It’s 3 a.m., your production database is throwing alarms, and an engineer needs urgent access. You log in, flip through permissions, and realize the usual “session-based” tunnel gives far too much power. One wrong command, and compliance goes out the window. This is exactly where SOC 2 audit