An effective storage management solution must consider the role of security in ensuring network and data integrity. Open systems storage has evolved over many years prior to the advent of storage area networks (SANs). Originally, it was designed to work with direct-attached storage. By preventing access to the administrative practices on the server or to the server box itself, you could prevent access to the server-owned storage resources of disk and tape. Unfortunately, some of the assumptions made for software that worked in direct-attached storage are not valid for SANs. Furthermore, unless properly planned for and managed by your storage management solution, holes exist in your SAN security practices that can threaten data integrity and system availability.
This white paper outlines security practices for an effective storage management solution, including storage array volume access control, volume access control on the host, device configuration access control, management software access, and proactive detection and notification of access violations, auditing and logging. (June 2002)
The role of security in storage management software
相关推荐
DoSTOR存储分析 SRM厂商CreekPath重新焕发生机
Managing Storage as a Supply Chain
The need for policy-based management software in SANs
CreekPath AIM(TM) Suite high availability process
Arm与阿里巴巴合作,通过KleidiAI与通义千问模型的集成,加速端侧多模态AI体验
Radeon RX 9070系列显卡发布:AMD技术革新与市场竞逐的全景解析
超算互联网上线DeepSeek系列模型,提供超智融合算力支持
官宣:DeepSeek V3和R1模型完成海光DCU适配并正式上线