Free DISA STIG and SRG Library | Vaulted

Keyboard Video and Mouse Switch STIG

Version 2 Release 6
2016-01-22
U_Keyboard_Video_and_Mouse_Switch_V2R6_Manual-xccdf.xml
The Keyboard Video and Mouse Switch (KVM) STIG includes the computing requirements for KVM switches operating to support the DoD. The Keyboard Video and Mouse Switch STIG must also be applied for each site using KVM switches. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Vulnerabilities (43)

Written user agreements for all users authorized to use the KVM or A/B switch must be maintained.

Finding ID
KVM01.001.00
Rule ID
SV-6823r2_rule
Severity
Cat III
CCE
(None)
Group Title
KVM users agreement
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

A written user agreement allows the ISSO to be certain the end user that will be using the equipment has been presented with the documentation that explains their duties and responsibilities in relation to the equipment and they have acknowledged that they have read the documentation and understand it. Though there is no guarantee the user will perform as required, it will lessen the problems caused by uninformed users. The ISSO will maintain written user agreements for all users authorized to use the KVM or A/B switch.

Fix Text

Develop a user agreement, have each user of KVM or A/B switches sign a user agreement, and keep the signed agreement on file.

Check Content

The reviewer will interview the ISSO and view the written agreements. The agreement will require the user to perform the following. 1. Logging onto an IS. a. Identify the classification of the IS currently selected. b. Use the login and passwords appropriate for that IS. c. Verify the classification of the present IS by checking the classification label/banner. d. Begin processing. 2. Switching between ISs. a. Screen lock the IS you are currently working on if the IS supports this capability. b. Select the desired IS with the switch. c. Enter your user identifier and password to deactivate the screen lock on the newly selected IS. d. Verify the classification of the present IS by checking the classification label/banner. e. Begin processing. The agreement may state that the user has read and understands the SFUG sections dealing with the KVM switch usage if the SFUG or similar documentation exists. If no documents exist, this is a finding.

IA Controls

PRRB-1

A SFUG, or an equivalent document, that describes the correct uses of the switch and user responsibilities, must be maintained and distributed.

Finding ID
KVM01.002.00
Rule ID
SV-6824r2_rule
Severity
Cat III
CCE
(None)
Group Title
SFUG information for KVM and A/B switches.
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

The SFUG (Security Features User Guide) or an equivalent document describes the user’s security responsibilities including any site-specific requirements. This gives the user a single reference source for both initial indoctrination and for later review. The distribution of the SFUG will lessen the vulnerabilities created by user ignorance of policy or procedures required by the site. By keeping this document current the user will have the current policies and procedures available. The ISSO will maintain and distribute to the users a SFUG, or an equivalent document, that describes the correct uses of the switch and the user’s responsibilities.

Fix Text

If a Security Features User Guide does not exist, develop one making sure there is a section for KVM and A/B switches containing the information found in this STIG. If a Security Features User Guide exists, but does not contain a section on KVM and A/B switches, create a section that describes the correct uses of KVM and A/B switches.

Check Content

The reviewer will interview the ISSO and review the SFUG documentation. The SFUG will at a minimum have the following requirements. 1. Logging onto an IS. a. Identify the classification of the IS currently selected. b. Use the login and passwords appropriate for that IS. c. Verify the classification of the present IS by checking the classification label/banner. d. Begin processing. 2. Switching between ISs. a. Screen lock the IS you are currently working on if the IS supports this capability. b. Select the desired IS with the switch. c. Enter your user identifier and password to deactivate the screen lock on the newly selected IS. d. Verify the classification of the present IS by checking the classification label/banner. e. Begin processing. If no documentation exists within the SFUG or equivalent document, describing the user's security responsibilities when using a KVM or A/B switch, then this is a finding.

IA Controls

PRRB-1

The KVM switch must be physically protected in accordance with the requirements of the highest classification for any IS connected to the KVM switch.

Finding ID
KVM01.003.00
Rule ID
SV-6825r2_rule
Severity
Cat I
CCE
(None)
Group Title
KVM switch physical security
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

If the KVM switch is not physically protected in accordance with the requirements of the highest classification for any IS connected to the KVM switch, the KVM switch can be tampered with leading to the compromise of sensitive data or a denial of service caused by the disruption of the systems the KVM switch is connected. The ISSO or SA will ensure the KVM switch is physically protected in accordance with the requirements of the highest classification for any IS connected to the KVM switch.

Fix Text

Develop a plan to move the KVM switch to a location that is physically protected in accordance with the requirements of the highest classification for any IS connected to the KVM switch. Obtain CM approval for the plan and implement the plan.

Check Content

The reviewer will check the location of the KVM switch. If the switch is not located in an area that is secured in the same manner as required of the IS with the highest classification level, then this is a finding.

Potential Impact

When the KVM switch is moved it may require the ISs attached to the switch to be powered down prior to the move.

Responsibility

System Administrator

IA Controls

PECF-1, PECF-2

Smart (intelligent or programmable) keyboard must not be used in conjunction with a KVM switch when the KVM switch is connected to ISs of different classification and/or sensitivity levels.

Finding ID
KVM01.004.00
Rule ID
SV-6829r2_rule
Severity
Cat II
CCE
(None)
Group Title
KVM smart (intelligent or programmable) keyboard
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

In an environment where the KVM switch is connected to ISs of different classification and/or sensitivity levels, a smart (intelligent or programmable) keyboard can transfer sensitive data from one system to another leading to the compromise of data. The ISSO or SA will ensure a smart (intelligent or programmable) keyboard is not used in conjunction with a KVM switch when the switch is connected to ISs of different classification and/or sensitivity levels.

Fix Text

Replace the smart keyboard with a non-smart keyboard.

Check Content

The reviewer will interview the ISSO and view the keyboard attached to the KVM to verify that a smart keyboard is not in use when the KVM switch is attached to ISs with different classification and/or sensitivity levels. Keyboards that include USB ports, smart card slots, and removable media slots are considered smart keyboards. Note: A keyboard that has extended functionality that is not programmable, like an internet keyboard, is not prohibited. Note: Having a CAC reader in the KVM switch is acceptable; however, the host rather than the switch itself must perform the authentication algorithms. Otherwise the switch must be approved by PKI PMO.

Responsibility

System Administrator

IA Controls

DCBP-1

A wireless keyboard or mouse that is compliance with the current Wireless Keyboard and Mouse STIG must be attached to a KVM switch.

