The vulnerability of the host operating system must also be considered. Hosts are a key point of vulnerability because they are subject to traditional, well- developed security exploits. One way to reduce this risk is to ensure that hosts have access only to the storage resources that they need to access by using a combination of zoning and array-based LUN masking.