In this paper, I will discuss security vulnerabilities in networked storage solutions and methods to identify and mitigate risk associated with the vulnerabilities. I will begin with an overview of the evolution of storage from Direct Attached Storage (DAS) to two dominant networked storage...