Using peripheral switches
When accessing different systems through a peripheral switch, it is important that sufficient assurance is held in the operation of the switch to ensure that information does not pass between different security domains. As such, the level of assurance needed in a peripheral switch is determined by the difference in sensitivity or classification of systems connected to the switch.
There is no requirement for an evaluated peripheral switch when all connected systems belong to the same security domain.
Security Control: 0591; Revision: 6; Updated: Sep-18; Applicability: O, P
An evaluated peripheral switch is used when sharing peripherals between official and classified systems.
Security Control: 1480; Revision: 0; Updated: Sep-18; Applicability: O, P, S, TS
A high assurance peripheral switch is used when sharing peripherals between official or classified systems and highly classified systems.
Security Control: 1457; Revision: 2; Updated: Sep-18; Applicability: S, TS
An evaluated, preferably high assurance, peripheral switch is used when sharing peripherals between systems of different classifications.
Security Control: 0593; Revision: 9; Updated: Apr-19; Applicability: O, P, S, TS
An evaluated peripheral switch is used when sharing peripherals between official systems, or classified systems at the same classification, that belong to different security domains.
Peripheral switches for particularly important systems
As AUSTEO and AGAO systems are particularly important, additional assurances should be put in place when such systems share a peripheral switch with other systems.
Security Control: 0594; Revision: 4; Updated: Sep-18; Applicability: S, TS
An evaluated peripheral switch is used when accessing a system containing AUSTEO or AGAO information and a system of the same classification that is not authorised to process the same caveat.
Further information on selecting evaluated products can be found in the evaluated product acquisition section of the Guidelines for Evaluated Products.