STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SC-8 (2) — Transmission Confidentiality and Integrity

CCI-002422

Definition

Maintain the confidentiality and/or integrity of information during reception.

Parent Control

SC-8 (2)Transmission Confidentiality and IntegritySystem and Communications Protection

Linked STIG Checks (135)

V-279040CAT IIColdFusion must configure WebSocket Service.Adobe ColdFusion Security Technical Implementation GuideV-279098CAT IIThe ColdFusion administrator must be using HTTPS to maintain the confidentiality and integrity of information during reception.Adobe ColdFusion Security Technical Implementation GuideV-274038CAT IAmazon Linux 2023 must have SSH installed.Amazon Linux 2023 Security Technical Implementation GuideV-274039CAT IAmazon Linux 2023 must implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.Amazon Linux 2023 Security Technical Implementation GuideV-268159CAT INixOS must protect the confidentiality and integrity of transmitted information.Anduril NixOS Security Technical Implementation GuideV-214230CAT IIThe Apache web server must use cryptography to protect the integrity of remote sessions.Apache Server 2.4 UNIX Server Security Technical Implementation GuideV-214308CAT IIThe Apache web server must use encryption strength in accordance with the categorization of data hosted by the Apache web server when remote connections are provided.Apache Server 2.4 Windows Server Security Technical Implementation GuideV-222599CAT IIThe application must maintain the confidentiality and integrity of information during reception.Application Security and Development Security Technical Implementation GuideV-204820CAT IIThe application server must maintain the confidentiality and integrity of information during reception.Application Server Security Requirements GuideV-237338CAT IThe ArcGIS Server SSL settings must use NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.ArcGIS for Server 10.3 Security Technical Implementation GuideV-272629CAT ICylanceON-PREM must be configured to use TLS 1.2 or higher.Arctic Wolf CylanceON-PREM Security Technical Implementation GuideV-272417CAT IA BIND 9.x server implementation must maintain the integrity and confidentiality of DNS information while it is being prepared for transmission, in transmission, and in use and must perform integrity verification and data origin verification for all DNS information.BIND 9.x Security Technical Implementation GuideV-224386CAT IIThe BlackBerry UEM server must connect to [assignment: [SQL Server]] with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.BlackBerry UEM Security Technical Implementation GuideV-251645CAT IIThe system storage used for data collection by the CA IDMS server must be protected.CA IDMS Security Technical Implementation GuideV-251647CAT IIThe storage used for data collection by CA IDMS web services must be protected.CA IDMS Security Technical Implementation GuideV-251648CAT IIThe storage used for data collection by CA IDMS Server and CA IDMS Web Services must be protected from online display and update.CA IDMS Security Technical Implementation GuideV-219313CAT IThe Ubuntu operating system must use SSH to protect the confidentiality and integrity of transmitted information unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).Canonical Ubuntu 18.04 LTS Security Technical Implementation GuideV-238215CAT IThe Ubuntu operating system must use SSH to protect the confidentiality and integrity of transmitted information.Canonical Ubuntu 20.04 LTS Security Technical Implementation GuideV-260523CAT IUbuntu 22.04 LTS must have SSH installed.Canonical Ubuntu 22.04 LTS Security Technical Implementation GuideV-260524CAT IUbuntu 22.04 LTS must use SSH to protect the confidentiality and integrity of transmitted information.Canonical Ubuntu 22.04 LTS Security Technical Implementation GuideV-270665CAT IUbuntu 24.04 LTS must have SSH installed.Canonical Ubuntu 24.04 LTS Security Technical Implementation GuideV-270666CAT IUbuntu 24.04 LTS must use SSH to protect the confidentiality and integrity of transmitted information.Canonical Ubuntu 24.04 LTS Security Technical Implementation GuideV-234565CAT ICitrix Delivery Controller must implement DoD-approved encryption.Citrix Virtual Apps and Desktop 7.x Delivery Controller Security Technical Implementation GuideV-234228CAT IICitrix License Server must maintain the confidentiality and integrity of information during reception.Citrix Virtual Apps and Desktop 7.x License Server Security Technical Implementation GuideV-234257CAT ICitrix Linux Virtual Delivery Agent must implement DoD-approved encryption.Citrix Virtual Apps and Desktop 7.x Linux Virtual Delivery Agent Security Technical Implementation GuideV-234252CAT IICitrix StoreFront server must accept Personal Identity Verification (PIV) credentials.Citrix Virtual Apps and Desktop 7.x StoreFront Security Technical Implementation GuideV-234253CAT ICitrix Windows Virtual Delivery Agent must implement DoD-approved encryption.Citrix Virtual Apps and Desktop 7.x Windows Virtual Delivery Agent Security Technical Implementation GuideV-213206CAT IIXenDesktop License Server must maintain the confidentiality and integrity of information during reception.Citrix XenDesktop 7.x License Server Security Technical Implementation GuideV-213208CAT ICitrix Receiver must implement DoD-approved encryption.Citrix XenDesktop 7.x Receiver Security Technical Implementation GuideV-213211CAT IIXenDesktop StoreFront must accept Personal Identity Verification (PIV) credentials.Citrix XenDesktop 7.x StoreFront Security Technical Implementation GuideV-213213CAT ICitrix Windows Virtual Delivery Agent must implement DoD-approved encryption.Citrix XenDesktop 7.x Windows VDA Security Technical Implementation GuideV-269437CAT IIAll AlmaLinux OS 9 networked systems must implement SSH to protect the confidentiality and integrity of transmitted and received information, including information being prepared for transmission.