T 3.79 Incorrect assignment of SAN resources
Operating systems react differently to visible storage resources. If the server and storage resource assignments are not unambiguous or strong enough, unauthorized accesses to storage resources through other servers, for example, could circumvent the security concept at the operating system or application level.
However, not only deliberate attacks in which an attacker attempts to utilise loopholes in the configuration for his/her own purposes should be taken into account. It is also important to consider the particularity of some operating systems to connect to all hard disks they can access and integrate them into their own hardware configuration.
Windows servers in particular tend to claim all visible storage resources as their own. In a storage network, this may result in storage areas assigned to other systems being removed from these systems, or in the destruction or inconsistency of the data stored in these storage areas.