Security Target
6.2.2
Output); FDP_UDF_EXT.1/KM - Unidirectional Data Flow (Keyboard/Mouse); FDP_UDF_EXT.1/VI -
6.2.3
6.2.4
FDP_FIL_EXT.1/KM - Device Filtering (Keyboard/Mouse); FDP_PDC_EXT.3/KM - Authorized
6.2.5
Connection (Audio Output); FDP_PDC_EXT.2/KM - Authorized Devices (Keyboard/Mouse);
6.2.6
6.2.7
6.2.8
- Tied Switching .................................................................................................................................. 36
6.2.9
6.3
6.4
Security Management .................................................................................................................. 38
6.4.1
6.4.2
6.4.3
6.5
Protection of the TSF .................................................................................................................... 39
6.5.1
6.5.2
6.5.3
6.5.4
6.5.5
6.6
TOE Access .................................................................................................................................... 42
6.6.1
7
Protection Profile Claims .................................................................................................................... 44
8
Rationale ............................................................................................................................................. 46
8.1
List of Figures and Tables
Figure 1: Simplified Block Diagram of a 2-Port KVM TOE ........................................................................... 10
Figure 2: Representative ATEN Secure KVM Switch TOE Model in its environment .................................. 12
Table 1: ATEN Secure KVM Switch TOE Models ........................................................................................... 1
Table 2: Terms and Definitions ..................................................................................................................... 3
iii
Version 1.1
2022-03-08