CIO: What belongs in the cloud? How should sensitive data be protected? How are encryption upgrades addressed? How do I limit access to sensitive data? And how will critical systems metadata (data describing data) be tracked? It may be difficult to deploy all a corporation’s infrastructure within the cloud because of a lack of standardization within the businesses’ current IT applications. Cloud computing can out out out infrastructure that are only source-source corporate standards and only use common encryption protocols, CIO says.”]
Source: https://www.csoonline.com/article/2126148/security-for-large-company-cloud-providers.html