Finding ID
KVM01.005.00
Rule ID
SV-6839r2_rule
Severity
Cat II
CCE
(None)
Group Title
KVM wireless keyboard and mouse
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Signals from a wireless device can be intercepted and decoded which can lead to the compromise of sensitive data. The ISSO or SA will ensure wireless keyboards or mice attached to KVM switches are in compliance with the current Wireless Keyboard and Mouse STIG.

Fix Text

Reconfigure the wireless device, if possible, to be compliant with the Wireless Keyboard and Mouse STIG. If the wireless device cannot be made compliant with the Wireless Keyboard and Mouse STIG, replace the device with a wireless device that can be made compliant with the Wireless Keyboard and Mouse STIG or with a wired device.

Check Content

The reviewer will look at the keyboard and the mouse. If either is wireless, it must be in compliance with the Wireless Keyboard and Mouse STIG.

Responsibility

System Administrator

IA Controls

ECWN-1

The desktop background of information systems attached to a KVM switch must be labeled with the proper classification banners.

Finding ID
KVM01.006.00
Rule ID
SV-6842r2_rule
Severity
Cat III
CCE
(None)
Group Title
KVM Desktop Backgrounds on information systems.
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Without the banners to identify the information system the KVM switch is currently active on, the user could enter a command to the wrong information system and create a denial of service or the user could enter data into the wrong system creating either a security incident (data entered to a system of the wrong classification) or a compromise of sensitive data.

Fix Text

Modify the screen backgrounds for each information system attached to the KVM switch to comply with information below. These banners will state the overall classification level of the information system in large bold type. These banners will have a solid background color assigned using the following scheme: Yellow for Sensitive Compartmented Information (SCI). Orange for Top Secret (TS). Red for Secret. Blue for Confidential. Green for Unclassified. When information systems have similar classification levels but require separation for other reasons, the use of unique colors for different information systems or networks is permissible. These banners will identify the information system, if space is available.

Check Content

The reviewer will view the desktop backgrounds of each information system attached to the KVM switch and verify they are labeled as described below. The desktop backgrounds will display classification banners at the top and bottom of the screen. These banners will state the overall classification level of the information system in large bold type. These banners will have a solid background color assigned using the following scheme: Yellow for Sensitive Compartmented Information (SCI). Orange for Top Secret (TS). Red for Secret. Blue for Confidential. Green for Unclassified. When information systems have similar classification levels but require separation for other reasons, the use of unique colors for different information systems or networks is permissible. These banners will identify the information system, if space is available. If classification banners are not used on information systems attached to a KVM, this is a finding.

Responsibility

System Administrator

IA Controls

ECML-1

A KVM switch with configurable features must have the configuration protected from modification with a DoD compliant password.

Finding ID
KVM01.007.00
Rule ID
SV-6843r2_rule
Severity
Cat II
CCE
(None)
Group Title
KVM switch configuration password.
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

If the KVM switch is configurable, some features that are available such as auto toggling between attached ISs are not permitted. If the configuration is not protected by a password it can be modified by any user allowing features that are not permitted. This can lead to the compromise of sensitive data. If the KVM switch has configurable features, the ISSO or SA will ensure the configuration is protected from modification with a DoD compliant password.

Fix Text

If the KVM switch’s configuration can be protected by a password, including user id/password combinations or PKI for network attached switches, create a DOD compliant password to protect the configuration. If the KVM switch’s configuration cannot be protected by a password, including user id/password combinations or PKI for network attached switches, replace it with a KVM switch that either has no configuration or the configuration can be protected by a password.

Check Content

If the KVM switch is configurable, the reviewer will, with the assistance of the SA, try to change the configuration with a random password and with no password. If the reviewer is able to change the configuration with a random password or no password, then this is a finding. Note: The emphasis here is the protection of the configuration not the technique, if the configuration is protected as a function of a privileged user id/password sign in or by a DoD PKI (for network attached KVM switches) this fulfills this requirement.

Responsibility

System Administrator

IA Controls

IAIA-2, IAIA-1

The KVM switch feature for automatically toggling between ISs must be disabled.

Finding ID
KVM01.008.00
Rule ID
SV-6844r2_rule
Severity
Cat II
CCE
(None)
Group Title
KVM automatic toggling between ISs
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

The feature that automatically toggles between connected ISs or active ISs can cause a screen to be automatically displayed that contains sensitive information. This can lead to the compromise of sensitive data. The ISSO or SA will ensure the feature for automatically toggling between ISs is disabled.

Fix Text

Disable the feature for automatically toggling between ISs. If the KVM switch can be configured to disable the ability to switch peripherals other than the keyboard, video monitor, and mouse, modify the configuration to disable this feature. If the KVM switch cannot be configured to disable this feature replace the KVM switch with a KVM switch that is compliant.

Check Content

If the KVM switch has the feature for automatically toggling between ISs, the reviewer will verify, with the assistance of the ISSO or SA, that it is disabled. If the feature is disabled but the configuration is not protected then this is a finding.

Responsibility

System Administrator

IA Controls

DCBP-1

A hot key feature must not be enabled other than the menu feature that allows the user to select the IS to be used from the displayed menu.

Finding ID
KVM01.009.00
Rule ID
SV-6845r2_rule
Severity
Cat II
CCE
(None)
Group Title
KVM miscellaneous hot key features
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

There are many "hot key" features that could be used. Since each vender has a different set of features and it is impractical to review all features from all venders for potential vulnerabilities, no features other than the ability to bring up a menu of the ISs available on the KVM switch to allow the user to select which IS they wish to display will be enabled. Additional features will be approved if requested and time is available to review the feature and its implementation. The ISSO or SA will ensure the only “hot key” feature enabled is the menu feature that allows the user to select the IS to be used from the displayed menu.

Fix Text

Disable any unauthorized "hot key" features in the KVM switch's configuration.

Check Content

The reviewer will, with the assistance of the ISSO or SA, verify the only “hot key” feature enabled is the menu feature that allows the user to select the IS to be used from the displayed menu. If the configuration cannot be protected, this is a finding.

Responsibility

System Administrator

IA Controls

DCBP-1

A machine-readable or a paper-document backup must be maintained for the configuration of the KVM switch.

Finding ID
KVM01.011.00
Rule ID
SV-6846r2_rule
Severity
Cat III
CCE
(None)
Group Title
KVM configuration backup
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Without a backup of the KVM switch's configuration, you can have a denial of service if the configuration cannot be restored quickly in the event it is lost or a faulty switch needs to be replaced. The ISSO or SA will ensure a machine-readable or a paper-document backup is maintained for the configuration of the KVM switch.

