To answer this question, I went to a great source, Anne Skamarock, co-author of Blade Servers and Virtualization: Transforming Enterprise Computing While Cutting Costs. She says: "The person who asks this question doesn't discuss what the distances are for the SAN or what protocols are being used but, again, this has little to do with the blades and everything to do with implementing network and SAN security. Depending on what their bladed architecture is, the blade chassis can actually add to the security because the first set of network switches are often housed within the blade chassis, adding to physical security.
"If the blades are completely diskless, that means they are booting via Preboot Execution Environment (PXE). This is probably the area where the concern lies due to the http-like nature of PXE. This environment, at least today, does not provide a way for detecting and disallowing unknown servers from performing remote installations. Because of this, one would follow the same best practices to secure the PXE as they would to secure their overall network such as:
- Physical security
- Auditing and monitoring for intrusions
- Strong password protocols/procedures"
Dig Deeper on Cybersecurity risk assessment and management
Related Q&A from Russell Dean Vines
While some SMBs are not securing their mobile broadband, there is good reason to do so, even if a customer has only a small amount of data to protect. Continue Reading
A smurf attack can slow down a network to the point of shutting it down completely. Learn how to understand a full-scale smurf attack and how to ... Continue Reading
Streaming video and audio sites are frequently visited on both home computers and work computers. Learn about streaming video security risks and what... Continue Reading