Sharing Peripherals Across the Network (SPAN) STIG Version 2, Release 4. Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Sharing Peripherals Across the Network (SPAN) STIG, Version 2, Release 4.
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
ASUS VE278Q 27-Inch LED Monitor | cpe:/h:asus:27-inch_led_monitor:ve278q (View CVEs) |
HP Color Laserjet 4730 MFP | cpe:/h:hp:color_laserjet_4730_mfp (View CVEs) |
IOGEAR GCS72U 2-Port USB Cable KVM Switch with Audio | cpe:/h:iogear:gcs72u:- (View CVEs) |
Microsoft Comfort Curve Keyboard 2000 | cpe:/h:microsoft:comfort_curve_keyboard:2000 (View CVEs) |
Microsoft Comfort Mouse 4500 | cpe:/h:microsoft:comfort_mouse:4500 (View CVEs) |
TRENDnet TK-207K 2-Port USB KVM Switch | cpe:/h:trendnet:tk-207k:- (View CVEs) |
Checklist Highlights
- Checklist Name:
- Sharing Peripherals Across the Network (SPAN) STIG
- Checklist ID:
- 459
- Version:
- Version 2, Release 4.
- Type:
- Compliance
- Review Status:
- Archived
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 04/26/2013
Checklist Summary:
This Keyboard, Video, and Mouse (KVM) Overview is published as part of the Sharing Peripherals across the Network (SPAN) Security Technical Implementation Guide (STIG). The Keyboard, Video, and Mouse (KVM) Checklist provides the technical security policies, requirements, and implementation details for applying security concepts to KVM and A/B switch technology. Throughout this document, the term "switch" refers to both KVM and A/B switches, unless otherwise noted. The KVM checklist is meant to be used in conjunction with the Network Infrastructure and appropriate operating system (OS) STIGs.
Checklist Role:
- Multi-Functional Peripherals
Known Issues:
Not provided.
Target Audience:
This document is a requirement for all DoD administered systems and all systems connected to DoD networks. These requirements are designed to assist Security Managers (SMs), Information Assurance Managers (IAMs), Information Assurance Officers (IAOs), and System Administrators (SAs) with configuring and maintaining security controls.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
DoD Directive (DoDD) 8500.1
Comments/Warnings/Miscellaneous:
Comments or proposed revisions to this document should be sent via email to the following address: [email protected]. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.
Disclaimer:
Not provided.
Product Support:
Comments or proposed revisions to this document should be sent via email to the following address: [email protected]. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.
Point of Contact:
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Version 2, Release 4 - 26 April 2013
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|