Keyboard Video and Mouse Switch STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM01.001.00
- Vuln IDs
-
- V-6675
- Rule IDs
-
- SV-6823r2_rule
Checks: C-2603r2_chk
The reviewer will interview the ISSO and view the written agreements. The agreement will require the user to perform the following. 1. Logging onto an IS. a. Identify the classification of the IS currently selected. b. Use the login and passwords appropriate for that IS. c. Verify the classification of the present IS by checking the classification label/banner. d. Begin processing. 2. Switching between ISs. a. Screen lock the IS you are currently working on if the IS supports this capability. b. Select the desired IS with the switch. c. Enter your user identifier and password to deactivate the screen lock on the newly selected IS. d. Verify the classification of the present IS by checking the classification label/banner. e. Begin processing. The agreement may state that the user has read and understands the SFUG sections dealing with the KVM switch usage if the SFUG or similar documentation exists. If no documents exist, this is a finding.
Fix: F-6257r2_fix
Develop a user agreement, have each user of KVM or A/B switches sign a user agreement, and keep the signed agreement on file.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM01.002.00
- Vuln IDs
-
- V-6676
- Rule IDs
-
- SV-6824r2_rule
Checks: C-2604r3_chk
The reviewer will interview the ISSO and review the SFUG documentation. The SFUG will at a minimum have the following requirements. 1. Logging onto an IS. a. Identify the classification of the IS currently selected. b. Use the login and passwords appropriate for that IS. c. Verify the classification of the present IS by checking the classification label/banner. d. Begin processing. 2. Switching between ISs. a. Screen lock the IS you are currently working on if the IS supports this capability. b. Select the desired IS with the switch. c. Enter your user identifier and password to deactivate the screen lock on the newly selected IS. d. Verify the classification of the present IS by checking the classification label/banner. e. Begin processing. If no documentation exists within the SFUG or equivalent document, describing the user's security responsibilities when using a KVM or A/B switch, then this is a finding.
Fix: F-6258r2_fix
If a Security Features User Guide does not exist, develop one making sure there is a section for KVM and A/B switches containing the information found in this STIG. If a Security Features User Guide exists, but does not contain a section on KVM and A/B switches, create a section that describes the correct uses of KVM and A/B switches.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM01.003.00
- Vuln IDs
-
- V-6677
- Rule IDs
-
- SV-6825r2_rule
Checks: C-2605r2_chk
The reviewer will check the location of the KVM switch. If the switch is not located in an area that is secured in the same manner as required of the IS with the highest classification level, then this is a finding.
Fix: F-6259r1_fix
Develop a plan to move the KVM switch to a location that is physically protected in accordance with the requirements of the highest classification for any IS connected to the KVM switch. Obtain CM approval for the plan and implement the plan.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM01.004.00
- Vuln IDs
-
- V-6678
- Rule IDs
-
- SV-6829r2_rule
Checks: C-2610r2_chk
The reviewer will interview the ISSO and view the keyboard attached to the KVM to verify that a smart keyboard is not in use when the KVM switch is attached to ISs with different classification and/or sensitivity levels. Keyboards that include USB ports, smart card slots, and removable media slots are considered smart keyboards. Note: A keyboard that has extended functionality that is not programmable, like an internet keyboard, is not prohibited. Note: Having a CAC reader in the KVM switch is acceptable; however, the host rather than the switch itself must perform the authentication algorithms. Otherwise the switch must be approved by PKI PMO.
Fix: F-6262r2_fix
Replace the smart keyboard with a non-smart keyboard.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM01.005.00
- Vuln IDs
-
- V-6679
- Rule IDs
-
- SV-6839r2_rule
Checks: C-2624r2_chk
The reviewer will look at the keyboard and the mouse. If either is wireless, it must be in compliance with the Wireless Keyboard and Mouse STIG.
