<section title="18.6. Peripheral (KVM) Switches"><subsection title="Objective"><paragraph
    title="18.6.1."


><![CDATA[<p>An evaluated peripheral switch is used when sharing keyboards, monitors and mice or other user interface devices, between different systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="18.6.2."


><![CDATA[<p>This section covers information relating specifically to the use of keyboard/video/mouse (KVM) switches.</p>]]></paragraph>
<paragraph
    title="18.6.3."


><![CDATA[<p>It is important to recognise that any cross-connection of system must be carefully controlled in order not to compromise trust zones. &nbsp;The principles of separation and segregation must be applied. &nbsp;These principles are discussed in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17217">Section 22.1 – Cloud Computing</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a>.</p>]]></paragraph>
<paragraph
    title="18.6.4."


><![CDATA[<p>Cross-connection of system may also functionally create a gateway, whether or not it meets the technical definition of gateways. &nbsp;It is important to refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16568">Section 19.1 – Gateways</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16643">Section 19.2 – Cross Domain Solutions</a>.</p>]]></paragraph>
</block>
<block title="Peripheral switches with more than two connections"><paragraph
    title="18.6.5."


><![CDATA[<p>If the peripheral switch has more than two systems connected then the level of assurance needed is determined by the highest and lowest of the classifications involved.</p>]]></paragraph>
</block>
<block title="Electrical Safety"><paragraph
    title="18.6.6."


><![CDATA[<p>Electrical safety is paramount.  Cross-connecting systems may create ground loops if different power sources are used for different elements of the computer system.  This may result in catastrophic failure if power supplies connected to different phases are cross-connected.</p>]]></paragraph>
</block>
<block title="Product Assurance"><paragraph
    title="18.6.7."


><![CDATA[<p>Product assurance is discussed in <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12- Product Security</a> &nbsp;It is important to note the role of the Common Criteria, the related CCRA and the use of assurance levels in determining product assurance. chapter 12 also provides essential reference to assurance levels, evaluation levels and defines high assurance as shown in the table 18.6.8 Assurance requirements.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Assurance requirements"><paragraph
    title="18.6.8.R.01."

    tags="Network Security,Technical,Assurance"


><![CDATA[<p>When accessing multiple systems through a peripheral switch it is important that sufficient assurance is available in the operation of the switch to ensure that information does not accidently pass between the connected systems.</p>]]></paragraph>
<paragraph
    title="18.6.8.R.02."

    tags="Network Security,Technical,Assurance"


><![CDATA[<p>It is important to maintain the integrity of Trust Zones and adhere to the principles of separation and segregation in order to avoid inadvertently compromising Trust Zones – even if they are at the same level of classification.</p>]]></paragraph>
<paragraph
    title="18.6.8.C.01."

    tags="Network Security,Technical,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="4051"
><![CDATA[<p>Agencies accessing a classified system and a less classified system via a peripheral switch MUST use an evaluated product with a level of assurance as indicated in the table below.</p><table class="table-main">
<tbody>
<tr>
<td><strong>High System</strong></td>
<td><strong>Low system / Alternate Trust Domain</strong></td>
<td><strong>Required Level of Assurance</strong></td>
</tr>
<tr>
<td><span>RESTRICTED</span></td>
<td>UNCLASSIFIED</td>
<td>EAL2 or PP</td>
</tr>
<tr>
<td rowspan="3">CONFIDENTIAL</td>
<td><span>UNCLASSIFIED</span></td>
<td>high assurance</td>
</tr>
<tr>
<td>RESTRICTED</td>
<td>high assurance</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>high assurance</td>
</tr>
<tr>
<td rowspan="4"><span>SECRET</span></td>
<td><span>UNCLASSIFIED</span></td>
<td>high assurance</td>
</tr>
<tr>
<td><span>RESTRICTED</span></td>
<td>high assurance</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>high assurance</td>
</tr>
<tr>
<td>SECRET</td>
<td>high assurance</td>
</tr>
<tr>
<td style="background-color: #ffffff;" rowspan="5"><br><span>TOP&nbsp;</span><span>SECRET</span></td>
<td><span>UNCLASSIFIED</span></td>
<td>high assurance</td>
</tr>
<tr>
<td><span>RESTRICTED</span></td>
<td>high assurance</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>high assurance</td>
</tr>
<tr>
<td>SECRET</td>
<td>high assurance</td>
</tr>
<tr>
<td>TOP&nbsp;SECRET</td>
<td>high assurance</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Assurance requirements for NZEO systems"><paragraph
    title="18.6.9.R.01."

    tags="Network Security,Technical,Assurance"


><![CDATA[<p>NZEO systems are particularly sensitive.  Additional security measures need to be put in place when connecting them to other systems.</p>]]></paragraph>
<paragraph
    title="18.6.9.C.01."

    tags="Network Security,Technical,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="4058"
><![CDATA[<p>Agencies accessing a system containing NZEO information and a system of the same classification that is not accredited to process NZEO information, MUST use an evaluated product with an EAL2 (or higher) or a PP level of assurance.</p>]]></paragraph>
</block>
<block title="Cross-Connecting Systems with a device other than a KVM"><paragraph
    title="18.6.10.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Cross-connecting systems with any device other than a KVM approved gateway or an approved cross-domain solution may be high risk, may compromise the integrity of Trust Zones, and may create an electrical hazard.</p>]]></paragraph>
<paragraph
    title="18.6.10.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="4066"
><![CDATA[<p>Cross-connection of security domains and Trust Zones MUST be enabled through an approved KVM, Gateway or Cross-Domain solution only.</p><table class="table-main">
<tbody>
<tr>
<td>High system</td>
<td>Low system/ Alternate Trust Domain</td>
<td>Level of assurance</td>
</tr>
<tr>
<td>
<p><strong>RESTRICTED </strong><br><strong>&amp; all lower classifications</strong></p>
</td>
<td>
<p>UNCLASSIFIED</p>
</td>
<td>
<p>EAL2 or PP</p>
</td>
</tr>
<tr>
<td rowspan="3">
<p><strong>CONFIDENTIAL</strong></p>
</td>
<td>UNCLASSIFIED</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>RESTRICTED</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td rowspan="4"><strong>SECRET</strong></td>
<td>
<p>UNCLASSIFIED</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>RESTRICTED</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>CONFIDENTIAL</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>SECRET</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td style="background-color: white;" rowspan="5">
<p><strong>TOP SECRET</strong></p>
</td>
<td>
<p>UNCLASSIFIED</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>RESTRICTED</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>CONFIDENTIAL</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>SECRET</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>TOP SECRET</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
</subsection>
</section>
