The breach began with one unchecked account. A single role, bloated with permissions, became the doorway to every piece of personal data in the system. This is how PII leakage happens—not always with malware or exploits, but with weak separation of duties.
PII leakage prevention starts with controlling access at the root. Personal Identifiable Information should only be visible, editable, or exportable by those whose job requires it. Anything else is risk. Separation of duties turns this principle into enforceable policy by splitting powers across roles so that no one individual can collect, process, and approve sensitive data flows from start to finish.
The process is not optional. Map the data lifecycle: where PII enters, where it lives, and where it leaves. Assign each step in this chain to different roles. Lock down database queries. Require dual sign-off for bulk exports. Use role-based access control (RBAC) with least privilege as the baseline, layered with attribute-based rules when roles overlap.