A multinational organization wants to monitor outbound traffic for data leakage from the use of unapproved cloud services. Which of the following should be the information security manager’s GREATEST consideration when implementing this control?
A. Security of cloud services
B. Data privacy regulations
C. Resistance from business users
D. Allocation of monitoring resources
A. Security of cloud services
B. Data privacy regulations
C. Resistance from business users
D. Allocation of monitoring resources