Fix Text

Create a machine-readable or paper-document backup of the KVM switch configuration.

Check Content

Interview the ISSO or SA to verify a backup of the configuration is maintained. If a backup of the configuration does not exist, this is a finding.

Responsibility

System Administrator

IA Controls

COSW-1

A written description of the KVM switch, the ISs attached to the KVM switch, and the classification level of each IS attached to the KVM switch must be maintained.

Finding ID
KVM02.001.00
Rule ID
SV-6847r2_rule
Severity
Cat III
CCE
(None)
Group Title
KVM physical description of connections
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Without a written description of the KVM switch, the ISs attached to the KVM switch, and the classification level of each IS attached to the KVM switch, tampering with the KVM switch by adding or moving connections cannot be verified and the physical configuration cannot be reproduced if needed. This can lead to a denial of service or a compromise of sensitive data if a connection is removed, moved, or added. The ISSO will maintain a written description of the KVM switch, the ISs attached to the KVM switch, and the classification level of each IS attached to the KVM switch.

Fix Text

Create a written description of the KVM switch, the ISs attached to the KVM switch, and the classification level for each IS attached to the KVM switch.

Check Content

The reviewer will verify the description exists and check that it accurately describes the switch and its attached ISs. An annotated drawing or diagram is acceptable. If no documentation exists, this is a finding.

IA Controls

DCHW-1

The KVM switch must be configured to force the change of the configuration password every 90 days or there is no policy and procedure in place to change the configuration password every 90 days.

Finding ID
KVM02.002.00
Rule ID
SV-6848r2_rule
Severity
Cat II
CCE
(None)
Group Title
KVM switch configuration password change
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

The longer the time between password changes the greater the chance the password will become compromised. A compromised password can allow a malicious user to change the configuration of the KVM switch creating a denial of service or a compromise of sensitive data. The ISSO will ensure the KVM switch is configured to force the change of the configuration password every 90 days or there is a policy and procedure in place to change the configuration password every 90 days.

Fix Text

Configure the KVM switch to force the change of the configuration password every 90 days or if the KVM switch does not support this functionality, create a policy and procedure to change the configuration password every 90 days.

Check Content

The reviewer will, with the assistance of the ISSO or SA, verify the KVM switch is configured to force the change of the configuration password every 90 days or there is a policy and procedure in place to change the configuration password every 90 days. If the switch is not configured or there is no policy or procedure in place to force a configuration password change every 90 days, this is a finding.

IA Controls

DCBP-1

The KVM switch has the ability to support a RAS connection, this feature must be disabled or the connectors on the KVM switch supporting this feature must be blocked with a tamper evident seal.

Finding ID
KVM02.003.00
Rule ID
SV-6849r3_rule
Severity
Cat I
CCE
(None)
Group Title
KVM switch RAS
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

KVM switches that support Dialup Remote Access Services (RAS) do not support a robust identification and authorization process or robust auditing; therefore this feature will not be used. Tamper evident seals over the port(s) that support this feature will serve as an indicator that this feature may not been used for unauthorized access to the KVM switch. The ISSO has not ensured, if the KVM switch has the ability to support a RAS connection, this feature is disabled and the connectors on the KVM switch supporting this feature are blocked with a tamper evident seal.

Fix Text

Configure the KVM switch to disable the RAS feature, remove all hardware from the KVM switch that supports this feature, and block all connectors on the KVM switch that support this feature with tamper evident seals. NSA IAD Protective Technologies has tamper evident products available for use, including seals for RJ45, D-sub, and USB ports. These can be obtained by contacting them either on NIPRNet at ptproducts@radium.ncsc.mil or on SIPRNet at ptproducts@nsa.smil.mil. When ordering, please specify that this is for use on a DoD Information System and the government use version is needed.

Check Content

The reviewer will, with the assistance of the ISSO, verify if the KVM switch has the ability to support a RAS connection and that this feature is disabled and the connectors on the KVM switch supporting this feature are blocked with a tamper evident seal. If the RAS feature is enabled and/or the RAS ports are not protected with tamper evident seals, this is a finding.

Potential Impact

Sites that depend on this feature for after-hours support and maintenance will be denied access to this feature and will need to implement an approved alternative.

IA Controls

EBRP-1

Written permission from the AO responsible for each IS attached to a KVM switch that is attached to ISs of different classification levels must be maintained.

Finding ID
KVM02.004.00
Rule ID
SV-6867r2_rule
Severity
Cat III
CCE
(None)
Group Title
AO written permission KVM span classification
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

The AO responsible for an IS attached to a KVM switch that has other ISs attached of differing classifications levels must approve of the use of the KVM switch. The AO is the only individual that may be cognizant of the nature of the data accessible from the IS and what requirements have been placed on its access. There may be a need to have the system isolated from KVM switches even though they are approved for use in spanning classification levels. When the ISs are of different classification levels, the ISSM will maintain written permission from all AOs responsible for all ISs connected to a KVM switch.

Fix Text

Obtain written permission for the IS to be attached to the KVM switch from the AO responsible for the system in question. At the earliest time so as not to impact production, if written permission has not been received, the IS will be removed from the KVM switch and be placed on a separate keyboard, video monitor, and mouse until written permission is received.

Check Content

The reviewer will interview the ISSM and verify written permission from the AO responsible for each IS attached to a KVM switch that is attached to ISs of different classification levels is being maintained. If no documentation exists, this is a finding.

Potential Impact

If permission has not been received prior to attachment, and the AO does not immediately approve the attachment, the system must immediately be removed from the KVM switch and a separate keyboard, video monitor, and mouse must be used until written permission from the responsible AO is received.

Responsibility

Information Assurance Manager

IA Controls

DCBP-1

KVM or A/B switches must be approved prior to being connected to ISs of different classification levels.

Finding ID
KVM02.005.00
Rule ID
SV-6876r3_rule
Severity
Cat II
CCE
(None)
Group Title
KVM switch list for ISs differing classification
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Only KVM switches that have been tested and verified to prevent the transfer of data from one IS to another will be used when the ISs connected to the switch are of differing classification levels. The switch will be operated in the approved port configuration only. When the KVM switch is attached to ISs of different classification levels, the ISSO will ensure only approved KVM or A/B switches are used.

Fix Text

Immediately replace the unapproved KVM switch with an approved KVM switch. If there is no approved KVM switch available, remove all ISs from the unapproved KVM switch and attach a separate keyboard, video monitor, and mouse to each IS. Alternately the ISs can be segregated by classification level on as many individual KVM switches as needed. Verify port configuration complies with guidance for the switch used.