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-269438CAT IIAll AlmaLinux OS 9 networked systems must have the OpenSSH server installed.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-283456CAT IAlmaLinux OS 9 must implement DOD-approved encryption in the bind package.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-233227CAT IIThe container platform must maintain the confidentiality and integrity of information during reception.Container Platform Security Requirements GuideV-233538CAT IIPostgreSQL must maintain the confidentiality and integrity of information during reception.Crunchy Data PostgreSQL Security Technical Implementation GuideV-261933CAT IIPostgreSQL must maintain the confidentiality and integrity of information during reception.Crunchy Data Postgres 16 Security Technical Implementation GuideV-206608CAT IIThe DBMS must maintain the confidentiality and integrity of information during reception.Database Security Requirements GuideV-235776CAT IITCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-205219CAT IIThe DNS server implementation must maintain the integrity of information during reception.Domain Name System (DNS) Security Requirements GuideV-224209CAT IIThe EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during reception.EDB Postgres Advanced Server v11 on Windows Security Technical Implementation GuideV-213634CAT IIThe EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during reception.EDB Postgres Advanced Server v9.6 Security Technical Implementation GuideV-259293CAT IIThe EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during reception.EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation GuideV-278405CAT IINGINX must be configured to use FIPS-approved algorithms to protect the confidentiality and integrity of transmitted information.F5 NGINX Security Technical Implementation GuideV-203751CAT IIThe operating system must maintain the confidentiality and integrity of information during reception.General Purpose Operating System Security Requirements GuideV-255239CAT IISSMC must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.HPE 3PAR SSMC Operating System Security Technical Implementation GuideV-255251CAT IThe SSMC web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.HPE 3PAR SSMC Web Server Security Technical Implementation GuideV-255253CAT ISSMC web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.HPE 3PAR SSMC Web Server Security Technical Implementation GuideV-237818CAT IDoD-approved encryption must be implemented to protect the confidentiality and integrity of remote access sessions, information during preparation for transmission, information during reception, and information during transmission in addition to enforcing replay-resistant authentication mechanisms for network access to privileged accounts.HPE 3PAR StoreServ 3.2.x Security Technical Implementation GuideV-255272CAT IThe HPE 3PAR OS must be configured to restrict the encryption algorithms and protocols to comply with DOD-approved encryption to protect the confidentiality and integrity of remote access sessions.HPE 3PAR StoreServ 3.3.x Security Technical Implementation GuideV-215284CAT IIAIX must protect the confidentiality and integrity of transmitted information during preparation for transmission and maintain the confidentiality and integrity of information during reception and disable all non-encryption network access methods.IBM AIX 7.x Security Technical Implementation GuideV-213732CAT IIDB2 must maintain the confidentiality and integrity of information during reception.IBM DB2 V10.5 LUW Security Technical Implementation GuideV-255776CAT IIThe MQ Appliance messaging server must implement cryptography mechanisms to protect the integrity of the remote access session.IBM MQ Appliance V9.0 AS Security Technical Implementation GuideV-250339CAT IThe WebSphere Liberty Server must use FIPS 140-2 approved encryption modules when authenticating users and processes.IBM WebSphere Liberty Server Security Technical Implementation GuideV-283668CAT IThe WebSphere Liberty Server must use FIPS 140-3-approved encryption modules when authenticating users and processes.IBM WebSphere Liberty Server Security Technical Implementation GuideV-255875CAT IIThe WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.IBM WebSphere Traditional V9.x Security Technical Implementation GuideV-283677CAT IIThe WebSphere Application Server must use FIPS 140-3-approved encryption modules when authenticating users and processes.IBM WebSphere Traditional V9.x Security Technical Implementation GuideV-223610CAT IIIBM z/OS SSL encryption options for the TN3270 Telnet Server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.IBM z/OS ACF2 Security Technical Implementation GuideV-223831CAT IIIBM z/OS SSL encryption options for the TN3270 Telnet Server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.IBM z/OS RACF Security