Solved

SAN risks

Posted on 2014-04-29
4
429 Views
Last Modified: 2014-04-30
What kind of things can/do go wrong with SANS, and what should an audit/healthcheck focus on when looking at SANS for risks?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 14

Assisted Solution

by:Zac Harris
Zac Harris earned 167 total points
ID: 40029539
This question has a pretty broad answer...

Here is a pretty good wikipedia article on SANs: Link to Article

You can also refer to this article, it discusses pros and cons: Link to Article
0
 
LVL 8

Assisted Solution

by:Lee Ingalls
Lee Ingalls earned 167 total points
ID: 40029543
That is a rather broad question. Answers can vary depending on whether your SAN is iSCSI over copper or Fiber Channel, RAID type, types of drives, etc...

I suggest the following link as a SAN risks primer:
http://searchitchannel.techtarget.com/feature/Storage-area-network-SAN-risks

HTH, Lee
0
 
LVL 17

Accepted Solution

by:
Gerald Connolly earned 166 total points
ID: 40031350
As the others have said, this is a very broad question and Lee has pointed out an article on just the security aspects, but another way to look at the risks from an audit/healthcheck point of view is to look at why the SAN was installed in the first place and does it meet those requirements.
Those requirements typically include:
- Improved RPO/RTO
- Improved backup/restore regimes
- Business continuance
- Resilience to single points of failure
etc
Other items to look at are error logs and error counters on all parts of the SAN Infrastructure (switches, HBA's etc)
0
 
LVL 8

Expert Comment

by:Lee Ingalls
ID: 40031881
As with any storage solution...
How long can you afford to be without your data?
How much fault tolerance and redundancy? Per Gerald's comment -- identifying and minimizing single points of failure - requires you take into consideration: hardware, software, infrastructure as part of your business continuity plan. Then there's the cost...
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is your phone running out of space to hold pictures?  This article will show you quick tips on how to solve this problem.
The business world is becoming increasingly integrated with tech. It’s not just for a select few anymore — but what about if you have a small business? It may be easier than you think to integrate technology into your small business, and it’s likely…
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question