From Keyboard, Video, Mouse Switch Security STIG
Part of A/B Switch Sharing Peripheral Between Users
Associated with IA controls: DCBP-1
When using a KVM switch to switch a peripheral between two or more users the risk always exists where the peripheral is connected to the wrong IS. An example would be a scanner where the user presses a button on the scanner which causes the IS the scanner is currently to initiate a scan. If the A/B is pointed to a different IS than the user intended the document would be scanned into the wrong system. This could lead to the compromise of sensitive data.
The reviewer will interview the IAO or SA to verify that A/B switches are not being used to share peripherals between two users.
Develop a plan to remove all A/B switches that are being used to switch peripherals between two or more users and to acquire new peripherals to support documented needs. Obtain CM approval of the plan and execute the plan.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer