Storage security compliance
..............................................................................................
402
Security technologies
........................................................................................................
402
IP SAN security technologies
.......................................................................................
403
Fibre Channel SAN security technologies
......................................................................
403
Encryption security technologies
...................................................................................
403
Key management
.......................................................................................................
404
Organizational security policies
...................................................................................
404
HP security strategy
..........................................................................................................
404
HP Secure Advantage
................................................................................................
404
Resource protection
.............................................................................................
405
Data protection
...................................................................................................
405
Security validation
...............................................................................................
406
Storage security best practices
...........................................................................................
406
Assessing security risks
...............................................................................................
407
Managing organizational risks
..............................................................................
407
Data security implementations
...............................................................................
407
HP storage security solutions
..............................................................................................
407
C-series Storage Media Encryption
...............................................................................
407
C-series SAN-OS security
............................................................................................
408
C-series IP SAN security
..............................................................................................
409
B-series Encryption Switch and Encryption FC Blade security
............................................
410
B-series Fabric OS security
..........................................................................................
411
Resource protection
.............................................................................................
411
Data protection
...................................................................................................
413
Security validation
...............................................................................................
415
Key management
.......................................................................................................
415
19 Best practices
..........................................................................
417
SAN planning
................................................................................................................
417
Design specification
..........................................................................................................
418
SAN topology
................................................................................................................
418
Multi-fabric SANs
......................................................................................................
418
Failover protection
.....................................................................................................
418
Data access patterns
..................................................................................................
418
ISL ratio
....................................................................................................................
419
Incremental SAN expansion
........................................................................................
419
SAN configuration
..........................................................................................................
419
Fibre Channel switch configuration
...............................................................................
420
Server setup
..............................................................................................................
420
Storage system configuration
.......................................................................................
420
Storage-based LUN masking
..............................................................................................
420
Zoning
............................................................................................................................
421
Zoning enforcement
...................................................................................................
421
Zoning guidelines
......................................................................................................
421
Zoning by operating system
..................................................................................
422
Zoning by HBA
...................................................................................................
422
Zoning by application
..........................................................................................
422
Zoning by port allocation
.....................................................................................
422
EBS zoning
...............................................................................................................
423
Zone naming
............................................................................................................
423
Naming by identifier type
...........................................................................................
423
Case sensitivity of fabric identifiers
...............................................................................
423
Server naming
...........................................................................................................
423
Storage system naming
...............................................................................................
423
12