Picture this: a production outage at midnight, everyone scrambling to jump into sessions, trace the issue, and fix it fast. Logs blaze with terminal commands that touch secrets, rotate credentials, and query sensitive data. Later, someone asks who actually saw what. Silence. That gap in accountability is where proof-of-non-access evidence