Mapping of On-Premises Security Controls vs Major Cloud Providers Version 3.2 Feb 2019
By Adrian Grigorof CISSP, CISM, CRISC, CCSK
The migration of on-premises applications to the cloud invariably are followed by the replication of the functionality of security controls to cloud-based equivalents. However, the demarcation of these controls tend to blur in the cloud, with functionality overlapping, becoming more granular and offered at different tiers. It is difficult to make a one-to-one mapping so this chart should be used just as a high level view of cloud security controls that could be used to replicate the on-prem functionality. Version 3.0 of the Mapping of On-Premises Security Controls vs Major Cloud Providers includes feedback from several users and includes now Oracle, IBM and Alibaba cloud services.
Vector image format (SVG): https://secureservercdn.net/184.108.40.206/3ef.16e.myftpupload.com/downloads/mapping_on_prem_cloud_v3.svg