Fix: F-6267r2_fix
Reconfigure the wireless device, if possible, to be compliant with the Wireless Keyboard and Mouse STIG. If the wireless device cannot be made compliant with the Wireless Keyboard and Mouse STIG, replace the device with a wireless device that can be made compliant with the Wireless Keyboard and Mouse STIG or with a wired device.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM01.006.00
- Vuln IDs
-
- V-6680
- Rule IDs
-
- SV-6842r2_rule
Checks: C-2629r5_chk
The reviewer will view the desktop backgrounds of each information system attached to the KVM switch and verify they are labeled as described below. The desktop backgrounds will display classification banners at the top and bottom of the screen. These banners will state the overall classification level of the information system in large bold type. These banners will have a solid background color assigned using the following scheme: Yellow for Sensitive Compartmented Information (SCI). Orange for Top Secret (TS). Red for Secret. Blue for Confidential. Green for Unclassified. When information systems have similar classification levels but require separation for other reasons, the use of unique colors for different information systems or networks is permissible. These banners will identify the information system, if space is available. If classification banners are not used on information systems attached to a KVM, this is a finding.
Fix: F-6270r4_fix
Modify the screen backgrounds for each information system attached to the KVM switch to comply with information below. These banners will state the overall classification level of the information system in large bold type. These banners will have a solid background color assigned using the following scheme: Yellow for Sensitive Compartmented Information (SCI). Orange for Top Secret (TS). Red for Secret. Blue for Confidential. Green for Unclassified. When information systems have similar classification levels but require separation for other reasons, the use of unique colors for different information systems or networks is permissible. These banners will identify the information system, if space is available.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM01.007.00
- Vuln IDs
-
- V-6681
- Rule IDs
-
- SV-6843r2_rule
Checks: C-2631r2_chk
If the KVM switch is configurable, the reviewer will, with the assistance of the SA, try to change the configuration with a random password and with no password. If the reviewer is able to change the configuration with a random password or no password, then this is a finding. Note: The emphasis here is the protection of the configuration not the technique, if the configuration is protected as a function of a privileged user id/password sign in or by a DoD PKI (for network attached KVM switches) this fulfills this requirement.
Fix: F-6271r2_fix
If the KVM switch’s configuration can be protected by a password, including user id/password combinations or PKI for network attached switches, create a DOD compliant password to protect the configuration. If the KVM switch’s configuration cannot be protected by a password, including user id/password combinations or PKI for network attached switches, replace it with a KVM switch that either has no configuration or the configuration can be protected by a password.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM01.008.00
- Vuln IDs
-
- V-6682
- Rule IDs
-
- SV-6844r2_rule
Checks: C-2632r2_chk
If the KVM switch has the feature for automatically toggling between ISs, the reviewer will verify, with the assistance of the ISSO or SA, that it is disabled. If the feature is disabled but the configuration is not protected then this is a finding.
Fix: F-6272r3_fix
Disable the feature for automatically toggling between ISs. If the KVM switch can be configured to disable the ability to switch peripherals other than the keyboard, video monitor, and mouse, modify the configuration to disable this feature. If the KVM switch cannot be configured to disable this feature replace the KVM switch with a KVM switch that is compliant.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM01.009.00
- Vuln IDs
-
- V-6683
- Rule IDs
-
- SV-6845r2_rule
Checks: C-2633r2_chk
The reviewer will, with the assistance of the ISSO or SA, verify the only “hot key” feature enabled is the menu feature that allows the user to select the IS to be used from the displayed menu. If the configuration cannot be protected, this is a finding.
Fix: F-6273r1_fix
Disable any unauthorized "hot key" features in the KVM switch's configuration.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM01.011.00
- Vuln IDs
-
- V-6684
- Rule IDs
-
- SV-6846r2_rule
Checks: C-2634r2_chk
Interview the ISSO or SA to verify a backup of the configuration is maintained. If a backup of the configuration does not exist, this is a finding.
