O'Reilly logo

Cloud Security Automation by Prashant Priyam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security in the storage gateway

In storage gateway, your iSCSI initiators connect your volume to the iSCSI targets. For security, storage gateway uses CHAP-based authentication to authenticate iSCSI and its initiator connection.

CHAP provides protection against playback attacks by requiring authentication to access storage volume targets. 

You can define one or more of the CHAP credentials:

Apart from this, we can use IAM for security. Here, you also have an IAM policy to define the permission needed to access the storage gateway.

Let's look at an example:

{    "Version": "2012-10-17",    "Statement": [        { "Sid": "AllowsSpecifiedActionsOnAllGateways", ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required