The system had spoken, but not clearly enough. Policy enforcement was happening, yet the trail was thin and incomplete. What you need is policy enforcement debug logging access—full, unfiltered, fast.
When policies trigger, code paths shift. Permissions are checked, roles evaluated, and decisions made at runtime. Without debug logging