Susan, a cloud security engineer for an online retail company, is tasked with sharing customer transaction data between business units using a cloud service. She wants to ensure that security is properly implemented during the share phase of the cloud secure data lifecycle. Which of the following controls would be MOST effective for protecting the shared transaction data?