The CISO’s guide to cyber-resilient storage