How does one analyze all potential SAN access paths and pre-validate SAN configuration changes against SAN access...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
policies prior to performing a change so that unauthorized access paths are eliminated, or at least identified? You are asking about how to first identify all SAN paths and then how to implement access control in SAN. This is no different that network security. Establishing SAN access paths will require analyzing the configuration, LUN masking and zoning. Enforcing access control is similar to verifying the authorized access.
Editor's note: Do you agree with this expert's response? If you have more to share, post it in one of our .bphAaR2qhqA^0@/searchstorage>discussion forums.
Dig Deeper on Secure data storage
Related Q&A from Vijay Ahuja
Security expert Vijay Ahuja outlines the top five security questions to ask storage vendors before making a purchase.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.