Problem solve Get help with specific problems with your technologies, process and projects.

What a SAN break-in would look like

What a SAN break-in would look like
Interesting question. If someone broke into your SAN to steal data they would have to connect up via a server. If you monitor your connections you would see that a server was added and removed. If they accessed the data through a currently configured and connected server, you may never know it happened.

To steal data that belongs to a particular server involves simple SCSI reads. If you have LUN security in your storage arrays, the only data able to be accessed would be the data that that server has access to inside the array.


Editor's note: Do you agree with this expert's response? If you have more to share, post it in one of our .bphAaR2qhqA^0@/searchstorage>discussion forums.

Dig Deeper on SAN technology and arrays

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.