When you move the contents to the cloud, it is above the perimeter. Even if you are pretty sure you have the dedicated cloud environment allocated, configuration issues, physical security and human factors could endanger your contents in the cloud.
Cyber protections must be imposed properly: access control and management, encryption of all 3 data states (data-in-use, data-in-motion, data-at-rest) and most importantly the key management process.