We implemented JIT access for our privileged accounts. Auditor asked what the engineers actually did during those sessions. We had no answer.

Posted by TurnoverEmergency352@reddit | sysadmin | View on Reddit | 29 comments

We moved our prod environment privileged access to a JIT model about 14 months ago. Engineers request elevated access through a workflow, it gets approved, they get a time limited role, it expires after 2 hours. Thought we had done everything right. Least privilege, approval trail, automatic expiration.
SOC2 Type II audit started last quarter. Auditor pulled our JIT access logs and said great, I can see who requested access, who approved it, and when it expired. Now show me what they did with it.
We did not have that. We have CloudTrail in AWS so some API calls are logged, but for database access, for SSH sessions into instances, for any interactive work that happened inside the network boundary, we had call logs with no context and in some cases nothing at all. The JIT system told us a person had access for 2 hours. It did not tell us whether they read one file or exported a table.
The auditor's position was that the approval controls are the front door, and session activity is the actual evidence that the access was appropriate. Having the door log but not the room log is half a control.
We are now evaluating session recording. BeyondTrust, Teleport, StrongDM are all on the list. The problem we keep running into is that session recording either covers SSH and RDP well but misses database query traffic, or covers databases but requires routing everything through a proxy which our engineering team views as a latency and reliability concern for prod operations.
Has anyone found a session recording setup that gives auditors what they need across SSH, RDP, and database protocols without creating enough friction that engineers route around it or it becomes a single point of failure for prod access?