Chapter 51

SAN Security

John McGowan,    EMC Corporation

Jeffrey Bardin,    Independent consultant

John McDonald,    EMC Corporation

Note: This chapter is available in its entirety online at store.elsevier.com/product.jsp?isbn=9780123943972 (click the Resources tab at the bottom of the page).

1 Abstract

One thing to consider is that the most probable avenue of attack in a SAN is through the hosts connected to the SAN. There are potentially thousands of host, application, and operating system-specific security considerations that are beyond the scope of this chapter but should be followed as your systems and application administrators properly configure their owned devices. Information security, that aspect of security that seeks to protect data ...

Get Computer and Information Security Handbook, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.