The nightmare starts when the wrong engineer runs a destructive query on production, live data, at 3 a.m. The logs only show a session ID. No per-command history, no masking of sensitive fields, no way to undo it. That failure, in miniature, sums up why secure database access management