Product SiteDocumentation Site

5.2.2. Securing Connectivity to Storage

You can connect virtualized systems to networked storage in many different ways. Each approach presents different security benefits and concerns, however the same security principles apply to each: authenticate the remote store pool before use, and protect the confidentiality and integrity of the data while it is being transferred.
The data must also remain secure while it is stored. It is considered a best practice to encrypt and/or digitally sign the data before storing it.