The SSH session starts. Someone fat-fingers a command that wipes a production table. You restore from backup, write a postmortem, and swear it won’t happen again. Every team that manages secure infrastructure access eventually faces that moment. It’s why per-query authorization and granular compliance guardrails—in this case,