One design goal for storage security is to map server access to storage. This is based on the
security classification of the data utilized by the particular server. As a best practice, which level of
granularity should be used to enforce a particular security access level within a storage device?

A.
Individual disk device
B.
Storage interface port
C.
Disk director port
D.
LUN