NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - Vertiv Secure KM (formerly known as Emerson Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185)

Certificate Date:  2016.03.24

Validation Report Number:  CCEVS-VR-VID10704-2016

Product Type:    Peripheral Switch

Conformance Claim:  Protection Profile Compliant

PP Identifier:    Protection Profile for Peripheral Sharing Switch Version 3.0

CC Testing Lab:  DXC.technology

Maintenance Release:
CC Certificate [PDF] Security Target [PDF] * Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


* This is the Security Target (ST) associated with the latest Maintenance Release.  To view previous STs for this TOE, click here.

Product Description

The Emerson Secure KM is Third-Generation Peripheral Sharing Switches (PSS) that enables seamless interaction with multiple isolated computers while using multiple displays. The Secure KM supports channel switching by simple movement of the mouse cursor across multiple displays. The Emerson Secure KM can be configured to support large number of displays at any desired size and orientation with simple and intuitive GUI. Emerson Secure KM products are using multiple isolated microcontrollers and optical data diodes to protect from data leakages between connected computers.  

This KM PSS enables user channel selection through conventional push-buttons and also through mouse cursor tracking function. Cursor tracking function follows the location of the cursor as it crosses the display boundaries. Some evaluated KM PSS also support DPP function as shown in the table below. This function enables secure connection of various USB devices based on pre-defined whitelist and blacklist.

Analog audio out switching is supported by the KM PSS. Stereo audio signals are passed through audio data diodes to enforce unidirectional flow of audio signals from the selected connected computer to the connected audio peripheral device.

Both DPP and audio may be switched to a computer other than the one selected for keyboard and mouse through the use of front panel DPP and audio freeze push-buttons.

TOE model

SCKM120

SCKM140

SCKM145

SCKM180

SCKM185

Computers supported

2

4

4

8

8

Computer interfaces (keyboard and mouse)

USB

USB

USB

USB

USB

Analog audio supported

Out with audio data diode

Out with audio data diode

Out with audio data diode

Out with audio data diode

Out with audio data diode

Dedicated Peripheral Port (DPP) for user authentication device

No

No

Yes

No

Yes

DPP freeze function

No

No

Yes

No

Yes

Cursor tracking function

Yes

Yes

Yes

Yes

Yes

Upload DPP filter parameters (CDF) and displays orientation from computer

Yes

Yes

Yes

Yes

Yes

Note that unlike KVM PSS, the KM does not support video interfaces. When using KM, each computer is connected directly to its display.


Evaluated Configuration


Security Evaluation Summary

The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The evaluation demonstrated that the product meets the security requirements contained in the Security Target. The criteria against which the Emerson Secure KM was evaluated are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 4. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1, Revision 4. Computer Sciences Corporation determined that the product is conformant to requirements for Peripheral Switch Protection Profile version 3.0.  The product satisfies all of the security functional requirements stated in the Security Target. Two validators, on behalf of the CCEVS Validation Body, monitored the evaluation carried out by Computer Sciences Corporation. The evaluation was completed in February 26, 2016. Results of the evaluation can be found in the Assurance Activity Report for Emerson Secure KM prepared by CSC Global Cybersecurity.


Environmental Strengths

Keyboard and mouse security

Isolated keyboard and mouse USB device emulators per connected computer to prevent direct interface between the TOE shared peripheral devices and connected computers.

TOE uses host (computer) emulators to interface with connected keyboard and mouse peripheral devices, thus isolating external peripherals from TOE internal circuitry and from connected computers.

Keyboard user data is not stored on TOE non-volatile memory.  All USB stacks are implemented in the TOE using SRAM (Static Random Access Memory) – a volatile memory that clears data once TOE is powered down.

 

TOE external interface security

The TOE supports only the following external interfaces protocols:

           USB keyboard and mouse;

           Analog audio output;

           User authentication device or other assigned USB devices (TOE model specific);

           Power input (AC for 4 port or more or DC for 2 port).

 

Audio Subsystem security

The TOE audio data flow path is electrically isolated from all other functions and interfaces to prevent signaling data leakages to and from the audio paths.

 

User authentication device subsystem security

TOE supports User Authentication Device function (called DPP). These products are configured by default as FDF (Fixed Device Filtration) with filter set to qualify only the following devices:

           Standard smart-card reader USB token or biometric authentication device having USB smart-card class interface complying with USB Organization standard CCID Revision 1.1 or ICCID Revision 1.0.

Note that device must be bus powered

 

User control and monitoring security

TOE is controlled and monitored by the user through front panel illuminated push-buttons and switches. TOE also enables user control through mouse cursor tracking function. These controls and indications are coupled to the TOE system controller function.

 

Tampering protection

Always-on anti-tampering system mechanically coupled to the TOE enclosure to detect and attempt to access the TOE internal circuitry.

TOE is equipped with special holographic Tampering Evident Labels that located in critical location on the TOE enclosure.

 

Self-testing and Log

TOE is equipped with self testing function that operating at TOE power up prior to normal use. The self-test function is running independently at each one of the TOE microcontrollers following power up.

TOE is equipped with event log non-volatile memory that stores information about abnormal security related events.


Vendor Information

Logo
Vertiv (Emerson)
Rich Richardson
256-217-1361
256-430-4030
rich.richardson@vertivco.com

www.vertivco.com
Site Map              Contact Us              Home