5.2.2. Securing Connectivity to Storage