Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 2 No. 8 October 2003

Lock the back door

With an amazing number of people leaving the back door of their storage area network (SAN) wide open, it's really time to start thinking about your SAN management interfaces. If you haven't been following this series over the last two months, here's a quick review. There are five different elements to security. Authentication confirms you are who you say you are. Authorization ensures you're allowed to do what you're trying to do. Integrity makes sure that if you do access it, the data will be what it's supposed to be. Encryption ensures that if someone who isn't supposed to see it does see it, they won't be able to read it. And auditing is a way of double-checking all of the above. Six Ways to Secure Your Storage 1 Start thinking about security with regards to storage. 2 Start making security a priority when you talk to your storage vendors. 3 Use port-based zoning or port binding--not world-wide name (WWN)-based zoning. 4 Use hardware-enforced zoning. 5 Move your management interfaces off the corporate LAN. 6 Place another ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Spend less on storage

    by  Marc Farley

    Serial ATA disks can save you big bucks, but there's a bigger story here. By using RAID and a SAN, you can overcome many of its inherent reliability and performance limitations. It's time to rethink many of your assumptions about storage costs.

  • The survey says:

Columns in this issue

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close