Better options than Terraform-only workflows for GCP security drift?
we rely on Terraform for most of our GCP infrastructure, but teams still create resources directly through the console or gcloud for quick tests.
those never go through our policies, IAM setup, or org constraints, so drift shows up quickly.
we’ve tried a few approaches. asset discovery tools pick up some of it but miss certain GCP-native services created ad hoc. drift detection tools flag issues, but remediation ends up manual and noisy, especially with short-lived test resources. Config Connector didn’t fit well since not everything runs through Kubernetes.
at this moment we don’t have a reliable way to see what’s out of sync or enforce a baseline once something is created outside Terraform.
whats working to catch and control GCP security drift without slowing teams down?