Check Content

Verify the KVM or A/B switch attached to ISs of different classification levels has been evaluated and approved prior to connection. The National Information Assurance Partnership (NIAP) product lists can be found below: https://www.niap-ccevs.org/CCEVS_Products/ If the KVM or A/B switch is not found on the NIAP list, this is a finding.

Potential Impact

If an approved KVM switch cannot immediately replace the unapproved switch, it will be necessary to remove all of the systems from the KVM switch and attach an individual keyboard, video monitor, and mouse to each or segregate the ISs by classification level onto as many individual KVM switches as needed.

IA Controls

DCBP-1

A KVM switch must not be cascaded while being attached to ISs of different classification levels.

Finding ID
KVM02.006.00
Rule ID
SV-6878r2_rule
Severity
Cat III
CCE
(None)
Group Title
KVM differing classification levels cascaded
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Cascading KVM switches, connecting one switch to another switch, can make it difficult to determine which system is currently connected to the keyboard, video monitor, and mouse by simple observation. In situations where the ISs are of differing classification levels this could lead to the compromise of sensitive or classified data or a denial of service caused by a privileged command being given to the wrong system. When the KVM switch is attached to ISs of different classification levels, the ISSO or SA will ensure no KVM switches are cascaded.

Fix Text

Develop a plan to remove all cascaded KVM switches as soon as possible without disrupting production. Connect each IS to an open port on a KVM switch that is in turn only connected to a keyboard, video monitor, and mouse, not to another KVM switch. Obtain CM approval for the plan and execute the plan at the earliest opportunity.

Check Content

The reviewer will check the connections for the KVM switch to verify it is not connected to another KVM switch when ISs of different classification levels are attached. If KVM switches are cascaded, this is a finding.

Potential Impact

Removal of cascading will require separate keyboard, video monitor, and mouse for each KVM switch.

Responsibility

System Administrator

IA Controls

DCBP-1

Tamper evident seals must be attached to the KVM switch and all IS cables at their attachment points where the KVM switch is attached to ISs of different classification levels.

Finding ID
KVM02.007.00
Rule ID
SV-6882r3_rule
Severity
Cat II
CCE
(None)
Group Title
KVM spanning classification level tamper seals
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Tamper evident seals are designed to break if tampered with or show evidence of tampering. They are used to indicate a cabinet has been opened or a cable has been removed, moved or added. For KVM switches attached to ISs of differing classification levels it is necessary to be aware of any potential tampering with the connections. Switching the cables for two ISs could lead to the compromise of sensitive data. Removal of a cable could lead to a denial of service until it is reattached. The ISSO or SA will ensure tamper evident seals are attached to the KVM switch and all IS cables at their attachment points.

Fix Text

Obtain tamper evident seals and apply them to the KVM switch case joints such that if the case is opened the seal will be broken. Also place them across the junction between the IS cables and the KVM switch so that if a cable is moved or removed the seal will be broken. NSA IAD Protective Technologies has tamper evident products available for use, including seals for RJ45, D-sub, and USB ports. These can be obtained by contacting them either on NIPRNet at ptproducts@radium.ncsc.mil or on SIPRNet at ptproducts@nsa.smil.mil. When ordering, please specify that this is for use on a DoD Information System and the government use version is needed.

Check Content

The reviewer will verify tamper evident seals are attached to the KVM switches and to the IS cable attachment points. If tamper evident seals are not placed on the KVM switch and the IS cable attachment points, this is a finding. For cables, these seals will be placed across the junction between the switch and the cable. For the KVM switch, the seals will be placed across the KVM case joints such that opening the case will break the seal.

IA Controls

DCBP-1

A KVM switch must not be used to switch a peripheral other than a keyboard, video monitor, or mouse in an environment where the KVM switch is attached to ISs of different classification levels..

Finding ID
KVM02.008.00
Rule ID
SV-6883r2_rule
Severity
Cat I
CCE
(None)
Group Title
KVM differing classification switch peripheral
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Peripheral devices, other than keyboards, video monitors, and mice, can contain persistent memory and allow data to move between ISs of differing classification levels creating an unacceptable situation. This includes the ability to switch a smart card reader. If the switch has the ability to switch other peripheral devices and the feature is not disabled it will be assumed it is being used. When the KVM switch is attached to ISs of different classification levels, the ISSO or SA will ensure the KVM switch’s ability to switch peripheral devices other than the keyboard, video, and mouse is disabled.

Fix Text

Disable the feature for automatically toggling between ISs. If the KVM switch can be configured to disable the ability to switch peripherals other than the keyboard, video monitor, and mouse, modify the configuration to disable this feature. If the KVM switch cannot be configured to disable this feature replace the KVM switch with a KVM switch that is compliant.

Check Content

The reviewer will, with the assistance of the ISSO or SA, verify the KVM switch is not configured to switch peripherals other than Keyboard, Video, and Mouse. Note: This includes but is not limited to a smart card reader. Note: The most likely interface that would be used with this feature would be USB but it may be any legacy I/O interfaces.

Responsibility

System Administrator

IA Controls

DCBP-1

Peripherals other than a keyboard, video monitor, or mouse must not be attached to a KVM switch that is attached to ISs of different classification levels.

Finding ID
KVM02.009.00
Rule ID
SV-6884r3_rule
Severity
Cat I
CCE
(None)
Group Title
KVM differing classification peripherals attached
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

It will be assumed that any peripheral other than a keyboard, video monitor, or mouse attached to a KVM switch is intended to be used regardless of the current configuration of the KVM switch. This peripheral can contain persistent memory that can be used to move data between ISs of different classification levels compromising either the data that was moved and the IS to which the data was moved. When the KVM switch is attached to ISs of different classification levels, the ISSO, the SA, and the user will ensure no peripherals other than the keyboard, video, or mouse is connected to the KVM.

Fix Text

Remove the unauthorized peripheral and block the port it is attached to with a tamper evident seal. NSA IAD Protective Technologies has tamper evident products available for use, including seals for RJ45, D-sub, and USB ports. These can be obtained by contacting them either on NIPRNet at ptproducts@radium.ncsc.mil or on SIPRNet at ptproducts@nsa.smil.mil. When ordering, please specify that this is for use on a DoD Information System and the government use version is needed.

Check Content

The reviewer will view the KVM switch, used in an environment where it is attached to ISs of different classification levels, to verify no peripherals other than the keyboard, video monitor, and mouse are attached. If any other peripherals are attached, this is a finding.