Technical Implementation GuideV-224067CAT IIIBM z/OS SSL encryption options for the TN3270 Telnet server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.IBM z/OS TSS Security Technical Implementation GuideV-224772CAT IIThe ISEC7 SPHERE must protect the confidentiality and integrity of transmitted information during preparation for transmission and during reception using cryptographic mechanisms.ISEC7 Sphere Security Technical Implementation GuideV-214198CAT IIThe DNS server implementation must maintain the integrity of information during reception.Infoblox 7.x DNS Security Technical Implementation GuideV-233926CAT IIThe Infoblox DNS service member implementation must maintain the integrity of information during reception.Infoblox 8.x DNS Security Technical Implementation GuideV-241818CAT IThe Jamf Pro EMM server must connect to [Authentication Gateway Service (AGS)] with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.Jamf Pro v10.x EMM Security Technical Implementation GuideV-213878CAT IIThe confidentiality and integrity of information managed by SQL Server must be maintained during reception.MS SQL Server 2014 Instance Security Technical Implementation GuideV-253742CAT IIMariaDB must maintain the confidentiality and integrity of information during reception.MariaDB Enterprise 10.x Security Technical Implementation GuideV-255349CAT IIAzure SQL Database must maintain the confidentiality and integrity of information during reception.Microsoft Azure SQL Database Security Technical Implementation GuideV-224844CAT IIProtection methods such as TLS, encrypted VPNs, or IPsec must be implemented if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.Microsoft Windows Server 2016 Security Technical Implementation GuideV-205829CAT IIWindows Server 2019 must implement protection methods such as TLS, encrypted VPNs, or IPsec if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.Microsoft Windows Server 2019 Security Technical Implementation GuideV-254263CAT IIWindows Server 2022 must implement protection methods such as TLS, encrypted VPNs, or IPsec if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.Microsoft Windows Server 2022 Security Technical Implementation GuideV-278010CAT IIWindows Server 2025 must implement protection methods such as TLS, encrypted VPNs, or IPsec if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.Microsoft Windows Server 2025 Security Technical Implementation GuideV-259399CAT IIThe Windows DNS Server must maintain the integrity of information during reception.Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation GuideV-260908CAT IFIPS mode must be enabled.Mirantis Kubernetes Engine Security Technical Implementation GuideV-221198CAT IIMongoDB must maintain the confidentiality and integrity of information during reception.MongoDB Enterprise Advanced 3.x Security Technical Implementation GuideV-252180CAT IIMongoDB must maintain the confidentiality and integrity of information during reception.MongoDB Enterprise Advanced 4.x Security Technical Implementation GuideV-265949CAT IIMongoDB must maintain the confidentiality and integrity of information during reception.MongoDB Enterprise Advanced 7.x Security Technical Implementation GuideV-279389CAT IIMongoDB must maintain the confidentiality and integrity of information during preparation for transmission.MongoDB Enterprise Advanced 8.x Security Technical Implementation GuideV-254231CAT IINutanix AOS must maintain the confidentiality and integrity of information during reception.Nutanix AOS 5.20.x OS Security Technical Implementation GuideV-279628CAT IINutanix OS must install and use SSH for remote access.Nutanix Acropolis GPOS Security Technical Implementation GuideV-221539CAT IIOHS must have the LoadModule ossl_module directive enabled to maintain the confidentiality and integrity of information during reception.Oracle HTTP Server 12.1.3 Security Technical Implementation GuideV-221540CAT IIOHS must have the SSLFIPS directive enabled to maintain the confidentiality and integrity of information during reception.Oracle HTTP Server 12.1.3 Security Technical Implementation GuideV-221541CAT IIOHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to maintain the confidentiality and integrity of information during reception.Oracle HTTP Server 12.1.3 Security Technical Implementation GuideV-221542CAT IIOHS must have the SSLCipherSuite directive enabled to maintain the confidentiality and integrity of information during reception.Oracle HTTP Server 12.1.3 Security Technical Implementation GuideV-221543CAT IIIf using the WebLogic Web Server Proxy Plugin and configuring end-to-end SSL, OHS must have the SSLSecureProxy directive enabled to maintain the confidentiality and integrity of information during reception.Oracle HTTP Server 12.1.3 Security Technical Implementation GuideV-221544CAT IIIf using the WebLogic Web Server Proxy Plugin and configuring end-to-end SSL, OHS must have the WLSSLWallet directive enabled to maintain the confidentiality and integrity of information during reception.Oracle HTTP Server 12.1.3 Security Technical Implementation GuideV-221545CAT IIIf using the WebLogic Web Server Proxy Plugin and configuring SSL termination at OHS, OHS must have the WLProxySSL directive enabled to maintain the confidentiality and integrity of information during reception.Oracle HTTP Server 12.1.3 Security Technical Implementation GuideV-221847CAT IIThe Oracle Linux operating system must