Level N/A
Mechanisms exist to utilize a trusted communications path between the user and the security functions of the system.
Mechanisms exist to utilize a trusted communications path between the user and the security functions of the system.