Responsibility

System Administrator

IA Controls

DCBP-1

A KVM switch, which is attached to ISs of different classification levels, must have connections for peripherals, other than the keyboard, video monitor, or mouse, blocked with tamper evident seals.

Finding ID
KVM02.010.00
Rule ID
SV-6889r3_rule
Severity
Cat II
CCE
(None)
Group Title
KVM differing classification unblocked ports
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

It will be assumed that KVM switches that can switch peripherals other than the keyboard, video monitor, and mouse, that are attached to ISs of differing classification levels, and that do not have the connectors for the additional peripherals blocked with tamper evident seals, have been tampered with and have been used to transfer data between ISs of different classifications levels until proven otherwise. If data is transferred between ISs of different classification levels the data has been compromised and the receiving IS has been compromised. When the KVM switch is attached to ISs of different classification levels, the ISSO or SA will ensure the connectors for additional peripherals are blocked with tamper evident seals.

Fix Text

Obtain tamper evident seals and apply them to any open connections on the KVM. NSA IAD Protective Technologies has tamper evident products available for use, including seals for RJ45, D-sub, and USB ports. These can be obtained by contacting them either on NIPRNet at ptproducts@radium.ncsc.mil or on SIPRNet at ptproducts@nsa.smil.mil. When ordering, please specify that this is for use on a DoD Information System and the government use version is needed.

Check Content

The reviewer will view the KVM switch, which is attached to ISs of different classification levels, to verify all connections for peripherals other than a keyboard, video monitor or mouse are blocked with tamper evident seals. If additional connections are not blocked with tamper evident seals, this is a finding.

Responsibility

System Administrator

IA Controls

DCBP-1

A network attached KVM switch used to administer ISs must be attached to an out-of-band network.

Finding ID
KVM03.001.00
Rule ID
SV-6900r2_rule
Severity
Cat I
CCE
(None)
Group Title
Network KVM used to administer not out-of-band
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

If a network attached KVM switch is attached to an out-of-band network there is less opportunity for a malicious user to compromise the interface and create a denial of service by issuing disruptive commands to a server. The ISSO or SA will ensure a network attached KVM switch used to administer ISs is connected to an out-of-band network.

Fix Text

Develop a plan that will attach all network attached KVM switches used to administer ISs to an out-of-band network. Obtain CM approval and implement the plan.

Check Content

The reviewer will interview the ISSO or SA to verify that a network attached KVM switch used to administer ISs is connected to an out of band network. If a network attached KVM used to administer ISs is not connected to an out-of-band network, this is a finding.

Responsibility

System Administrator

IA Controls

DCBP-1

The network attached KVM switch must not be attached to a network that is not at the same classification level as the ISs attached.

Finding ID
KVM03.002.00
Rule ID
SV-6901r2_rule
Severity
Cat I
CCE
(None)
Group Title
Network KVM classification of network
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

If a network attached KVM switch is attached to a network of a different classification level than the ISs attached to the KVM switch, this could lead to a compromise of sensitive data either on the network or on the ISs. The ISSO will ensure network attached KVM switches are only connected to a network at the same classification level as the ISs attached.

Fix Text

Remove the KVM switch from the network when the network KVM switch is attached to a network at a different classification level than the attached ISs. Attach the KVM switch to a network of the appropriate classification level.

Check Content

The reviewer will interview the ISSO to verify that a network attached KVM switch is attached to a network of the same classification level as the ISs attached. If the network KVM is attached to a network that is not at the same classification level as the attached ISs, then this is a finding.

IA Controls

ECIC-1

The network-facing component of a network attached KVM switch must be compliant with the current Network Infrastructure STIG.

Finding ID
KVM03.003.00
Rule ID
SV-6902r2_rule
Severity
Cat I
CCE
(None)
Group Title
Network KVM network infrastructure compliance
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

If the network facing components of a network attached KVM switch are not in compliance with the Network Infrastructure STIG the KVM switch could expose the network to vulnerabilities that could lead to a denial of service caused by the disruption of the network or a compromise of sensitive data.

Fix Text

Perform a self-assessment on the network the KVM switch is attached or request DISA to schedule and perform a Network review. Following the review close all findings.

Check Content

The reviewer will interview the ISSO to verify a network review has been performed on the network the KVM switch is attached and all findings discovered during the network review dealing with the KVM switch have been closed. If a network review has not been performed on the network attached KVM switch, this is a finding.

IA Controls

DCCS-1, DCCS-2

The KVM switch must be configured to require the user to login to the KVM switch to access the ISs attached.

Finding ID
KVM03.004.00
Rule ID
SV-6904r2_rule
Severity
Cat I
CCE
(None)
Group Title
Network KVM Login
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Without identification and authentication of the user accessing the network attached KVM switch anyone can access the ISs attached and if they have knowledge of a valid user id and password for the IS, disrupt the system causing a denial of service or access sensitive data compromising that data. The ISSO will ensure the KVM switch is configured to require the user to login to the KVM switch to access the ISs attached. PKI authentication is acceptable and preferred to password authentication.

Fix Text

Reconfigure the network attached KVM switch to require the users to login to the KVM switch prior to being allowed access to the ISs attached to the KVM switch.

Check Content

The reviewer will, with the assistance of the ISSO, try to access the network attached KVM switch without valid authentication. If the KVM switch is accessed without valid authentication, this is a finding.

Potential Impact

This creates an additional level of identification and authentication to access the ISs. If user id and password is used on the KVM switch, users will be instructed not to use the same password for the KVM switch as is used for any of the ISs attached to the KVM switch.

IA Controls

IAIA-2, IAIA-1

The KVM switch must be configured to require DoD compliant passwords.

Finding ID
KVM03.005.00
Rule ID
SV-6906r2_rule
Severity
Cat I
CCE
(None)
Group Title
Network KVM DoD complaint passwords
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Strong passwords are harder to guess or discover via brute force making the system more secure from malicious tampering. The ISSO will ensure the KVM switch is configured to require DoD compliant passwords.

Fix Text

Reconfigure the network attached KVM switch to require DoD compliant passwords. If this is not possible, replace the KVM switch with a KVM switch that can be configured to enforce DoD compliant passwords.

Check Content

The reviewer will, with the assistance of the ISSO, try to change a password to a non-compliant password. If a non-compliant password can be set, this is a finding. The use of PKI authentication would make this check not a finding.

IA Controls

IAIA-1, IAIA-2

Group or shared user ids must not be used on a network attached KVM switch.

