An evaluated peripheral switch is used when sharing peripherals between official systems, or classified systems at the same classification, that belong to different security domains.
Topic
Using peripheral switches
Applicable to
all
History
Priority
must
Dec 2021
Removed
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
Apr 2019
An evaluated peripheral switch is used when sharing peripherals between official systems, or classified systems at the same classification, that belong to different security domains.
Security control 0593 was modified to cover the use of evaluated peripheral switches between official systems that belong to different security domains.
Mar 2019
An evaluated peripheral switch is used when sharing peripherals between systems belonging to different security domains at the same classification.
2017
A Common Criteria-evaluated KVM must be used when sharing peripherals between acombination of systems of different security domains at the same classification (e.g. differentcaveats).
Control Text Changed. No public explaination.
2015
Agencies must use a High Assurance product from ASD’s EPL when accessing a classifiedsystem and an unclassified system via a peripheral switch.
2010
Agencies accessing a classified system and a less classified system or an unclassified or public system viaa peripheral switch must use a high assurance product from DSD’s EPL.