Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
5.2.2. Securing Connectivity to Storage
You can connect virtualized systems to networked storage in many different ways. Each approach presents different security benefits and concerns, however the same security principles apply to each: authenticate the remote store pool before use, and protect the confidentiality and integrity of the data while it is being transferred.
The data must also remain secure while it is stored. Before storing, Red Hat recommends data be encrypted or digitally signed, or both.
Note
For more information on networked storage, refer to the Red Hat Enterprise Linux Virtualization Administration Guide.