Finding ID
KVM03.006.00
Rule ID
SV-6907r2_rule
Severity
Cat I
CCE
(None)
Group Title
Network KVM group user ids
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Usage of group or shared user ids makes it impossible to attribute an action to the originating user. In the case of a malicious action this could make prosecution impossible. The ISSO will ensure group or shared user ids are not used.

Fix Text

Remove the shared or group user ids and issue individual user ids to each user that requires access to the network attached KVM switch.

Check Content

The reviewer will interview the ISSO and verify that group or shared user ids are not being used. If group or shared user ids are being used, this is a finding.

IA Controls

IAGA-1

The network attached KVM switch must be configured to restrict a users access only to the systems they require.

Finding ID
KVM03.007.00
Rule ID
SV-6908r2_rule
Severity
Cat III
CCE
(None)
Group Title
Network KVM users restricted to ISs.
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Users accessing ISs they do not need access to can lead to the compromise of sensitive data. The ISSO will ensure the KVM switch is configured to restrict a user’s access to only the systems they require.

Fix Text

Reconfigure the network attached KVM switch to restrict users to systems they need to access.

Check Content

The reviewer will, with the assistance of the ISSO, try to access a system not allowed to the user signed onto the network attached KVM switch. If the user is able to access any systems, other than required systems, this is a finding.

IA Controls

ECAN-1

The network attached KVM switch must display an Electronic Notice and Consent Banner complaint with requirements of CJSCM 6510.01.

Finding ID
KVM03.008.00
Rule ID
SV-6909r2_rule
Severity
Cat III
CCE
(None)
Group Title
Network KVM warning banner
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

The warning banner notifies the user they are accessing a DoD system and they consent to having their actions monitored. Without this banner it is difficult to prosecute individuals who violate the usage restrictions of the IS.

Fix Text

Reconfigure the network KVM switch to display a warning banner in accordance with CJSCM 6510.01.

Check Content

The reviewer will, with the assistance of the ISSO or the SA, access the network attached KVM switch to verify a compliant warning banner is displayed. If a DoD compliant warning banner is not displayed, this is a finding.

Responsibility

System Administrator

IA Controls

ECWM-1

The KVM switch must be configured to use encrypted communications with FIPS 140-2 validated cryptography.

Finding ID
KVM03.009.00
Rule ID
SV-6910r2_rule
Severity
Cat I
CCE
(None)
Group Title
Network KVM encryption
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Because all administrative traffic contains sensitive data such as unencrypted passwords, it will be encrypted to protect it from interception. The KVM switch will be configured to require encryption for all communications via the network. NIST FIPS 140-2 validated cryptography will be used. The ISSO or SA will ensure the KVM switch is configured to use encrypted communications using FIPS 140-2 validated cryptography.

Fix Text

Reconfigure the network KVM switch to use FIPS 140-2 validated cryptography for all communications across the network.

Check Content

The reviewer will, with the assistance of the ISSO or SA, verify the network attached KVM switch is configured for encryption using FIPS 140-2 validated cryptography. If the network KVM switch is not configured to use FIPS 140-2 validated cryptography, this is a finding.

Responsibility

System Administrator

IA Controls

ECNK-1

The KVM switch must be configured to encapsulate and send USB connections other than KVM connections.

Finding ID
KVM03.010.00
Rule ID
SV-6911r2_rule
Severity
Cat I
CCE
(None)
Group Title
Network encapsulated USB non KVM traffic
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Some network attached KVM switched can encapsulate USB connections other than the keyboard, video monitor, and mouse connections. This connection could be a disk drive connection and could allow the transfer of data between the ISs attached to the KVM switch and the client system attached via IP to the KVM switch leading to a compromise of sensitive data. The ISSO or SA will ensure the KVM switch is not configured to encapsulate and send USB connections other than KVM connections.

Fix Text

Reconfigure the network KVM switch so that it will not encapsulate USB connections other than the keyboard, video monitor, or mouse, over IP.

Check Content

The reviewer will, with the assistance of the ISSO or SA, verify the KVM switch is not configured to encapsulate and send USB connections other than KVM connections. If the KVM switch is configured to encapsulate and send USB connections other than Keyboard, Video, and Mouse connections, this is a finding.

Responsibility

System Administrator

IA Controls

DCBP-1

Unused USB ports on the KVM switch must be blocked with tamper evident seals on a KVM switch that can encapsulate and send the USB protocol over the network to the client.

Finding ID
KVM03.011.00
Rule ID
SV-6915r3_rule
Severity
Cat II
CCE
(None)
Group Title
Network KVM unused USB ports tamper seals
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

By blocking the unused USB ports on a network attached KVM switch that can encapsulate USB over IP with tamper evident seals there will be an indication if someone has attached an unauthorized USB connection to the KVM switch. When a seal is found to have been tampered with or broken, it should be investigated. The ISSO will ensure any open USB ports on the KVM switch are blocked with tamper evident seals.

Fix Text

Block unused USB ports on a network attached KVM switch that can encapsulate USB over IP with tamper evident seals. NSA IAD Protective Technologies has tamper evident products available for use, including seals for RJ45, D-sub, and USB ports. These can be obtained by contacting them either on NIPRNet at ptproducts@radium.ncsc.mil or on SIPRNet at ptproducts@nsa.smil.mil. When ordering, please specify that this is for use on a DoD Information System and the government use version is needed.

Check Content

If the KVM switch can encrypt USB and send it over the network, the reviewer will view the KVM switch and verify that unused USB ports are blocked with tamper evident seals. If unused USB ports are not blocked with tamper evident seals, this is a finding.

IA Controls

DCBP-1

A network attached KVM switch must not be configured to control the power supplied to the ISs attached to the KVM switch or the connectors on the KVM switch that support this feature are not blocked with tamper evident seals.

Finding ID
KVM03.012.00
Rule ID
SV-6916r3_rule
Severity
Cat II
CCE
(None)
Group Title
Network KVM power control of IS
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

If a network attached KVM switch can control the power to the ISs attached to it and the KVM switch is compromised, a denial of service can be caused by powering off all the ISs attached to the KVM switch without accessing the individual ISs. The ISSO will ensure any feature that allows the KVM switch to directly control the power supplied to the ISs is not configured or used, and any connectors on the KVM switch used to support this feature are blocked with a tamper evident seal.

