UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The KVM switch must be configured to use encrypted communications with FIPS 140-2 validated cryptography.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6713 KVM03.009.00 SV-6910r2_rule ECNK-1 High
Description
Because all administrative traffic contains sensitive data such as unencrypted passwords, it will be encrypted to protect it from interception. The KVM switch will be configured to require encryption for all communications via the network. NIST FIPS 140-2 validated cryptography will be used. The ISSO or SA will ensure the KVM switch is configured to use encrypted communications using FIPS 140-2 validated cryptography.
STIG Date
Keyboard Video and Mouse Switch STIG 2015-06-30

Details

Check Text ( C-2725r2_chk )
The reviewer will, with the assistance of the ISSO or SA, verify the network attached KVM switch is configured for encryption using FIPS 140-2 validated cryptography. If the network KVM switch is not configured to use FIPS 140-2 validated cryptography, this is a finding.
Fix Text (F-6320r2_fix)
Reconfigure the network KVM switch to use FIPS 140-2 validated cryptography for all communications across the network.