Secure KVM switches
Posted on April 22, 2018 by KVMGalore | 0 comments
Secure KVM switches: Security threats against classified data
Using typical non secure KVM switches to access computers which belong to a mix of classified and non-classified networks poses the risk that the shared peripherals (via the KVM switch) might facilitate data-leaking between the computers.
Such data-leakage can make it easier for cyber-attackers to obtain classified information in their pursuit after their ultimate target - your secured network assets.
Electronic emissions may also pose a threat to secure environments as these stray signals provide a conduit by which sensitive information could easily leak into the wrong hands. Video cables, for example, can emit strong emissions that can be collected and duplicated to view the same image elsewhere.
Another threat includes power sources that can be used to conduct data back into a mains electricity supply and this in turn can be picked out using sensitive devices outside of the system's physical location.
The solution
Physical network segregation is considered one of the safest ways for obtaining the highest level of security. By creating secluded network islands it is possible to achieve real security and effectively segregate classified and non-classified computer environments.
Unintended consequences
Yet with the security benefits of network segregation come a usability issue. Users are forced to distribute their work between multiple computers that belong to multiple security-level networks. Working with multiple computers obstructs the convenience of the common single-computer work scenario. For that reason various peripheral sharing switch devices such as keyboard-mouse (KM) and keyboard-video-mouse (KVM) switches which allow the user to share a single mouse, keyboard, video and audio peripherals between multiple computers are commonly used in such environments.
The risk
The most vulnerable part of any network is the user access point. And when you use a KVM switch to access computers which belong to a mix of classified and non-classified networks, there is a risk that the shared peripherals (via the KVM switch) might facilitate data-leaking between the computers. The use of a centralized access-point (the KVM switch) to access such mix-environment computers also makes the KVM switch susceptible to physical hacking intended to gain access to classified data.
This makes traditional (non-secure) KM/KVM switches vulnerable. While offering centralized control of multiple computers, traditional non-secure KVM switches offer no absolute isolation between them. This exposes systems to the possibility of malicious damage, disruption, and acquisition of sensitive data from one computer to another, posing a significant security risk.
This is why federal, military, and intelligence agencies around the world have strict requirements regarding the security of KVM switches to safeguard data from accidental transfer or unauthorized access.
Resolution
The most effective way to mitigate any data leakage is to ensure that all data coming into and out of the KM/KVM switch is completely isolated. Add physical housing-intrusion detection an tamper-proof sealing to prevent physical hacking, and you have a secure KVM switch.