Security Target
Version 1.1
2022-03-08
iv
List of Figures and Tables
Figure 1: Simplified Block Diagram of a 2-Port KVM TOE ........................................................................... 10
Figure 2: Representative ATEN Secure KVM Switch TOE Model in its environment .................................. 12
Table 1: ATEN Secure KVM Switch TOE Models ........................................................................................... 1
Table 2: Terms and Definitions ..................................................................................................................... 3
Table 3: Acronyms ......................................................................................................................................... 5
Table 4: ATEN Secure KVM Switch Console Interfaces and TOE Models ...................................................... 8
Table 5: ATEN Secure KVM Switch Computer Interfaces and TOE Models .................................................. 9
Table 6: Security Objectives for the Operational Environment .................................................................. 16
Table 7: TOE Security Functional Components ........................................................................................... 18
Table 8: Audio Filtration Specifications ...................................................................................................... 21
Table 9: TOE Security Functional Components (DP Models) ...................................................................... 30
Table 10: TOE Security Functional Components (H Models) ...................................................................... 31
Table 11: TOE Security Functional Components (D Models) ...................................................................... 32
Table 12: Assurance Components............................................................................................................... 33
Table 13: Supported protocols by port ....................................................................................................... 38
Table 14: DP Models ................................................................................................................................... 41
Table 15: H Models ..................................................................................................................................... 42
Table 16: D Models ..................................................................................................................................... 42
Table 17: SFR Protection Profile Sources ................................................................................................... 49
Table 18: Security Functions vs. Requirements Mapping ........................................................................... 52