The vault holds everything. Names. Emails. Login histories. Payment records. This is your PII catalog. It is the most dangerous set of data in your system.
Least privilege is the shield. It means every account, service, or API key gets only the access it needs. No more. No less. When applied to a PII catalog, it reduces blast radius. If a credential is stolen, the attacker cannot roam freely.
Start by defining the PII catalog in code and infrastructure. Treat it as a first-class resource. Use metadata to mark which fields contain Personally Identifiable Information. This inventory must be exact and kept up to date. Automate classification when possible.
Then enforce least privilege with strict IAM policies. Separate read from write. Require explicit grants for each function or microservice. Rotate credentials. Monitor every access request in logs designed for audit, not just convenience.