
Belkin®SecureDVIKVMSwitch,SecureKMSwitchand
SecureWindowingKVMEAL4augmentedALC_FLR.3SecurityTargetRev.1.01
Page|3
4.3Rationale ........................................................................................................................ 30
4.3.1TOESecurityObjectivesRationale.......................................................................... 31
4.3.2SecurityObjectivesRationalefortheOperationalEnvironment ........................... 37
4.4RationaleforOrganizationalPolicyCoverage................................................................ 38
5ExtendedComponentsDefinition......................................................................................... 39
5.1ClassEXT:ExtendedVisualindications .......................................................................... 39
5.1.1VisualIndicationRule(EXT_VIR)............................................................................. 39
5.2ClassEXT:Extended‐InvalidUSBConnection(EXT_IUC).............................................. 40
5.2.1InvalidUSBConnection(EXT_IUC).......................................................................... 40
5.3ClassEXT:Extended–ROM(EXT_ROM) ........................................................................ 41
5.4RationaleforExplicitlyStatedSecurityRequirements .................................................. 42
6SecurityRequirements.......................................................................................................... 43
6.1SecurityFunctionalRequirementsfortheTOE.............................................................. 43
6.1.1ClassFDP:UserDataProtection ............................................................................. 44
6.1.2ClassFMT:SecurityManagement .......................................................................... 47
6.1.3ClassFPT:ProtectionoftheTSF.............................................................................. 48
6.2ExplicitlyStatedRequirementsfortheTOE ................................................................... 49
6.3RationaleForTOESecurityRequirements ..................................................................... 50
6.3.1TOESecurityFunctionalRequirementsTracing&Rationale.................................. 50
6.4RationaleForITSecurityRequirementDependencies .................................................. 56
6.5DependenciesNotMet .................................................................................................. 57
6.6SecurityAssuranceRequirements ................................................................................. 58
6.7RationaleforSecurityAssurance ................................................................................... 59
7TOESummarySpecification.................................................................................................. 60
7.1UserDataProtection–DataSeparation(TSF_DSP)....................................................... 60
7.2SecurityManagement(TSF_MGT) ................................................................................. 61
7.3ProtectionoftheTSF(TSF_TMP) ................................................................................... 62
7.4USBConnection(TSF_IUC) ............................................................................................. 62
7.5Read‐OnlyMemory(TSF_ROM) ..................................................................................... 63
7.6AudioOutputSwitchingFunctionClarification.............................................................. 63