Which of the following can be implemented to provide for data confidentiality assurance during and after the migration to the cloud?