ProficientNowTechRFCs

9. Session Management

RFC-PAM-0001                                                    Section 9
Category: Standards Track                           Session Management

9. Session Management

← Previous: Kubernetes Governance | Index | Next: Access Requests →


9.1 Session Recording Requirements

9.1.1 Mandatory Recording

Per INV-6, all interactive sessions MUST be recorded. This is non-negotiable for compliance and security.

Session TypeRecording RequiredContent Captured
SSHYesTerminal I/O, metadata
DatabaseYesQueries, metadata
Kubernetes execYesTerminal I/O, eBPF events
RDPYesScreen capture, metadata
ApplicationYesHTTP requests (where applicable)

9.1.2 Recording Triggers

Recording begins automatically:

TriggerAction
Session establishedRecording starts
Session terminatesRecording finalized
Session timeoutRecording finalized
Connection lostRecording preserved to last event

9.1.3 Recording Failures

If recording cannot be established:

ScenarioBehavior
Storage unavailableSession blocked (fail-closed)
Recording agent unavailableSession blocked
Recording corruptedAlert generated, session continues

The system is fail-closed—sessions are denied if recording cannot be guaranteed.

9.2 Recording Storage

9.2.1 Storage Backend

Session recordings are stored in durable, immutable storage:

Backend TypeUse CaseCharacteristics
S3-compatibleProductionHighly durable, scalable
GCSGCP environmentsNative GCP integration
Azure BlobAzure environmentsNative Azure integration
FilesystemDevelopment/testingLocal storage

9.2.2 Storage Requirements

RequirementSpecification
Durability99.999999999% (11 9s) recommended
Availability99.9% for playback access
EncryptionAES-256 at rest
ImmutabilityWrite-once, no deletion during retention
RetentionConfigurable (default: 1 year)

9.2.3 Storage Architecture

9.2.4 Retention Policies

Data TypeRetention PeriodRationale
Session recordings1 yearCompliance requirement
Session metadata3 yearsAudit trail
Access logs3 yearsSecurity investigation
Deleted after retentionAutomaticStorage cost management

9.3 Session Playback

9.3.1 Playback Methods

Recordings can be played back through multiple interfaces:

MethodInterfaceUse Case
Web UIBrowser-based playerVisual review
CLItsh play <session-id>Terminal playback
APIREST/gRPCProgrammatic access
ExportDownload recording fileOffline analysis

9.3.2 Playback Features

FeatureDescription
Speed control0.5x to 4x playback speed
SeekJump to specific timestamp
SearchSearch for text in session
EventsJump between recorded events
MetadataView session metadata alongside

9.3.3 Playback Authorization

Not everyone can view recordings:

RolePlayback Access
auditorAll recordings
security-analystAll recordings
team-leadTeam member recordings
platform-adminAll recordings
Regular usersOwn recordings only

9.3.4 Playback Audit

Playback access is itself audited:

EventLogged Information
Recording accessedWho, when, which session
Recording downloadedWho, when, which session
Recording searchedWho, when, search terms

9.4 Live Session Moderation

9.4.1 Overview

Administrators can observe and control active sessions:

CapabilityDescription
JoinView active session in real-time
TerminateForce-end a session
PauseTemporarily suspend session input

9.4.2 Session Join

Authorized users can join active sessions:

9.4.3 Session Termination

Administrators can terminate sessions:

ScenarioAction
Security incidentImmediate termination
Policy violationTermination with warning
Resource cleanupTermination of idle sessions

Terminated sessions are logged with termination reason.

9.4.4 Moderation Permissions

RoleJoinTerminatePause
security-analystYesYesYes
platform-adminYesYesYes
team-leadTeam sessionsTeam sessionsNo
Regular usersNoNoNo

9.5 Audit Log Integration

9.5.1 Audit Event Types

All PAM events are logged:

Event CategoryExamples
AuthenticationLogin success, login failure, logout
SessionSession start, session end, session join
AccessResource access granted, access denied
AdministrativeRole change, resource registered
SecuritySession terminated, certificate revoked

9.5.2 Event Schema

Each audit event contains:

FieldDescriptionExample
eventEvent typesession.start
timeISO 8601 timestamp2026-02-10T14:30:00Z
userUser identityjane.doe@example.com
addr.remoteClient IP address10.0.1.50
server_idTarget resourceserver-abc123
session_idSession identifiersession-xyz789
successOperation outcometrue

9.5.3 Log Destinations

Audit logs can be sent to multiple destinations:

DestinationUse Case
Teleport backendNative storage
ElasticsearchSearch and analytics
SplunkSIEM integration
S3/GCSLong-term archive
SyslogLegacy integration

9.5.4 Log Correlation

Session recordings link to audit events:

9.5.5 Compliance Reporting

Audit logs support compliance reports:

Report TypeContent
Access reportWho accessed what, when
Session reportAll sessions for a user/resource
Approval reportJIT requests and approvals
Anomaly reportUnusual access patterns

Document Navigation


End of Section 9