Picture an engineer at 2 a.m., eyes burning, hopping into a production Kubernetes cluster. The team relies on Teleport sessions for access logs, but in the fog of sleep, one command slips. It changes a live config, triggers an incident, and the blame hunt begins. This is where SIEM-ready