By the time you read the advisory, the exploit was already in the wild. The attacker didn’t need to break your encryption. They only needed the unnecessary data you kept. This is where data minimization stops being a compliance checkbox and becomes the first line of defense against zero day risk.
Zero day vulnerabilities are unavoidable. The question is how much harm they can do when they happen. Every extra field in a user record, every forgotten log file, every stale backup turns a routine patch into an emergency. Attackers look for the biggest blast radius. Minimizing stored data shrinks it to almost nothing.
Data minimization is not just deleting old rows in a table. It’s the discipline of collecting only what is needed, storing it only as long as it’s useful, and making it inaccessible when it’s not in active use. It’s database hygiene. It’s architectural restraint. It’s designing systems knowing that someday, somewhere, a zero day will hit.