Scenario 3 – Identifying sensitive information in your cloud ecosystem