Watch this video on YouTube
A company stores sensitive customer data in a cloud storage service. To ensure the data remains protected even if an attacker gains access to the storage infrastructure, which security control is MOST effective?