Fix: F-6274r1_fix
Create a machine-readable or paper-document backup of the KVM switch configuration.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM02.001.00
- Vuln IDs
-
- V-6685
- Rule IDs
-
- SV-6847r2_rule
Checks: C-2635r2_chk
The reviewer will verify the description exists and check that it accurately describes the switch and its attached ISs. An annotated drawing or diagram is acceptable. If no documentation exists, this is a finding.
Fix: F-6275r1_fix
Create a written description of the KVM switch, the ISs attached to the KVM switch, and the classification level for each IS attached to the KVM switch.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM02.002.00
- Vuln IDs
-
- V-6686
- Rule IDs
-
- SV-6848r2_rule
Checks: C-2636r2_chk
The reviewer will, with the assistance of the ISSO or SA, verify the KVM switch is configured to force the change of the configuration password every 90 days or there is a policy and procedure in place to change the configuration password every 90 days. If the switch is not configured or there is no policy or procedure in place to force a configuration password change every 90 days, this is a finding.
Fix: F-6276r1_fix
Configure the KVM switch to force the change of the configuration password every 90 days or if the KVM switch does not support this functionality, create a policy and procedure to change the configuration password every 90 days.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM02.003.00
- Vuln IDs
-
- V-6687
- Rule IDs
-
- SV-6849r2_rule
Checks: C-2637r2_chk
The reviewer will, with the assistance of the ISSO, verify if the KVM switch has the ability to support a RAS connection and that this feature is disabled and the connectors on the KVM switch supporting this feature are blocked with a tamper resistant/evident seal. If the RAS feature is enabled and/or the RAS ports are not protected with tamper resistant/evident seals, this is a finding.
Fix: F-6277r2_fix
Configure the KVM switch to disable the RAS feature, remove all hardware from the KVM switch that supports this feature, and block all connectors on the KVM switch that support this feature with tamper resistant/evident seals. Tamper resistant/evident seals are available from Protective Technologies: ptproducts@radium.ncsc.mil.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM02.004.00
- Vuln IDs
-
- V-6698
- Rule IDs
-
- SV-6867r2_rule
Checks: C-2658r2_chk
The reviewer will interview the ISSM and verify written permission from the AO responsible for each IS attached to a KVM switch that is attached to ISs of different classification levels is being maintained. If no documentation exists, this is a finding.
Fix: F-6292r2_fix
Obtain written permission for the IS to be attached to the KVM switch from the AO responsible for the system in question. At the earliest time so as not to impact production, if written permission has not been received, the IS will be removed from the KVM switch and be placed on a separate keyboard, video monitor, and mouse until written permission is received.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM02.005.00
- Vuln IDs
-
- V-6699
- Rule IDs
-
- SV-6876r3_rule
Checks: C-2671r4_chk
Verify the KVM or A/B switch attached to ISs of different classification levels has been evaluated and approved prior to connection. The National Information Assurance Partnership (NIAP) product lists can be found below: https://www.niap-ccevs.org/CCEVS_Products/ If the KVM or A/B switch is not found on the NIAP list, this is a finding.
Fix: F-6294r4_fix
Immediately replace the unapproved KVM switch with an approved KVM switch. If there is no approved KVM switch available, remove all ISs from the unapproved KVM switch and attach a separate keyboard, video monitor, and mouse to each IS. Alternately the ISs can be segregated by classification level on as many individual KVM switches as needed. Verify port configuration complies with guidance for the switch used.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM02.006.00
- Vuln IDs
-
- V-6700
- Rule IDs
-
- SV-6878r2_rule
Checks: C-2673r2_chk
The reviewer will check the connections for the KVM switch to verify it is not connected to another KVM switch when ISs of different classification levels are attached. If KVM switches are cascaded, this is a finding.
