Mapping of On-Premises Security Controls vs Major Cloud Providers Version 3.2 Feb 2019

By Adrian Grigorof CISSP, CISM, CRISC, CCSK

The migration of on-premises applications to the cloud invariably are followed by the replication of the functionality of security controls to cloud-based equivalents. However, the demarcation of these controls tend to blur in the cloud, with functionality overlapping, becoming more granular and offered at different tiers. It is difficult to make a one-to-one mapping so this chart should be used just as a high level view of cloud security controls that could be used to replicate the on-prem functionality. Version 3.0 of the Mapping of On-Premises Security Controls vs Major Cloud Providers includes feedback from several users and includes now Oracle, IBM and Alibaba cloud services.

High-definition PDF: http://www.firegenanalytics.com/downloads/mapping_on_prem_cloud_v3.pdf

Vector image format (SVG): http://www.firegenanalytics.com/downloads/mapping_on_prem_cloud_v3.svg