Delegate security remediation to data owners:

  • Change access privileges.
  • Delete or tombstone files.
  • Orchestrate encryption.