1) Lots of PII, SSNs, etc not individually encrypted or tokenized. At-rest encryption of these is necessary, but not sufficient.
3) Access of what appear to be logging S3 buckets, also from outside the cloud env, was not detected.
CloudTrail event monitoring is your friend and should be your #1 priority for AWS security.
5) AWS GuardDuty would have alerted on some of this too (e.g. S3 access by Tor exit node).
Turn these on, send alerts to your security team *and* team that owns the AWS asset.