An effective storage management solution must consider the role of security in ensuring network and data integrity. Open systems storage has evolved over many years prior to the advent of storage area networks (SANs). Originally, it was designed to work with direct-attached storage. By preventing access to the administrative practices on the server or to the server box itself, you could prevent access to the server-owned storage resources of disk and tape. Unfortunately, some of the assumptions made for software that worked in direct-attached storage are not valid for SANs. Furthermore, unless properly planned for and managed by your storage management solution, holes exist in your SAN security practices that can threaten data integrity and system availability.
This white paper outlines security practices for an effective storage management solution, including storage array volume access control, volume access control on the host, device configuration access control, management software access, and proactive detection and notification of access violations, auditing and logging. (June 2002)
The role of security in storage management software
相关推荐
- DoSTOR存储分析 SRM厂商CreekPath重新焕发生机
- Managing Storage as a Supply Chain
- The need for policy-based management software in SANs
- CreekPath AIM(TM) Suite high availability process
- 异构智算,稳定高效|联想全新发布基于第五代AMD EPYC处理器平台的服务器产品家族
- 华邦电子推出全新车规级W77T安全闪存
- 阿里云首次公开展示Flink2.0细节,将全面拥抱大模型技术
- Arm Tech Symposia 年度技术大会顺利收官,继续构建面向未来的 AI 计算平台