Hi,
I’m trying to find a good way to secure these generic accounts and still to be able to use them as bt- and buadmin are used on a regular basis for updates and support cases. As I have 4 appliances to manage and have high security requirements I’d need to have individual passwords, with regular changes and changes after access for each of them. It would be a challenge to manage the regular changes and make performing regular tasks challenging.
I had posted an idea to use the Enterprise Updater as SPOC (Single Point of Control) which would have it’s own credentials and would have an encrypted key based connection to all appliances. From the Updater one could create individual schedules for the updates and unlock/lock them centrally. This would make tracking, planning and handling of updates a lot easier and only one generic user (buadmin) would need to be secured. I’d prefer a personal account though and leaving the generic account as a breaking glas solution. This would only cover the appliance software updates and not the SUPI updates. So either this would have to be integrated into the BT Enterprise Updater (with a separate role as permission) or it would require it’s own SPOC. Also here personal accounts would be preferred and to have the generic account as a breaking glas solution.
I’m not sure if the REST API would provide features to use a PAT or API token that would be secured in some other software like a scheduler to perform these activities.
How can these generic accounts be made more secure and locked down? What is the best practice here? Would it be possible to adapt the idea and to reduce the amount of generic accounts? How are other handling this obvious security risk?
Thanks for your input!




