An example process for controlling access to a data storage device in a distributed
information handling system includes the operation of receiving, at the storage
device, a login request from a host. In response to the login request, the storage
device may determine whether a host access table in the storage device includes
an identifier for the host. If the host access table includes an identifier for
the host, the storage device may allow the host to use the storage device. However,
if the host access table does not include an identifier for the host, the storage
device may prevent the host from using the storage device. Additional or alternative
operations may include adding identifiers for specified hosts and a list of corresponding
logical storage units to a mapping table. The data storage device may then deny
access to hosts without identifiers in the mapping table.