Belkin®
Secure
DVI
KVM
Switch,
Secure
KM
Switch
and
Secure
Windowing
KVM
EAL
4
augmented
ALC_FLR.3
Security
Target
Rev.
1.01
Page
|
3
4.3
Rationale
........................................................................................................................ 30
4.3.1
TOE
Security
Objectives
Rationale
.......................................................................... 31
4.3.2
Security
Objectives
Rationale
for
the
Operational
Environment
........................... 37
4.4
Rationale
for
Organizational
Policy
Coverage
................................................................ 38
5
Extended
Components
Definition
......................................................................................... 39
5.1
Class
EXT:
Extended
Visual
indications
.......................................................................... 39
5.1.1
Visual
Indication
Rule
(EXT_VIR)
............................................................................. 39
5.2
Class
EXT:
Extended
‐
Invalid
USB
Connection
(EXT_IUC)
.............................................. 40
5.2.1
Invalid
USB
Connection
(EXT_IUC)
.......................................................................... 40
5.3
Class
EXT:
Extended
–
ROM
(EXT_ROM)
........................................................................ 41
5.4
Rationale
for
Explicitly
Stated
Security
Requirements
.................................................. 42
6
Security
Requirements
.......................................................................................................... 43
6.1
Security
Functional
Requirements
for
the
TOE
.............................................................. 43
6.1.1
Class
FDP:
User
Data
Protection
............................................................................. 44
6.1.2
Class
FMT:
Security
Management
.......................................................................... 47
6.1.3
Class
FPT:
Protection
of
the
TSF
.............................................................................. 48
6.2
Explicitly
Stated
Requirements
for
the
TOE
................................................................... 49
6.3
Rationale
For
TOE
Security
Requirements
..................................................................... 50
6.3.1
TOE
Security
Functional
Requirements
Tracing
&
Rationale
.................................. 50
6.4
Rationale
For
IT
Security
Requirement
Dependencies
.................................................. 56
6.5
Dependencies
Not
Met
.................................................................................................. 57
6.6
Security
Assurance
Requirements
................................................................................. 58
6.7
Rationale
for
Security
Assurance
................................................................................... 59
7
TOE
Summary
Specification
.................................................................................................. 60
7.1
User
Data
Protection
–
Data
Separation
(TSF_DSP)
....................................................... 60
7.2
Security
Management
(TSF_MGT)
................................................................................. 61
7.3
Protection
of
the
TSF
(TSF_TMP)
................................................................................... 62
7.4
USB
Connection
(TSF_IUC)
............................................................................................. 62
7.5
Read
‐
Only
Memory
(TSF_ROM)
..................................................................................... 63
7.6
Audio
Output
Switching
Function
Clarification
.............................................................. 63