The management of network security

How is the management of network security similar and different between on-prem and cloud environments? Give some examples.