The database was whispering secrets it should never tell. One misconfigured route, one exposed endpoint, and private user data could slip into the open. Preventing PII leakage starts where the network is designed — inside a VPC, inside a private subnet, locked behind a proxy that only speaks to approved services.
Deploying a proxy in a private subnet is not a checkbox exercise. It is a deliberate architecture decision to cut off direct internet access, filter outbound traffic, and control inbound requests. The proxy stands between sensitive workloads and anything outside. When configured with strict ACLs, TLS termination, and detailed logging, it becomes an unblinking gatekeeper.
By using a VPC private subnet, you isolate PII-processing systems from the public internet. This limits attack vectors and keeps critical services unreachable from untrusted networks. Network ACLs and security groups should allow only the proxy to communicate with external APIs or partner services. Every packet moves through a controlled path, reducing risk of accidental exposure or exfiltration.