Belkin®
Secure
DVI
KVM
Switch,
Secure
KM
Switch
and
Secure
Windowing
KVM
EAL
4
augmented
ALC_FLR.3
Security
Target
Rev.
1.01
Page
|
47
6.1.1.6
FDP_ITC.1
Import
of
User
Data
Without
Security
Attributes
Hierarchical
to:
No
other
components.
Dependencies:
[FDP_ACC.1
Subset
access
control,
or
FDP_IFC.1a
Subset
information
flow
control]
FMT_MSA.3
Static
attribute
initialization
FDP_ITC.1.1
The
TSF
shall
enforce
the
Data
Separation
SFP
when
importing
user
data,
controlled
under
the
SFP,
from
outside
the
TOE.
FDP_ITC.1.2
The
TSF
shall
ignore
any
security
attributes
associated
with
the
user
data
when
imported
from
outside
the
TOE.
FDP_ITC.1.3
The
TSF
shall
enforce
the
following
rules
when
importing
user
data
controlled
under
the
SFP
from
outside
the
TOE:
No
additional
rules
.
6.1.2
Class
FMT:
Security
Management
6.1.2.1
FMT_MSA.1
Management
of
Security
Attributes
Hierarchical
to:
No
other
components.
Dependencies:
[FDP_ACC.1
Subset
access
control,
or
FDP_IFC.1a
Subset
information
flow
control]
FMT_SMF.1
Specification
of
Management
Functions
FMT_SMR.1
Security
roles
FMT_MSA.1.1
The
TSF
shall
enforce
the
Data
Separation
SFP
to
restrict
the
ability
to
modify
the
security
attributes
PERIPHERAL
PORT
GROUP
IDs
to
the
USER
.
Application
Note:
An
AUTHORIZED
USER
shall
perform
an
explicit
action
to
select
the
COMPUTER
to
which
the
shared
set
of
PERIPHERAL
devices
is
CONNECTED,
thus
effectively
modifying
the
GROUP
IDs
associated
with
the
PERIPHERAL
DEVICES.