Fix Text

Remove the KVM switch’s control over the power supplied to the ISs and block any connectors on the KVM switch used to support this feature with tamper evident seals. NSA IAD Protective Technologies has tamper evident products available for use, including seals for RJ45, D-sub, and USB ports. These can be obtained by contacting them either on NIPRNet at ptproducts@radium.ncsc.mil or on SIPRNet at ptproducts@nsa.smil.mil. When ordering, please specify that this is for use on a DoD Information System and the government use version is needed.

Check Content

With the assistance of the ISSO, verify the network attached KVM switch is not configured to control the power of the ISs attached and all connectors on the KVM switch that support this functionality are blocked with tamper evident seals. If the KVM switch is configured to control the power of connected ISs, this is a finding.

IA Controls

PECF-2, DCBP-1, PECF-1

A network attached KVM switch must not be attached to ISs of different classification levels.

Finding ID
KVM03.013.00
Rule ID
SV-6917r2_rule
Severity
Cat I
CCE
(None)
Group Title
Network KVM ISs of different classification levels
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Because of the problems inherent in the spanning of networks of different classification levels, network attached KVM switches will not be attached to ISs of different classification levels. This can lead to the compromise of sensitive data. The ISSO will ensure the network attached KVM switches are not attached to ISs of different classification levels.

Fix Text

Remove all ISs from the network attached KVM switch that have a classification level that is different from the classification level of the network the KVM switch is attached to. Use a new network attached KVM switch for each IS classification level that you removed from the original KVM switch. Attach the KVM switch to a network that has the same classification level as the ISs that have been attach to the KVM switch.

Check Content

The reviewer will interview the ISSO to verify that a network attached KVM switch is not attached to ISs of different classification levels. If a network attached KVM is attached to ISs of different classification levels, this is a finding.

IA Controls

ECIC-1

There must be user agreements documenting the use of A/B switches.

Finding ID
KVM04.001.00
Rule ID
SV-6921r2_rule
Severity
Cat III
CCE
(None)
Group Title
A/B Switch user agreements
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

A signed user agreement is proof that the user has been informed of his security responsibilities when using an A/B switch. The ISSO will maintain written user agreements for all users authorized to use an A/B switch.

Fix Text

Create a standard user agreement for the use of A/B switches and have all authorized A/B switches users sign a user agreement.

Check Content

The reviewer will interview the ISSO and view the user agreements. A singed addendum to the SAAR is acceptable. If signed A/B switch user agreements are not on file, this is a finding.

IA Controls

PRRB-1

There must be user documentation describing the correct usage and user responsibilities for an A/B switch.

Finding ID
KVM04.002.00
Rule ID
SV-6922r2_rule
Severity
Cat III
CCE
(None)
Group Title
A/B switch SFUG
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

The Security Features Users Guide (SFUG) gives the user a single source to find security policy and guidance as to the user’s responsibility for security. The general policies and user responsibilities as apply to A/B switches and any local security policies will be placed in the SFUG or similar document. The ISSO will maintain and distribute to the users a SFUG that describes the correct uses of an A/B switch and the user’s responsibilities.

Fix Text

Create a section in the site's SFUG that contains general security policies and guidance plus the site's security policies and guidance for use of an A/B switch.

Check Content

The reviewer will interview the ISSO and view the SFUG or equivalent documentation to verify the following points are discussed. 1. A/B switches should be used only if there is no other solution. 2. A/B switches should be used only to connect multiple peripheral devices to a single IS. 3. A/B switches should never be used to connect a single peripheral to multiple ISs. 4. If an A/B switch is used to connect or share peripheral devices between two or more ISs, the ISs should be intended for the use of a single user within the users work area, and be visible from all ISs that it is attached. If documentation does not exist with the SFUG, describing the correct usage of an A/B switch and the user’s responsibilities, this is a finding.

IA Controls

PRRB-1

The A/B switch must be physically protected in accordance with the requirements of the highest classification of any IS connected to the A/B switch.

Finding ID
KVM04.003.00
Rule ID
SV-6923r2_rule
Severity
Cat I
CCE
(None)
Group Title
A/B Switch physical protection
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

If the A/B switch is not located in an area that has the same physical security as required by the IS of the highest classification level, this can lead to a compromise of sensitive data. The ISSO or SA will ensure the A/B switch is physically protected in accordance with the requirements of the highest classification for any IS connected to the A/B switch.

Fix Text

Move the A/B switch to a location where it is protected in the same manner as required by the IS of the highest classification level the A/B switch is attached.

Check Content

The reviewer will view the A/B switch to verify it is physically protected in accordance with the requirements of the highest classification of any IS connected to the A/B switch. If it is in the same location as the ISs connected then it is adequately protected. If the switch is not physically protected in accordance with the classification level of the highest attached IS, this is a finding.

Potential Impact

If the A/B switch needs to be relocated, all ISs and devices attached to the switch may need to be powered down prior to the move.

Responsibility

System Administrator

IA Controls

PECF-2, PECF-1

An A/B switch must not be used to share a peripheral device between two or more users.

Finding ID
KVM04.004.00
Rule ID
SV-6979r2_rule
Severity
Cat II
CCE
(None)
Group Title
A/B Switch sharing peripheral between users
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

When using an A/B switch to switch a peripheral between two or more users the risk always exists where the peripheral is connected to the wrong IS. An example would be a scanner shared between two systems using an A/B switch. If the user presses the scan button when the A/B switch is pointed to a different IS than the user intended, the document would be scanned into the wrong system. This could lead to the compromise of sensitive data. The ISSO or SA will ensure an A/B switch is not used to share a peripheral device between two or more users.

Fix Text

Develop a plan to remove all A/B switches that are being used to switch peripherals between two or more users and to acquire new peripherals to support documented needs. Obtain CM approval of the plan and execute the plan.

Check Content

The reviewer will interview the ISSO or SA to verify that A/B switches are not being used to share peripherals between two users. If an A/B switch is being used to share peripherals between users, this is a finding.

Potential Impact

There may be a need to acquire more peripherals.

Responsibility

System Administrator

IA Controls

DCBP-1

The A/B switch must be properly marked and labeled.

Finding ID
KVM04.005.00
Rule ID
SV-6980r2_rule
Severity
Cat III
CCE
(None)
Group Title
A/B Switch marking and labeling
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Failure to correctly mark switch positions and cable connections can lead to the A/B switch connecting the wrong device to the wrong system for the current intended use. This can lead to a denial of access to a peripheral by an IS or the access of the wrong peripheral by an IS compromising sensitive data. The ISSO or SA will ensure the A/B switch, cables, switch positions, and connectors are labeled in accordance with this STIG.

