U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Sharing Peripherals Across the Network (SPAN) STIG Version 2, Release 4. Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
ASUS VE278Q 27-Inch LED Monitor cpe:/h:asus:27-inch_led_monitor:ve278q (View CVEs)
HP Color Laserjet 4730 MFP cpe:/h:hp:color_laserjet_4730_mfp (View CVEs)
IOGEAR GCS72U 2-Port USB Cable KVM Switch with Audio cpe:/h:iogear:gcs72u:- (View CVEs)
Microsoft Comfort Curve Keyboard 2000 cpe:/h:microsoft:comfort_curve_keyboard:2000 (View CVEs)
Microsoft Comfort Mouse 4500 cpe:/h:microsoft:comfort_mouse:4500 (View CVEs)
TRENDnet TK-207K 2-Port USB KVM Switch cpe:/h:trendnet:tk-207k:- (View CVEs)

Checklist Highlights

Checklist Name:
Sharing Peripherals Across the Network (SPAN) STIG
Checklist ID:
459
Version:
Version 2, Release 4.
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
04/26/2013

Checklist Summary:

This Keyboard, Video, and Mouse (KVM) Overview is published as part of the Sharing Peripherals across the Network (SPAN) Security Technical Implementation Guide (STIG). The Keyboard, Video, and Mouse (KVM) Checklist provides the technical security policies, requirements, and implementation details for applying security concepts to KVM and A/B switch technology. Throughout this document, the term "switch" refers to both KVM and A/B switches, unless otherwise noted. The KVM checklist is meant to be used in conjunction with the Network Infrastructure and appropriate operating system (OS) STIGs.

Checklist Role:

  • Multi-Functional Peripherals

Known Issues:

Not provided.

Target Audience:

This document is a requirement for all DoD administered systems and all systems connected to DoD networks. These requirements are designed to assist Security Managers (SMs), Information Assurance Managers (IAMs), Information Assurance Officers (IAOs), and System Administrators (SAs) with configuring and maintaining security controls.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DoD Directive (DoDD) 8500.1

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via email to the following address: [email protected]. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Disclaimer:

Not provided.

Product Support:

Comments or proposed revisions to this document should be sent via email to the following address: [email protected]. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Point of Contact:

[email protected]

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

Version 2, Release 4 - 26 April 2013

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 05/01/2019