Security Target
Version 1.1
2022-03-08
13
The TOE resists physical attacks on the main TOE enclosure as well as the RPS enclosure for the purpose
of gaining access to the internal components or to damage the anti-tampering battery by becoming
permanently disabled. The TOE preserves a secure state by disabling the TOE when there is a failure of
the power on self-test, or a failure of the anti-tampering function.
The TOE provides unambiguous detection of physical tampering that might compromise the TSF. The TSF
provides the capability to determine whether physical tampering with the TSF's devices or TSF's elements
has occurred.
2.4.6
TOE Access
The TOE displays a continuous visual indication of the computer to which the user is currently
connected, including on power up, and on reset.
2.5
TOE Documentation
There are several documents that provide information and guidance for the deployment and usage of
the TOE. In particular, the following guides reference the security-related guidance material for all
devices in the evaluated configuration.
Guidance Documentation:
•
IOGEAR 2/4/8-Port USB DVI/HDMI/DisplayPort Single/Dual
View Secure KVM Switch Administrator’s
Guide, Version 1.03, 2021-5-5
•
IOGEAR 2/4/8-Port USB DVI/HDMI/DisplayPort Single/Dual View Secure KVM Switch Port
Authentication Utility Guide, Version 1.03, 2021-5-5
•
IOGEAR Single/Dual View Secure KVM Switch User Manual 2/4/8-Port USB DVI/HDMI/DisplayPort,
Version 1.03, 2021-5-5
•
IOGEAR 2/4/8-Port USB DVI/HDMI/DisplayPort Single/ View Secure KVM Switch Admin Log Audit
Code, Version 1.03, 2021-5-5
TOE Documentation:
•
PP4.0 Secure KVM Isolation Document, Version 1.1 (Proprietary)
o
Note
: The PP4.0 Secure KVM Isolation Document is
proprietary
as permitted by PSD 4.0 Annex
D.1 Isolation Document and Assessment.
o
The isolation document supplements the security target Section 6 TOE Summary Specification in
order to demonstrate the TOE provides isolation between connected computers. In particular,
the isolation document describes how the TOE mitigates the risk of each unauthorized data flow
listed in PSD 4.0 Annex D and Evaluation Activities specified in the PP v4.0 and modules.