Your company is transitioning to a cloud-based infrastructure for some of its critical applications. While this transition promises cost savings and scalability, it introduces new security challenges. As the Information Security Manager, what should be your primary consideration to ensure the security of data during this transition?