T 5.129 Manipulation of data via the storage system

An uncontrolled connection between networks may be established via a poorly configured SAN installation. The internal data of an organisation may be seriously threatened if, for example, a server connected to a SAN is accessible over the internet and is then compromised from the outside.

The connection of a server inadequately isolated from the internet to a storage system may lead to the compromising of the storage system if the server becomes compromised. In this case, data in the SAN that is assigned to other machines may be read or changed.

Since all security and monitoring safeguards such as firewalls or IDSs (Intrusion Detection Systems) in the IT networks of the organisation are bypassed, the potential for damage is very high.