The database logs show an unauthorized query. It touched Protected Health Information it never needed to see. That breach didn’t happen because of weak encryption. It happened because least privilege was ignored.
Least privilege for PHI means every process, account, and system gets the bare minimum access to perform its job. No read access if write is enough. No write if read is enough. No permissions “just in case.” The principle is simple, but execution demands discipline.
When PHI—Protected Health Information—flows through your stack, each layer must enforce boundaries. Application code must request only the data it needs. APIs must validate caller roles before returning records. Databases should segment tables so PHI is isolated and locked down. Network rules should block paths to sensitive systems unless explicitly required.
Weak IAM policies often erode least privilege. Broad role assignments, inherited permissions, and stale accounts expand the attack surface. Audits need to trace who accessed what, when, and why. Logs should be immutable and reviewed regularly. Automation can detect privilege creep before it becomes a liability.