Picture this. A support engineer gets paged at midnight to debug a failing payments database. They connect through a VPN, hop into a bastion, and open a live SQL session. Minutes later, they have full production access. No guardrails, no audit trail, and no idea what commands might leak sensitive