According to the present invention, techniques for performing security
functions in computer storage subsystems in order to prevent illegal access by
the host computers according to logical unit (LU) identity are provided. In representative
embodiments management tables can be used to disclose the Logical Unit in the storage
subsystem to the host computers in accordance with the users operational needs.
In a specific embodiment, accessibility to a storage subsystem resource can be
decided when an Inquiry Command is received, providing systems and apparatus wherein
there is no further need to repeatedly determine accessibility for subsequent accesses
to the Logical Unit. Many such embodiments can maintain relatively high performance,
while providing robust security for each LU.