A mapping at the very high level of on-premises security controls to native cloud services that can be used to replicate their specific role. As the cloud services tend to be more granular and overlapping in functionality, the mapping is at best approximate but it may bring some extra awareness on the options available in the cloud. Any suggestions are welcome as this chart will continue to be a work in progress.
Any feedback is appreciated!
Online version (with links to each service)
High definition PDF
High Definition SVG