The database was gone by morning. Not corrupted. Not misplaced. Gone—because an AWS IAM policy left a back door wide open, exposing Protected Health Information to the world.
AWS access to PHI is not just a compliance checkbox. It is a live wire. Mishandle it, and the damage is instant, permanent, and public. Whether you think of HIPAA or internal governance, the truth is the same: access permissions and audit trails are the only shield between sensitive healthcare data and a breach.
The first step is mastering AWS IAM at a granular level. Every role and policy tied to your storage, compute, and networking infrastructure must follow the principle of least privilege. That means zero S3 buckets with public-read permissions where PHI can sit unprotected. It means locking down API Gateway endpoints, encrypting everything in transit and at rest, and enforcing MFA wherever human access exists. The misconfiguration risk grows with every unnecessary permission.
Logging is not optional. Enable AWS CloudTrail across every region. Route logs to immutable storage. Trigger alerts on anomalous API calls. Build baseline behaviors for normal data access and flag deviations instantly. Remember: PHI exposure often happens in minutes, but undetected gaps can last months. Without complete logging, you are flying blind.