The document discusses the five steps that organizations can take to gain confidence in their use of cloud applications and services:
1. Find all cloud apps in use, both sanctioned and unsanctioned, and understand the risks they pose.
2. Analyze how the apps are being used by understanding user behavior and activity.
3. Use analytics to monitor app usage, detect anomalies, and conduct forensic investigations when issues arise.
4. Implement data loss prevention policies and profiles to identify and prevent sensitive data from leaving the organization's control.
5. Enforce security and compliance policies in real-time for any cloud app through granular policy controls.
Taking these five steps would allow