Belkin®
Secure
DVI
KVM
Switch,
Secure
KM
Switch
and
Secure
Windowing
KVM
EAL
4
augmented
ALC_FLR.3
Security
Target
Rev.
1.01
Page
|
2
Contents
1
Introduction
............................................................................................................................ 5
1.1
ST
and
TOE
Identification
................................................................................................. 5
1.2
TOE
Overview
................................................................................................................... 6
1.3
TOE
Description
................................................................................................................ 7
1.3.1
Common
Criteria
Product
type
................................................................................. 8
1.3.2
Physical
Scope
and
Boundary
................................................................................... 8
1.3.3
Evaluated
Environment
........................................................................................... 10
1.3.4
Guidance
Documents
.............................................................................................. 15
1.3.5
TOE
Features
Outside
of
Evaluation
Scope
............................................................ 15
1.3.6
Logical
Scope
of
the
TOE
......................................................................................... 16
1.4
Organization
................................................................................................................... 17
1.5
Document
Conventions
.................................................................................................. 18
1.6
Document
Terminology
.................................................................................................. 18
1.6.1
ST
Specific
Terminology
.......................................................................................... 18
1.6.2
Acronyms
................................................................................................................ 22
2
Conformance
Claims
............................................................................................................. 23
2.1
Common
Criteria
Conformance
Claims
.......................................................................... 23
2.2
Protection
Profile
(PP)
Claims
........................................................................................ 23
2.3
Package
Claims
............................................................................................................... 23
3
Security
Problem
Definition
.................................................................................................. 24
3.1
Secure
Usage
Assumptions
............................................................................................ 24
3.2
Threats
............................................................................................................................ 24
3.2.1
Threats
Addressed
by
the
TOE
................................................................................ 25
3.2.2
Threats
addressed
by
the
IT
Operating
Environment
............................................. 26
3.3
Organizational
Security
Policies
..................................................................................... 26
4
Security
Objectives
................................................................................................................ 27
4.1
Security
Objectives
for
the
TOE
..................................................................................... 27
4.2
Security
Objectives
for
the
Operational
Environment
................................................... 29