STIGQter STIGQter: STIG Summary: Traditional Security Checklist Version: 1 Release: 3 Benchmark Date: 15 Jun 2020:

Information Assurance - KVM Switch Use of Hot-Keys on SIPRNet Connected Devices

DISA Rule

SV-41260r3_rule

Vulnerability Number

V-31125

Group Title

Information Assurance - KVM Switch (Hot-Keys)

Rule Version

IA-10.02.03

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Users of KVM devices must physically switch between devices connected to the SIPRNet and any devices connected to an Unclassified network such as NIPRNet, rather than using a Hot-Key feature.

Check Contents

1. Check to ensure users are physically switching between devices on SIPRNet and any devices connected to an unclassified network like NIPRNet, rather than using a Hot-Key feature.

2. Be suspicious of any KVM that is not easily reachable (within arms distance) by the keyboard operator.

TACTICAL ENVIRONMENT: The check is applicable where KVM devices are in use.

Vulnerability Number

V-31125

Documentable

False

Rule Version

IA-10.02.03

Severity Override Guidance

1. Check to ensure users are physically switching between devices on SIPRNet and any devices connected to an unclassified network like NIPRNet, rather than using a Hot-Key feature.

2. Be suspicious of any KVM that is not easily reachable (within arms distance) by the keyboard operator.

TACTICAL ENVIRONMENT: The check is applicable where KVM devices are in use.

Check Content Reference

M

Target Key

2506

Comments