An effective storage management solution must consider the role of security in ensuring network and data integrity. Open systems storage has evolved over many years prior to the advent of storage area networks (SANs). Originally, it was designed to work with direct-attached storage. By preventing access to the administrative practices on the server or to the server box itself, you could prevent access to the server-owned storage resources of disk and tape. Unfortunately, some of the assumptions made for software that worked in direct-attached storage are not valid for SANs. Furthermore, unless properly planned for and managed by your storage management solution, holes exist in your SAN security practices that can threaten data integrity and system availability.
This white paper outlines security practices for an effective storage management solution, including storage array volume access control, volume access control on the host, device configuration access control, management software access, and proactive detection and notification of access violations, auditing and logging. (June 2002)
The role of security in storage management software
相关推荐
- DoSTOR存储分析 SRM厂商CreekPath重新焕发生机
- Managing Storage as a Supply Chain
- The need for policy-based management software in SANs
- CreekPath AIM(TM) Suite high availability process
- 希捷郑万成:存储已经成为人工智能的重要基础
- HarmonySpace鸿蒙座舱大规模OTA升级 为用户带来更智慧的交互体验
- EveryOps理念亮相swampUP 2024:JFrog强化从代码编写到软件部署的管理全程
- 希捷2024数据+峰会于贵阳成功举办,合作伙伴共话AI发展之道