This document outlines Varonis' approach to cloud data protection. It discusses identifying risks when migrating to Office 365, including defining proper site structures and permissions based on sensitive data mapping and user activity. It also covers setting detective controls by alerting on risky sharing behaviors. The document proposes prioritizing remediation of high-risk sites and folders and establishing policies to remove risks like public links and redundant sharing. It emphasizes sustaining security by enabling easy data owner controls and entitlement reviews.