Identity drift is the gap between what access a user or system is supposed to have and what they actually have over time.
It happens when permissions change in reality, but not in policy.
Identity systems assume access is clean and up to date.
It isn’t.
People change roles. Projects end. Apps get added. Permissions get granted quickly and rarely cleaned up.
Over time, access accumulates.
What starts as a small mismatch turns into real risk:
Drift is not a one-time problem. It is constant.
Alice starts in Finance.
She gets:
Six months later, she moves to Operations.
Her IDP updates her group.
But:
Nothing broke. No alert fired.
But her access no longer matches her role.
That’s identity drift.
Drift happens because access is managed in too many places.
Even if your policies are correct, execution isn’t perfect.
Small gaps add up.
Most identity systems focus on assigning access.
They are not built to continuously verify it.
They assume:
In reality:
Periodic access reviews try to catch this.
They usually miss it.
Because nothing looks obviously wrong.
Drift hides in:
It is not a failure event. It is a slow accumulation.
You cannot prevent drift completely.
You can make it visible and manageable.
That means:
Identity drift is the reason effective access exists as a problem.
Policies define what should happen.
Drift is what causes reality to diverge.
If you don’t account for drift, you don’t understand effective access.
YeshID makes identity drift visible.
Instead of assuming systems are in sync, it shows you where access no longer matches intent.
So you can:
Identity drift is not an edge case.
It is the default state of access over time.
If you are not actively managing it, it is already happening.