• The host operating system itself • Host-to-switch fabric connections • Switch-to-switch fabric connections • Host-to-target connectivity • IP storage (iSCSI, iFCP)—more vulnerable due to IP exploits • SAN extension—primarily IP-based; optical is more secure • Management interfaces - In band or our of band using SNMP
Management interfaces can pose the highest level of risk. An attacker who gains access to management interfaces can cause significant amounts of damage. Even if hackers are only able to listen in on management traffic, they could gain information that could help them execute other security breaches.