Your production database went down at 2 a.m. The on-call engineer jumped in, grabbed Teleport, and opened a root session to see what broke. Minutes later, the incident was fixed but a compliance auditor now wants logs, screenshots, and proof that sensitive tables were never touched. That’s where