White Papers

Additional resources
4 Best Practices for Securing Dell EMC SC Series Storage | BP1082
1 Introduction
Data security is a primary concern in any IT environment. Business-critical or confidential information must be
protected from unauthorized access and properly disposed of when required. Many organizations are
compelled to implement data-protection technologies due to regulatory compliance.
This document provides best practices for deploying a secure Dell EMC SC Series SAN to prevent
unauthorized access to administrative interfaces and to protect data at rest using self-encrypting drives.
1.1 Audience
This paper is intended for storage administrators, SAN system designers, storage consultants, network and
security consultants, or anyone tasked with building a secure, production SAN using SC Series storage. It is
assumed that all readers have experience in designing or administering a shared storage solution. Also, there
are some assumptions made in terms of familiarity with all current Ethernet standards as defined by the
Institute of Electrical and Electronic Engineers (IEEE) as well as TCP/IP and iSCSI standards as defined by
the Internet Engineering Task Force (IETF).