You have an engineer SSHing into production, tailing logs, juggling tokens, and trusting that session recording is enough. Then a SQL command hits sensitive fields, and compliance red lights start blinking. That is when data-aware access control and native CLI workflow support become real, not theoretical. They are what separate