An effective storage management solution must consider the role of security in ensuring network and data integrity. Open systems storage has evolved over many years prior to the advent of storage area networks (SANs). Originally, it was designed to work with direct-attached storage. By preventing access to the administrative practices on the server or to the server box itself, you could prevent access to the server-owned storage resources of disk and tape. Unfortunately, some of the assumptions made for software that worked in direct-attached storage are not valid for SANs. Furthermore, unless properly planned for and managed by your storage management solution, holes exist in your SAN security practices that can threaten data integrity and system availability.
This white paper outlines security practices for an effective storage management solution, including storage array volume access control, volume access control on the host, device configuration access control, management software access, and proactive detection and notification of access violations, auditing and logging. (June 2002)
The role of security in storage management software
相关推荐
DoSTOR存储分析 SRM厂商CreekPath重新焕发生机
Managing Storage as a Supply Chain
The need for policy-based management software in SANs
CreekPath AIM(TM) Suite high availability process
紫光云2026 AI战略:从云到智,以垂直大模型重构政企与工业生产力
中国AI已入下半场:从技术狂欢到价值落地,Gartner解读关键变局
自研AGI CPU芯片:Arm在AI时代的转折迈出重要一步
Akamai AI Grid:分布式推理重构AI算力版图,开启实时智能新时代




