Published April 1, 2026 | Version v1
Report Open

Beyond Checklists: Turning Compliance Drift into Real-Time Security Signals

Authors/Creators

Description

Core thesis. Most organizations do not fail because they never defined controls. They fail because the live environment drifts away from the secure state those controls were supposed to maintain. This paper argues that compliance drift should be modeled as a continuous security signal, not a periodic audit artifact.

Enterprise security programs often assume that control failure means a control was never selected, never implemented, or never reviewed. In practice, many failures emerge later. A system is hardened, documented, and maybe even audited successfully, then gradually diverges from its intended secure state under operational pressure. The deviation is real, persistent, and often security-relevant, but it is not treated as part of the detection plane.

This paper argues that compliance drift should be treated as a first-class security signal. The central claim is that deviation between intended secure state and actual runtime state contains operationally useful information about exposure, control degradation, and attack surface expansion. When that deviation is continuously measured, normalized, enriched with asset and threat context, and correlated with runtime telemetry, it becomes useful for detection engineering, prioritization, and response.

The paper makes seven contributions. First, it defines compliance drift as a time-dependent divergence problem rather than a static compliance deficiency. Second, it explains why point-in-time compliance models underperform in dynamic environments. Third, it proposes a drift taxonomy that separates critical, silent, noisy, visibility-reducing, identity, and provenance drift. Fourth, it introduces a practical architecture that combines agents, reconciliation, integrity monitoring, policy engines, exception registries, scoring, and analyst workflows. Fifth, it proposes measurable concepts such as drift rate, drift density, drift half-life, time-to-drift-detection, exception debt, and drift-to-incident correlation. Sixth, it extends the model to cloud, Kubernetes, identity, and software supply chain state. Seventh, it outlines how AI can assist interpretation and prioritization without becoming the source of truth for control evaluation.

The goal is not to replace existing frameworks such as NIST, CIS, STIGs, or machine-readable control ecosystems. The goal is to operationalize them so that hardening regressions, baseline violations, and exception sprawl become real-time inputs to security decisions rather than delayed audit observations.

Some constructs in this paper are proposed concepts rather than borrowed industry terms, including drift budget, baseline entropy, drift half-life, and drift activation. They are introduced here because existing compliance language is too weak for operational security work.

Files

Beyond_Checklists_Mher_Saratikyan_Cactus.pdf

Files (562.1 kB)

Name Size Download all
md5:ea2ddd9d91f89098a1a3ff974a19ce90
562.1 kB Preview Download

Additional details

Related works

Has part
Software: https://justcactus.net/ (URL)