Fix: F-6295r2_fix
Develop a plan to remove all cascaded KVM switches as soon as possible without disrupting production. Connect each IS to an open port on a KVM switch that is in turn only connected to a keyboard, video monitor, and mouse, not to another KVM switch. Obtain CM approval for the plan and execute the plan at the earliest opportunity.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM02.007.00
- Vuln IDs
-
- V-6701
- Rule IDs
-
- SV-6882r2_rule
Checks: C-2678r3_chk
The reviewer will verify tamper resistant/evident seals are attached to the KVM switches and to the IS cable attachment points. If tamper resistant/evident seals are not placed on the KVM switch and the IS cable attachment points, this is a finding. For cables, these seals will be placed across the junction between the switch and the cable. For the KVM switch, the seals will be placed across the KVM case joints such that opening the case will break the seal.
Fix: F-6296r2_fix
Obtain tamper resistant/evident seals and apply them to the KVM switch case joints such that if the case is opened the seal will be broken. Also place them across the junction between the IS cables and the KVM switch so that if a cable is moved or removed the seal will be broken. Tamper resistant/evident seals are available from Protective Technologies: ptproducts@radium.ncsc.mil.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM02.008.00
- Vuln IDs
-
- V-6702
- Rule IDs
-
- SV-6883r2_rule
Checks: C-2680r2_chk
The reviewer will, with the assistance of the ISSO or SA, verify the KVM switch is not configured to switch peripherals other than Keyboard, Video, and Mouse. Note: This includes but is not limited to a smart card reader. Note: The most likely interface that would be used with this feature would be USB but it may be any legacy I/O interfaces.
Fix: F-6272r3_fix
Disable the feature for automatically toggling between ISs. If the KVM switch can be configured to disable the ability to switch peripherals other than the keyboard, video monitor, and mouse, modify the configuration to disable this feature. If the KVM switch cannot be configured to disable this feature replace the KVM switch with a KVM switch that is compliant.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM02.009.00
- Vuln IDs
-
- V-6703
- Rule IDs
-
- SV-6884r2_rule
Checks: C-2683r2_chk
The reviewer will view the KVM switch, used in an environment where it is attached to ISs of different classification levels, to verify no peripherals other than the keyboard, video monitor, and mouse are attached. If any other peripherals are attached, this is a finding.
Fix: F-6298r2_fix
Remove the unauthorized peripheral and block the port it is attached to with tamper resistant/evident seals. Tamper resistant/evident seals are available from Protective Technologies: ptproducts@radium.ncsc.mil.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM02.010.00
- Vuln IDs
-
- V-6704
- Rule IDs
-
- SV-6889r2_rule
Checks: C-2688r2_chk
The reviewer will view the KVM switch, which is attached to ISs of different classification levels, to verify all connections for peripherals other than a keyboard, video monitor or mouse are blocked with tamper resistant/evident seals. If additional connections are not blocked with tamper resistant/evident seals, this is a finding.
Fix: F-6299r2_fix
Obtain tamper resistant/evident seals and apply them to any open connections on the KVM. Tamper resistant/evident seals are available from Protective Technologies: ptproducts@radium.ncsc.mil.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM03.001.00
- Vuln IDs
-
- V-6705
- Rule IDs
-
- SV-6900r2_rule
Checks: C-2709r2_chk
The reviewer will interview the ISSO or SA to verify that a network attached KVM switch used to administer ISs is connected to an out of band network. If a network attached KVM used to administer ISs is not connected to an out-of-band network, this is a finding.
Fix: F-6310r2_fix
Develop a plan that will attach all network attached KVM switches used to administer ISs to an out-of-band network. Obtain CM approval and implement the plan.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM03.002.00
- Vuln IDs
-
- V-6706
- Rule IDs
-
- SV-6901r2_rule
Checks: C-2712r2_chk
The reviewer will interview the ISSO to verify that a network attached KVM switch is attached to a network of the same classification level as the ISs attached. If the network KVM is attached to a network that is not at the same classification level as the attached ISs, then this is a finding.
Fix: F-6313r2_fix
Remove the KVM switch from the network when the network KVM switch is attached to a network at a different classification level than the attached ISs. Attach the KVM switch to a network of the appropriate classification level.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM03.003.00
- Vuln IDs
-
- V-6707
- Rule IDs
-
- SV-6902r2_rule
Checks: C-2713r2_chk
The reviewer will interview the ISSO to verify a network review has been performed on the network the KVM switch is attached and all findings discovered during the network review dealing with the KVM switch have been closed. If a network review has not been performed on the network attached KVM switch, this is a finding.
