UCF STIG Viewer Logo

The KVM switch is not configured to require the user to login to the KVM switch to access the ISs attached.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6708 KVM03.004.00 SV-6904r1_rule IAIA-1 IAIA-2 High
Description
Without identification and authentication of the user accessing the network attached KVM switch anyone can access the ISs attached and if they have knowledge of a valid userid and password for the IS disrupt the system causing a denial of service or access sensitive data compromising that data. The IAO will ensure that the KVM switch is configured to require the user to login to the KVM switch to access the ISs attached. PKI authentication is acceptable and preferred to password authentication.
STIG Date
Keyboard Video and Mouse Switch STIG 2014-08-04

Details

Check Text ( C-2718r1_chk )
The rewivewe will, with the assistance of the IAO, try to access the network attached KVM switch without valid authentication
Fix Text (F-6315r1_fix)
Reconfigure the network attached KVM switch to require the users to login to the KVM switch prior to being allowed access to the ISs attached to the KVM switch.