It always starts with a late‑night incident. A production container goes rogue, someone needs to SSH in, and every log line suddenly becomes a liability. Sensitive credentials, private keys, and database URIs spray across terminals like confetti. The next morning, that audit report is a mess. This is the