
Belkin®Secure DVI KVM Switch Security Target
© 2011 Belkin®International, Inc. and InfoGard Laboratories, Inc. 2
Table of Contents
INTRODUCTION AND DESCRIPTION ............................................................................................................................4
1.1IDENTIFICATION...............................................................................................................................................4
1.2OVERVIEW AND LOGICAL SCOPE .....................................................................................................................5
1.3DOCUMENT CONVENTIONS ..............................................................................................................................5
1.4DOCUMENT TERMINOLOGY..............................................................................................................................6
1.4.1ST Specific Terminology........................................................................................................................6
1.4.2Acronyms ...............................................................................................................................................8
1.5PROTECTION PROFILE OVERVIEW....................................................................................................................9
1.6COMMON CRITERIA PRODUCT TYPE.................................................................................................................9
1.7PHYSICAL BOUNDARIES...................................................................................................................................9
1.7.1Evaluated Environment..........................................................................................................................9
1.7.2Guidance Documents...........................................................................................................................12
1.8ITEMS EXCLUDED FROM THE TOE.................................................................................................................12
2CONFORMANCE CLAIMS ..........................................................................................................................14
3SECURITY PROBLEM DEFINITION.........................................................................................................15
3.1SECURE USAGE ASSUMPTIONS.......................................................................................................................15
3.2THREATS........................................................................................................................................................15
3.3ORGANIZATIONAL SECURITY POLICIES..........................................................................................................16
4SECURITY OBJECTIVES.............................................................................................................................17
4.1SECURITY OBJECTIVES FOR THE TOE ...........................................................................................................17
4.2SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT.....................................................................18
4.3MAPPING OF SECURITY ENVIRONMENT TO SECURITY OBJECTIVES................................................................18
4.4SECURITY OBJECTIVES RATIONALE ...............................................................................................................19
4.5SECURITY OBJECTIVES RATIONALE FOR THE OPERATIONAL ENVIRONMENT .................................................23
4.6RATIONALE FOR ORGANIZATIONAL POLICY COVERAGE................................................................................23
5EXTENDED COMPONENTS DEFINITION...............................................................................................24
5.1TOE EXTENDED FUNCTIONAL REQUIREMENTS .............................................................................................24
5.2EXTENDED REQUIREMENTS (EXT) ................................................................................................................24
5.2.1EXT_VIR.1 Visual Indication Rule ......................................................................................................24
5.2.2EXT_IUC.1 Invalid USB Connection ..................................................................................................24
5.2.3EXT_ROM.1 Read-Only ROMs...........................................................................................................25
5.3RATIONALE FOR EXPLICITLY STATED SECURITY REQUIREMENTS .................................................................25
6SECURITY REQUIREMENTS.....................................................................................................................26
6.1TOE SECURITY FUNCTIONAL REQUIREMENTS...............................................................................................26
6.1.1User Data Protection (FDP) ...............................................................................................................26
6.1.2Security Management (FMT)...............................................................................................................27
6.1.3Protection of the TSF (FPT)................................................................................................................28
6.2RATIONALE FOR TOE SECURITY REQUIREMENTS .........................................................................................28
6.2.1TOE Security Functional Requirements Tracing & Rationale ............................................................28
6.3RATIONALE FOR IT SECURITY REQUIREMENT DEPENDENCIES ......................................................................30
6.4DEPENDENCIES NOT MET ..............................................................................................................................31
6.5SECURITY ASSURANCE MEASURES................................................................................................................31
6.6RATIONALE FOR SECURITY ASSURANCE........................................................................................................32
7TOE SUMMARY SPECIFICATION ............................................................................................................33