Map Security Policies to Security Groups