Menaces et certifications pour une infrastructure critique
What are the threats?
EDID attacks
Modern display interfaces, such as HDMI, DVI, or DisplayPort, currently represent an underestimated attack surface, particularly through data manipulation EDID (Extended Display Identification Data).
Research conducted by security teams has shown that malformed or deliberately altered EDIDs can exploit vulnerabilities in graphics drivers, cause abnormal behaviors, or trigger memory overflows.
Moreover, the auxiliary channels integrated into these interfaces — such as I²C (DDC/CI) or CEC — can be abused to interact directly with a system or remotely manipulate certain display parameters.
This reality now positions screens and their connections as potential intrusion vectors, justifying increased attention in any physical or hardware security strategy.
HID attacks
The HID attacks exploit the implicit trust that systems place in standard input devices such as keyboards and mice.
By masquerading as a legitimate HID device, a malicious USB device can automatically execute a sequence of keystrokes or commands as soon as it is connected, thereby bypassing security policies applicable to traditional storage devices.
These attacks, made famous by devices such as theUSB Rubber Ducky, allowing for the rapid injection of malicious payloads, opening remote sessions, or compromising a system without user interaction, thanks to keyboard emulation recognized by default by operating systems.
Their effectiveness relies on execution speed, the ability to bypass traditional protections, and the difficulty for both the user and security solutions to distinguish a tampered HID device from an authentic device.
This is thus a particularly dangerous intrusion vector, capable of bypassing antivirus, USB filtering, or other control mechanisms, as highlighted by studies describing their operation and operational impact.

How to secure an operator workstation?
How to secure an operator workstation?
What are the standards and how to secure a control room of a critical infrastructure?
The zoning consists of segmenting a system into distinct security zones, each grouping assets that share a level of criticality and homogeneous protection requirements. This structural principle aims to limit the spread of a compromise, by requiring that all inter-zone communications pass through controlled conduits, filtered and monitored.
What is the IEC 62443 standard?
The standard IEC 62443 directly formalizes this model: segmentation into zones and conduits is a central element of the secure architecture of industrial systems, explicitly described in its systemic requirements. This approach is part of the philosophy of defense in depth encouraged by the standard, which recommends securing each subset independently rather than relying on a single perimeter barrier.
What is the IEC 15408 standard?
Zoning also resonates in the standards IEC 15408 / Common Criteria, used in particular to certify equipment handling multiple security domains: the NIAP protection profiles (based on IEC 15408) indeed impose a strict isolation between networks or classification levels, in order to prevent any data leakage or cross-contamination, particularly in switches and device sharing equipment.
What is the NIAP PP4.0 certification?
The NIAP Protection Profile 4.0 (PSD v4.0) defines the security requirements for device sharing devices (including secure KVMs), to ensure that no data can flow between computers via these devices, imposing strict isolation, unidirectional flows, and protections against sabotage or information leakage.
What is the EAL4+ certification?
EAL4+ is a level of assurance of the Common Criteria that guarantees that a product has undergone thorough testing, analysis, and verification, offering one of the highest levels of trust achievable for commercial solutions.
What is the Tempest standard?
The TEMPEST standard encompasses tests aimed at preventing any information leakage via the electromagnetic emissions of equipment, in order to avoid electronic eavesdropping.
What is TAA / BAA compliance (USA)?
TAA/BAA compliance requires that equipment sold to U.S. federal agencies be manufactured in approved countries or in the United States, ensuring controlled and qualified origin of the products.