One design goal for storage security is to map server access to storage. This is based on the security classification of the data utilized by the particular server. As a best practice, which level of granularity should be used to enforce a particular security access level within a storage device?

A.
Disk director port
B.
Individual disk device
C.
LUN
D.
Storage interface port