How do enterprises ensure security control over cloud data —its collection, storage, access, usage, transfer, and disposal?