We are using a dedicated NIC as a port forward target to allow support access to port 22 on a CentOS 6 machine. I would like to prevent the NIC from being enabled without a password. I know I could edit /etc/sysconfig/ifup to do this with a plain text password, but than anyone who could cat the file could see it. Does anyone know a more secure way to accomplish this?
Edit: There are sudo users with privileges to write network config files and read scripts. They need to manage other interfaces. The can read but not modify scripts like ifup but they can edit ifcfg-eth0.