See Security for iSCSI attached systems to determine which of the following security actions are appropriate for your environment: