Belkin®
Secure
DVI
KVM
Switch,
Secure
KM
Switch
and
Secure
Windowing
KVM
EAL
4
augmented
ALC_FLR.3
Security
Target
Rev.
1.01
Page
|
53
requirement
for
visual
indication.
O.ROM
TOE
software/firmware
shall
be
protected
against
unauthorized
modification.
Embedded
software
must
be
contained
in
mask
‐
programmed
or
one
‐
time
‐
programmable
read
‐
only
memory
permanently
attached
(non
‐
socketed)
to
a
circuit
assembly.
EXT_ROM.1
(Read
‐
Only
ROMs)
EXT_ROM.1:
implements
the
O.ROM
objective
directly.
While
there
might
be
other
ways
to
protect
embedded
TSF
code
on
a
ROM
(programmable
or
not),
the
requirement
stipulates
an
easily
‐
verifiable
implementation
that
ensures
that
the
TSF
code
will
not
be
overwritten
or
modified.
O.SELECT
An
explicit
action
by
the
AUTHORIZED
USER
shall
be
used
to
select
the
COMPUTER
to
which
the
shared
set
of
PERIPHERAL
DEVICES
is
CONNECTED.
Single
push
button,
multiple
push
button,
or
rotary
selection
methods
are
used
by
most
(if
not
all)
current
market
products.
Automatic
switching
based
on
scanning
shall
not
be
used
as
a
selection
mechanism.
FMT_MSA.1
(Management
of
Security
Attributes)
FMT_MSA.3
(Static
Attribute
Initialization)
FMT_MSA.1:
This
restricts
the
ability
to
change
selected
PERIPHERAL
PORT
GROUP
IDS
to
the
AUTHORIZED
USER.
This
requirement
is
a
dependency
of
FMT_MSA.3.
FMT_MSA.3:
The
TOE
assumes
a
default
PERIPHERAL
PORT
GROUP
selection
based
on
a
physical
switch
position
or
a
manufacturer’s
specified
sequence
for
choosing
among
the
CONNECTED
COMPUTERS
(CONNECTED
here
implies
powered
on).
This
requirement
is
a
dependency
of
FDP_IFF.1a
and
FDP_ITC.1.
O.SWITCH
All
DEVICES
in
a
SHARED
PERIPHERAL
GROUP
shall
be
CONNECTED
to
at
most
one
SWITCHED
COMPUTER
at
a
time.
FDP_IFF.1a
(Simple
Security
Attributes)
FMT_MSA.3
(Static
FDP_IFF.1a:
This
requirement
identifies
the
security
ATTRIBUTES
needed
to
detail
the
operation
of
a
switch
and
the
rules
allowing
information
transfer.
This
requirement
is
a
dependency
of
FDP_IFC.1a.
FMT_MSA.3:
The
TOE
assumes
a
default
PERIPHERAL
PORT