UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The KVM switch must be configured to require the user to login to the KVM switch to access the ISs attached.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6708 KVM03.004.00 SV-6904r2_rule IAIA-1 IAIA-2 High
Description
Without identification and authentication of the user accessing the network attached KVM switch anyone can access the ISs attached and if they have knowledge of a valid user id and password for the IS, disrupt the system causing a denial of service or access sensitive data compromising that data. The ISSO will ensure the KVM switch is configured to require the user to login to the KVM switch to access the ISs attached. PKI authentication is acceptable and preferred to password authentication.
STIG Date
Keyboard Video and Mouse Switch STIG 2015-06-30

Details

Check Text ( C-2718r2_chk )
The reviewer will, with the assistance of the ISSO, try to access the network attached KVM switch without valid authentication. If the KVM switch is accessed without valid authentication, this is a finding.
Fix Text (F-6315r1_fix)
Reconfigure the network attached KVM switch to require the users to login to the KVM switch prior to being allowed access to the ISs attached to the KVM switch.