Fix: F-6314r2_fix
Perform a self-assessment on the network the KVM switch is attached or request DISA to schedule and perform a Network review. Following the review close all findings.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM03.004.00
- Vuln IDs
-
- V-6708
- Rule IDs
-
- SV-6904r2_rule
Checks: C-2718r2_chk
The reviewer will, with the assistance of the ISSO, try to access the network attached KVM switch without valid authentication. If the KVM switch is accessed without valid authentication, this is a finding.
Fix: F-6315r1_fix
Reconfigure the network attached KVM switch to require the users to login to the KVM switch prior to being allowed access to the ISs attached to the KVM switch.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM03.005.00
- Vuln IDs
-
- V-6709
- Rule IDs
-
- SV-6906r2_rule
Checks: C-2721r2_chk
The reviewer will, with the assistance of the ISSO, try to change a password to a non-compliant password. If a non-compliant password can be set, this is a finding. The use of PKI authentication would make this check not a finding.
Fix: F-6316r2_fix
Reconfigure the network attached KVM switch to require DoD compliant passwords. If this is not possible, replace the KVM switch with a KVM switch that can be configured to enforce DoD compliant passwords.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM03.006.00
- Vuln IDs
-
- V-6710
- Rule IDs
-
- SV-6907r2_rule
Checks: C-2722r3_chk
The reviewer will interview the ISSO and verify that group or shared user ids are not being used. If group or shared user ids are being used, this is a finding.
Fix: F-6317r2_fix
Remove the shared or group user ids and issue individual user ids to each user that requires access to the network attached KVM switch.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM03.007.00
- Vuln IDs
-
- V-6711
- Rule IDs
-
- SV-6908r2_rule
Checks: C-2723r2_chk
The reviewer will, with the assistance of the ISSO, try to access a system not allowed to the user signed onto the network attached KVM switch. If the user is able to access any systems, other than required systems, this is a finding.
Fix: F-6318r1_fix
Reconfigure the network attached KVM switch to restrict users to systems they need to access.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM03.008.00
- Vuln IDs
-
- V-6712
- Rule IDs
-
- SV-6909r2_rule
Checks: C-2724r3_chk
The reviewer will, with the assistance of the ISSO or the SA, access the network attached KVM switch to verify a compliant warning banner is displayed. If a DoD compliant warning banner is not displayed, this is a finding.
Fix: F-6319r2_fix
Reconfigure the network KVM switch to display a warning banner in accordance with CJSCM 6510.01.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM03.009.00
- Vuln IDs
-
- V-6713
- Rule IDs
-
- SV-6910r2_rule
Checks: C-2725r2_chk
The reviewer will, with the assistance of the ISSO or SA, verify the network attached KVM switch is configured for encryption using FIPS 140-2 validated cryptography. If the network KVM switch is not configured to use FIPS 140-2 validated cryptography, this is a finding.
Fix: F-6320r2_fix
Reconfigure the network KVM switch to use FIPS 140-2 validated cryptography for all communications across the network.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM03.010.00
- Vuln IDs
-
- V-6714
- Rule IDs
-
- SV-6911r2_rule
Checks: C-2727r2_chk
The reviewer will, with the assistance of the ISSO or SA, verify the KVM switch is not configured to encapsulate and send USB connections other than KVM connections. If the KVM switch is configured to encapsulate and send USB connections other than Keyboard, Video, and Mouse connections, this is a finding.
Fix: F-6321r1_fix
Reconfigure the network KVM switch so that it will not encapsulate USB connections other than the keyboard, video monitor, or mouse, over IP.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM03.011.00
- Vuln IDs
-
- V-6715
- Rule IDs
-
- SV-6915r2_rule
Checks: C-2731r2_chk
If the KVM switch can encrypt USB and send it over the network, the reviewer will view the KVM switch and verify that unused USB ports are blocked with tamper resistant/evident seals. If unused USB ports are not blocked with tamper resistant/evident seals, this is a finding.
