An engineer connects to a production cluster at midnight to debug an outage. She lands inside Teleport, starts a session, and opens full shell access to a sensitive service. Within seconds, she can see everything. Useful, yes, but dangerous. The modern approach is to enforce least privilege dynamically and enforce