Fix Text

Mark and label the A/B switch in accordance with this STIG.

Check Content

The reviewer will view the A/B switch to verify it is marked in accordance with this STIG. It is marked government owned equipment. The switch positions are marked as to the systems or peripherals connected. The cables and connectors are marked with the systems or peripherals that are connected and their classification level. If the A/B switch is not properly marked and labeled, this is a finding.

Responsibility

System Administrator

IA Controls

ECML-1

A/B switches connecting information systems of differing classification levels must be on the NIAP CCEVS Products Lists.

Finding ID
KVM04.006.00
Rule ID
SV-6981r3_rule
Severity
Cat II
CCE
(None)
Group Title
A/B Switch ISs of different classification
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

An A/B switch not found on the approved KVM and A/B switch lists has not been tested to verify that it does not leak data between systems. This can lead to the compromise of sensitive data or the compromise of the ISs attached to the A/B switch. The organization will ensure only approved A/B switches are used with ISs of differing classification levels.

Fix Text

Replace the A/B switch with one from the NIAP CCEVS Products Lists. https://www.niap-ccevs.org/CCEVS_Products/

Check Content

The reviewer will verify the A/B switch attached to ISs of different classification levels exist on the NIAP CCEVS Products Lists. https://www.niap-ccevs.org/CCEVS_Products/ If the A/B switch is not on the NIAP CCEVS Products Lists, this is a finding.

Potential Impact

If there is no approved A/B switch, additional peripheral devices may need to be obtained.

IA Controls

DCBP-1

Tamper evident seals must be attached to the A/B switch and all IS cables at their attachment points for A/B switches attached to devices or ISs that have different classification levels.

Finding ID
KVM04.007.00
Rule ID
SV-6982r3_rule
Severity
Cat II
CCE
(None)
Group Title
A/B Switch different classification tamper seals
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Without the presences of tamper evident seals the A/B switch or its connections can be tampered with and the tampering will go undetected. This can lead to the compromise of sensitive data or the compromise of an IS. When an A/B switch is attached to ISs of different classification levels, the ISSO or SA will ensure tamper evident seals are attached to the A/B switch and all IS cables at their attachment points.

Fix Text

For an A/B switch attached to devices or ISs which are at different classification levels, attach tamper evident seals. NSA IAD Protective Technologies has tamper evident products available for use, including seals for RJ45, D-sub, and USB ports. These can be obtained by contacting them either on NIPRNet at ptproducts@radium.ncsc.mil or on SIPRNet at ptproducts@nsa.smil.mil. When ordering, please specify that this is for use on a DoD Information System and the government use version is needed.

Check Content

The reviewer will, for an A/B switch attached to devices or ISs which are at different classification levels, view the A/B switch to verify tamper evident seals are attached to the A/B switch and all IS cables at their attachment points. If tamper evident seals are not attached to the A/B switch and all IS cables at their attachment points, this is a finding.

Responsibility

System Administrator

IA Controls

DCBP-1

A/B switches must not be cascaded when connected to devices or ISs which are at different classification levels.

Finding ID
KVM04.008.00
Rule ID
SV-6983r2_rule
Severity
Cat III
CCE
(None)
Group Title
A/B Switch cascaded differing classification
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

When A/B switches are cascaded it is difficult to verify the currently selected connection is the correct selection. When A/B switches are used with ISs of differing classification levels this can lead to the compromise of sensitive data. When A/B switches are attached to ISs of different classification levels the ISSO or SA will ensure that A/B switches are not cascaded.

Fix Text

Remove the cascaded A/B switches that are connected to ISs of different classification levels.

Check Content

The reviewer will, for A/B switches which are connected to devices or ISs that are at different classification levels, view the A/B switches to verify the A/B switches are not cascaded. If the A/B switches are cascaded, this is a finding.

Potential Impact

It may be necessary to obtain additional peripherals to sustain the required functionality after removing the cascaded A/B switches.

Responsibility

System Administrator

IA Controls

DCBP-1

An A/B switch must not be used to switch a peripheral device that has persistent memory or devices that support removable media between two or more ISs of different classification levels.

Finding ID
KVM04.009.00
Rule ID
SV-6984r2_rule
Severity
Cat I
CCE
(None)
Group Title
A/B Switch different classification disk
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

If the peripheral device attached to an A/B switch, which is connected to ISs of differing classification levels, can be written to and read from this can lead to the compromise of sensitive or classified data and/or the compromise of the ISs. The ISSO or SA will ensure A/B switches are not used to switch a peripheral device that has persistent memory or devices that support removable media between two or more ISs of different classification levels.

Fix Text

Remove the A/B switch used to switch a peripheral device that has persistent memory or devices that support removable media between two or more ISs of different classification levels.

Check Content

The reviewer will view the A/B switch to verify the A/B switch is not used to switch a peripheral device that has persistent memory or devices that support removable media between two or more ISs of different classification levels. This would include but not be limited to ZIP drives, hard disk drives, and writable CD drives. If A/B switches are used to switch a peripheral device that has persistent memory or devices that support removable media between two or more ISs of different classification levels, this is a finding.

Potential Impact

It may be necessary to obtain new peripheral devices to replace needed functionality when the A/B switch is removed.

Responsibility

System Administrator

IA Controls

DCBP-1

Input or output devices including, but not limited to, scanners, printers, or plotters must not be attached to an A/B switches that spans classification levels.

Finding ID
KVM04.010.00
Rule ID
SV-6985r2_rule
Severity
Cat I
CCE
(None)
Group Title
A/B I/O peripherals different classification
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Input devices attached to A/B switches that are in turn attached to ISs of different classification levels could input data to the wrong IS compromising sensitive or classified data and/or the IS involved. Output from output devices attached to A/B switches that are in turn attached to ISs of different classification levels could be picked up by an individual other than the one the data was intended, leading to a compromise of sensitive or classified data. The ISSO will ensure input and output devices including but not limited to scanners, printers, or plotters are not attached to A/B switches that span classification levels.

Fix Text

Remove the A/B switch attached to ISs of different classification levels and an input or output peripheral.

Check Content

The reviewer will view the A/B switch to verify input and output devices including, but not limited to, scanners, printers, or plotters are not attached to an A/B switch that spans classification levels. If input and output devices are attached to an A/B switch that spans classification levels, this is a finding.

Potential Impact

Additional hardware may need to be obtained to maintain the required functionality after the A/B switch is removed.

Responsibility

System Administrator

IA Controls

DCBP-1