What type of checklist or questions should CIOs ask their storage folks to ensure that the right protections are in place?
1. Is the IP network secure?
2. Is the datacenter secure?
3. Do we trust our employees?
4. Do we use encryption when needed?
5. Are we using iSCSI? Have we looked into iSCSI security methods?
6. Do we replicate data or do we have access to data via remote links?
7. Can anyone dial-in to our SAN?
Editor's note: Do you agree with this expert's response? If you have more to share, post it in one of our .bphAaR2qhqA^0@/searchstorage>discussion forums.
Dig Deeper on Data storage strategy
Related Q&A from Christopher Poelker
SAN expert Chris Poelker discusses how to change the size of a LUN in a Microsoft cluster server environment. Continue Reading
SAN expert Chris Poelker compares connecting a SAN with wavelength cabling and dark fiber and discusses the pros and cons of each. Continue Reading
Storage expert Chris Poelker outlines WWN basics in order to answer the question: "Why do HBAs in a SAN have same base?" Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.