Belkin®
Secure
DVI
KVM
Switch,
Secure
KM
Switch
and
Secure
Windowing
KVM
EAL
4
augmented
ALC_FLR.3
Security
Target
Rev.
1.01
Page
|
43
6
Security
Requirements
This
section
defines
the
IT
security
requirements
that
shall
be
satisfied
by
the
TOE
or
its
environment.
The
CC
divides
TOE
security
requirements
into
two
categories:
Security
functional
requirements
(SFRs)
(such
as,
identification
and
authentication,
security
management,
and
user
data
protection)
that
the
TOE
and
the
supporting
evidence
need
to
satisfy
to
meet
the
security
objectives
of
the
TOE.
Security
assurance
requirements
(SARs)
that
provide
grounds
for
confidence
that
the
TOE
and
its
supporting
IT
environment
meet
its
security
objectives
(e.g.,
configuration
management,
testing,
and
vulnerability
assessment).
These
requirements
are
discussed
separately
within
the
following
subsections.
6.1
Security
Functional
Requirements
for
the
TOE
The
security
requirements
that
are
levied
on
the
TOE
are
specified
in
this
section
of
the
ST.
The
TOE
satisfies
the
SFRs
delineated
in
“Target
of
Evaluation
Security
Requirements,”
Section
5.1,
of
the
claimed
Protection
Profile.
The
SFRs
have
been
reproduced
here
for
convenience.
Functional
Component
ID
Functional
Component
Name
FDP_ETC.1
Export
of
User
Data
Without
Security
Attributes
FDP_IFC.1a
Subset
Information
Flow
Control
(Data
Separation)
FDP_IFC.1b
Subset
Information
Flow
Control
(Unidirectional
Data
Flow)
FDP_IFF.1a
Simple
Security
Attributes
(Data
Separation)
FDP_IFF.1b
Simple
Security
Attributes
(Unidirectional
Data
Flow)
FDP_ITC.1
Import
of
user
data
without
security
attributes
FMT_MSA.1
Management
of
security
attributes
FMT_MSA.3
Static
attribute
initialization
FPT_PHP.1
Passive
detection
of
physical
attack
FPT_PHP.3
Resistance
to
physical
attack
EXT_VIR.1
Visual
indication
rule
EXT_IUC.1
Invalid
USB
connection
EXT_ROM.1
Read
‐
Only
ROMs