This document provides guidance on implementing network security in a cloud environment. It discusses networking models like traditional, converged and cloud-only networks. It also addresses various network security requirements like network access controls using firewalls, content inspection using IDS/IPS, secure routing, DDoS protection, VPN connectivity, threat management, forensic support and more. The document provides an architecture overview and implementation steps for these various network security controls in a cloud environment.