How is the implementation of network security similar and different between on-perm and cloud environments

Create one discussion thread and answer the following questions:

How is the implementation of network security similar and different between on-perm and cloud environments? Give some examples.

Note: Your initial post should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author\’s words and continue to use in-text citations.

Requirements: 250-300 words