Chapter e61

SAN Security

John McGowan1, Jeffrey S. Bardin2, and John McDonald1     1Dell EMC, Hopkinton, MA, United States     2Treadstone 71 LLC, Barre, MA, United States

Abstract

One thing to consider is that the most probable avenue of attack in a storage area network (SAN) is through the hosts connected to the SAN. There are potentially thousands of host, application, and operating system–specific security considerations that are beyond the scope of this chapter but should be followed as your systems and application administrators properly configure their owned devices.

Information security is an aspect of security that seeks to protect data confidentiality, data integrity, and access to the data, is an established commercial sector with a wide ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.