An effective storage management solution must consider the role of security in ensuring network and data integrity. Open systems storage has evolved over many years prior to the advent of storage area networks (SANs). Originally, it was designed to work with direct-attached storage. By preventing access to the administrative practices on the server or to the server box itself, you could prevent access to the server-owned storage resources of disk and tape. Unfortunately, some of the assumptions made for software that worked in direct-attached storage are not valid for SANs. Furthermore, unless properly planned for and managed by your storage management solution, holes exist in your SAN security practices that can threaten data integrity and system availability.
This white paper outlines security practices for an effective storage management solution, including storage array volume access control, volume access control on the host, device configuration access control, management software access, and proactive detection and notification of access violations, auditing and logging. (June 2002)
The role of security in storage management software
相关推荐
- DoSTOR存储分析 SRM厂商CreekPath重新焕发生机
- Managing Storage as a Supply Chain
- The need for policy-based management software in SANs
- CreekPath AIM(TM) Suite high availability process
- 金融高频交易再迎提速利器,AMD Alveo UL3422以减半的尺寸提供同等性能
- 【技术解析】CPU运行大模型工作负载的探讨
- 【技术解析】万卡集群的企业布局、技术挑战与解决之道
- 【深度观察】美国大选引发的AI事件大盘点,硅谷产生意见分裂,ChatGPT等各大AI公司处理大选时暴露问题