How do enterprises ensure security control over cloud data — its collection, storage, access, usage, transfer, and disposal? How can they ensure compliance with regulatory requirements?