Servers should be kept in a physically secure location with access by authorized personnel only.
The corporate network should be physically secured against eavesdropping or packet sniffing. Any packets associated with the administration of NetStorage should have the highest security.
Access to NetStorage configuration settings and logs should be restricted. This includes file system access rights, FTP access, access via Web utilities, SSH, and any other type of access to these files.
When NetStorage is administered by users outside of the corporate firewall, the HTTPS protocol should be used. A VPN should also be employed.
If a server is accessible from outside the corporate network, a local server firewall should be employed to prevent direct access by a would-be intruder.
Log files should be kept and analyzed periodically.