:awesome:
And by that, I mean...
:problem?:
This involves going through a system and denoting all the access to and from that system. It also involves interesting comments from the compliance guy when you mention how many devices don't support SSH, only telnet... mergers and acquisitions tend to have little surprises like that...
Then there's the circus that results when a vendor uses an account to connect to devices... and the account must be specified as each device is added to the product's supervision. So what happens when the password on that account changes? There will be much clicking and typing, as each of those devices has to be manually edited.
:joy:
And by that, I mean...
:ivan: