UCF STIG Viewer Logo

A KVM switch, which is attached to ISs of different classification levels, must have connections for peripherals, other than the keyboard, video monitor, or mouse, blocked with tamper evident seals.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6704 KVM02.010.00 SV-6889r3_rule DCBP-1 Medium
Description
It will be assumed that KVM switches that can switch peripherals other than the keyboard, video monitor, and mouse, that are attached to ISs of differing classification levels, and that do not have the connectors for the additional peripherals blocked with tamper evident seals, have been tampered with and have been used to transfer data between ISs of different classifications levels until proven otherwise. If data is transferred between ISs of different classification levels the data has been compromised and the receiving IS has been compromised. When the KVM switch is attached to ISs of different classification levels, the ISSO or SA will ensure the connectors for additional peripherals are blocked with tamper evident seals.
STIG Date
Keyboard Video and Mouse Switch STIG 2015-12-09

Details

Check Text ( C-2688r3_chk )
The reviewer will view the KVM switch, which is attached to ISs of different classification levels, to verify all connections for peripherals other than a keyboard, video monitor or mouse are blocked with tamper evident seals. If additional connections are not blocked with tamper evident seals, this is a finding.
Fix Text (F-6299r3_fix)
Obtain tamper evident seals and apply them to any open connections on the KVM. NSA IAD Protective Technologies has tamper evident products available for use, including seals for RJ45, D-sub, and USB ports. These can be obtained by contacting them either on NIPRNet at ptproducts@radium.ncsc.mil or on SIPRNet at ptproducts@nsa.smil.mil. When ordering, please specify that this is for use on a DoD Information System and the government use version is needed.