Fix: F-6322r2_fix
Block unused USB ports on a network attached KVM switch that can encapsulate USB over IP with tamper resistant seals. Tamper resistant/evident seals are available from Protective Technologies: ptproducts@radium.ncsc.mil.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM03.012.00
- Vuln IDs
-
- V-6716
- Rule IDs
-
- SV-6916r2_rule
Checks: C-2733r2_chk
With the assistance of the ISSO, verify the network attached KVM switch is not configured to control the power of the ISs attached and all connectors on the KVM switch that support this functionality are blocked with tamper resistant/evident seals. If the KVM switch is configured to control the power of connected ISs, this is a finding.
Fix: F-6323r2_fix
Remove the KVM switch’s control over the power supplied to the ISs and block any connectors on the KVM switch used to support this feature with tamper resistant/evident seals. Tamper resistant/evident seals are available from Protective Technologies: ptproducts@radium.ncsc.mil.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM03.013.00
- Vuln IDs
-
- V-6717
- Rule IDs
-
- SV-6917r2_rule
Checks: C-2737r2_chk
The reviewer will interview the ISSO to verify that a network attached KVM switch is not attached to ISs of different classification levels. If a network attached KVM is attached to ISs of different classification levels, this is a finding.
Fix: F-6324r2_fix
Remove all ISs from the network attached KVM switch that have a classification level that is different from the classification level of the network the KVM switch is attached to. Use a new network attached KVM switch for each IS classification level that you removed from the original KVM switch. Attach the KVM switch to a network that has the same classification level as the ISs that have been attach to the KVM switch.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM04.001.00
- Vuln IDs
-
- V-6718
- Rule IDs
-
- SV-6921r2_rule
Checks: C-2758r2_chk
The reviewer will interview the ISSO and view the user agreements. A singed addendum to the SAAR is acceptable. If signed A/B switch user agreements are not on file, this is a finding.
Fix: F-6336r2_fix
Create a standard user agreement for the use of A/B switches and have all authorized A/B switches users sign a user agreement.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM04.002.00
- Vuln IDs
-
- V-6719
- Rule IDs
-
- SV-6922r2_rule
Checks: C-2760r2_chk
The reviewer will interview the ISSO and view the SFUG or equivalent documentation to verify the following points are discussed. 1. A/B switches should be used only if there is no other solution. 2. A/B switches should be used only to connect multiple peripheral devices to a single IS. 3. A/B switches should never be used to connect a single peripheral to multiple ISs. 4. If an A/B switch is used to connect or share peripheral devices between two or more ISs, the ISs should be intended for the use of a single user within the users work area, and be visible from all ISs that it is attached. If documentation does not exist with the SFUG, describing the correct usage of an A/B switch and the user’s responsibilities, this is a finding.
Fix: F-6337r2_fix
Create a section in the site's SFUG that contains general security policies and guidance plus the site's security policies and guidance for use of an A/B switch.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM04.003.00
- Vuln IDs
-
- V-6720
- Rule IDs
-
- SV-6923r2_rule
Checks: C-2762r2_chk
The reviewer will view the A/B switch to verify it is physically protected in accordance with the requirements of the highest classification of any IS connected to the A/B switch. If it is in the same location as the ISs connected then it is adequately protected. If the switch is not physically protected in accordance with the classification level of the highest attached IS, this is a finding.
Fix: F-6338r2_fix
Move the A/B switch to a location where it is protected in the same manner as required by the IS of the highest classification level the A/B switch is attached.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM04.004.00
- Vuln IDs
-
- V-6757
- Rule IDs
-
- SV-6979r2_rule
Checks: C-2899r2_chk
The reviewer will interview the ISSO or SA to verify that A/B switches are not being used to share peripherals between two users. If an A/B switch is being used to share peripherals between users, this is a finding.
