snapshots serve as audit evidence: at any point you can show an auditor the state of your infrastructure on a given date, what diverged from the approved architecture, and what action was taken. Compliance reporting exports are available on Enterprise and PAYG tiers.
Frequently asked questions
Which Azure resource types does drift detection cover?
Drift detection covers all resource types discoverable via Azure Resource Graph — including VMs, AKS clusters, storage accounts, networking (VNets, NSGs, load balancers), databases (PostgreSQL, SQL, Cosmos), and Kubernetes workloads. New resource types added to Azure Resource Graph are automatically included.
How often does C4CI scan for drift?
Scans are triggered manually from the project page. Scheduled scans are on the roadmap for Enterprise tier. Each scan snapshot is stored and compared against the previous approved baseline.
Can I approve drift without generating OpenTofu code?
Yes. Approving drift updates the baseline without generating IaC code. OpenTofu code generation is a separate optional step — you can approve drift to acknowledge a legitimate change and move on.
What happens to the diagram after I approve drift?
The approved baseline is updated to reflect the current live state. The diagram regenerates from the new baseline. Historical drift snapshots are preserved — you can view the delta at any point in the 30-day history.
Get started
Drift detection is available on Pro and above. Start with the Free tier to generate L1 and L2 diagrams — upgrade to Pro for continuous drift monitoring, or Enterprise and PAYG for compliance reporting and reviewed remediation.
- View pricing — Pro+ drift detection, Enterprise/PAYG compliance reporting
- NIS2/DORA compliance — how drift detection supports regulatory evidence collection
- Quickstart — connect your first Azure subscription
- Contact us — enterprise inquiries