Fix: F-6405r1_fix
Develop a plan to remove all A/B switches that are being used to switch peripherals between two or more users and to acquire new peripherals to support documented needs. Obtain CM approval of the plan and execute the plan.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM04.005.00
- Vuln IDs
-
- V-6758
- Rule IDs
-
- SV-6980r2_rule
Checks: C-2904r2_chk
The reviewer will view the A/B switch to verify it is marked in accordance with this STIG. It is marked government owned equipment. The switch positions are marked as to the systems or peripherals connected. The cables and connectors are marked with the systems or peripherals that are connected and their classification level. If the A/B switch is not properly marked and labeled, this is a finding.
Fix: F-6411r2_fix
Mark and label the A/B switch in accordance with this STIG.
- RMF Control
- Severity
- M
- CCI
- Version
- KVM04.006.00
- Vuln IDs
-
- V-6759
- Rule IDs
-
- SV-6981r3_rule
Checks: C-2906r4_chk
The reviewer will verify the A/B switch attached to ISs of different classification levels exist on the NIAP CCEVS Products Lists. https://www.niap-ccevs.org/CCEVS_Products/ If the A/B switch is not on the NIAP CCEVS Products Lists, this is a finding.
Fix: F-6412r3_fix
Replace the A/B switch with one from the NIAP CCEVS Products Lists. https://www.niap-ccevs.org/CCEVS_Products/
- RMF Control
- Severity
- M
- CCI
- Version
- KVM04.007.00
- Vuln IDs
-
- V-6760
- Rule IDs
-
- SV-6982r2_rule
Checks: C-2907r2_chk
The reviewer will, for an A/B switch attached to devices or ISs which are at different classification levels, view the A/B switch to verify tamper resistant/evident seals are attached to the A/B switch and all IS cables at their attachment points. If tamper resistant/evident seals are not attached to the A/B switch and all IS cables at their attachment points, this is a finding.
Fix: F-6413r2_fix
For an A/B switch attached to devices or ISs which are at different classification levels, attach tamper resistant/evident seals. Tamper resistant/evident seals are available from Protective Technologies: ptproducts@radium.ncsc.mil.
- RMF Control
- Severity
- L
- CCI
- Version
- KVM04.008.00
- Vuln IDs
-
- V-6761
- Rule IDs
-
- SV-6983r2_rule
Checks: C-2908r2_chk
The reviewer will, for A/B switches which are connected to devices or ISs that are at different classification levels, view the A/B switches to verify the A/B switches are not cascaded. If the A/B switches are cascaded, this is a finding.
Fix: F-6414r1_fix
Remove the cascaded A/B switches that are connected to ISs of different classification levels.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM04.009.00
- Vuln IDs
-
- V-6762
- Rule IDs
-
- SV-6984r2_rule
Checks: C-2909r2_chk
The reviewer will view the A/B switch to verify the A/B switch is not used to switch a peripheral device that has persistent memory or devices that support removable media between two or more ISs of different classification levels. This would include but not be limited to ZIP drives, hard disk drives, and writable CD drives. If A/B switches are used to switch a peripheral device that has persistent memory or devices that support removable media between two or more ISs of different classification levels, this is a finding.
Fix: F-6415r1_fix
Remove the A/B switch used to switch a peripheral device that has persistent memory or devices that support removable media between two or more ISs of different classification levels.
- RMF Control
- Severity
- H
- CCI
- Version
- KVM04.010.00
- Vuln IDs
-
- V-6763
- Rule IDs
-
- SV-6985r2_rule
Checks: C-2910r2_chk
The reviewer will view the A/B switch to verify input and output devices including, but not limited to, scanners, printers, or plotters are not attached to an A/B switch that spans classification levels. If input and output devices are attached to an A/B switch that spans classification levels, this is a finding.
Fix: F-6416r2_fix
Remove the A/B switch attached to ISs of different classification levels and an input or output peripheral.