be configured so that all networked systems have SSH installed.Oracle Linux 7 Security Technical Implementation GuideV-248866CAT IIAll OL 8 networked systems must have SSH installed.Oracle Linux 8 Security Technical Implementation GuideV-248867CAT IIAll OL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.Oracle Linux 8 Security Technical Implementation GuideV-283451CAT IOL 8 must implement DOD-approved encryption in the bind package.Oracle Linux 8 Security Technical Implementation GuideV-271482CAT IIOL 9 networked systems must have SSH installed.Oracle Linux 9 Security Technical Implementation GuideV-271483CAT IIOL 9 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.Oracle Linux 9 Security Technical Implementation GuideV-271759CAT IOL 9 must implement DOD-approved encryption in the bind package.Oracle Linux 9 Security Technical Implementation GuideV-214073CAT IIPostgreSQL must maintain the confidentiality and integrity of information during reception.PostgreSQL 9.x Security Technical Implementation GuideV-254553CAT IRancher RKE2 must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.Rancher Government Solutions RKE2 Security Technical Implementation GuideV-281001CAT IIRHEL 10 must have a Secure Shell (SSH) server installed for all networked systems.Red Hat Enterprise Linux 10 Security Technical Implementation GuideV-281002CAT IIRHEL 10 must, for all networked systems, have and implement Secure Shell (SSH) to protect the confidentiality and integrity of transmitted and received information.Red Hat Enterprise Linux 10 Security Technical Implementation GuideV-281015CAT IRHEL 10 must implement DOD-approved encryption in the bind package.Red Hat Enterprise Linux 10 Security Technical Implementation GuideV-204585CAT IIThe Red Hat Enterprise Linux operating system must be configured so that all networked systems have SSH installed.Red Hat Enterprise Linux 7 Security Technical Implementation GuideV-204586CAT IIThe Red Hat Enterprise Linux operating system must be configured so that all networked systems use SSH for confidentiality and integrity of transmitted and received information as well as information during preparation for transmission.Red Hat Enterprise Linux 7 Security Technical Implementation GuideV-257978CAT IIAll RHEL 9 networked systems must have SSH installed.Red Hat Enterprise Linux 9 Security Technical Implementation GuideV-257979CAT IIAll RHEL 9 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.Red Hat Enterprise Linux 9 Security Technical Implementation GuideV-258242CAT IRHEL 9 must implement DOD-approved encryption in the bind package.Red Hat Enterprise Linux 9 Security Technical Implementation GuideV-251249CAT IIRedis Enterprise DBMS must maintain the confidentiality and integrity of information during reception.Redis Enterprise 6.x Security Technical Implementation GuideV-275617CAT IIUbuntu OS must restrict SSH access to allow only NetIM internal communication.Riverbed NetIM OS Security Technical Implementation GuideV-254087CAT IInnoslate must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.SPEC Innovations Innoslate 4.x Security Technical Implementation GuideV-261328CAT ISLEM 5 must use SSH to protect the confidentiality and integrity of transmitted information.SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation GuideV-217264CAT IAll networked SUSE operating systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.SUSE Linux Enterprise Server 12 Security Technical Implementation GuideV-281376CAT ITCMax must protect the confidentiality and integrity of transmitted information.Soaring Software Solutions TCMax 9.x Security Technical Implementation GuideV-241046CAT IIAny Tanium configured EMAIL RESULTS connectors must be configured to enable TLS/SSL to encrypt communications.Tanium 7.0 Security Technical Implementation GuideV-234107CAT IIAny Tanium configured EMAIL RESULTS connectors must be configured to enable TLS/SSL to encrypt communications.Tanium 7.3 Security Technical Implementation GuideV-252934CAT IIAll TOSS networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation GuideV-282606CAT IIAll TOSS 5 networked systems must have SSH installed.Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation GuideV-282607CAT IIAll TOSS 5 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation GuideV-282608CAT IITOSS 5 must implement DOD or other applicable U.S. Government agency-approved encryption in the bind package.Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation GuideV-240090CAT IIHAProxy must maintain the confidentiality and integrity of information during reception.VMW vRealize Automation 7.x HA Proxy Security Technical Implementation GuideV-240273CAT IILighttpd must be configured to use SSL.VMware vRealize Automation 7.x Lighttpd Security Technical Implementation GuideV-240879CAT IItc Server HORIZON must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.VMware vRealize Automation 7.x tc Server Security Technical Implementation GuideV-240880CAT IItc Server VCAC must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.VMware vRealize Automation 7.x tc Server Security Technical Implementation GuideV-240957CAT IIThe vAMI sfcb must have HTTP disabled.VMware vRealize Automation 7.x vAMI Security Technical Implementation GuideV-241740CAT IItc Server UI must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation GuideV-241741CAT IItc Server CaSa must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation GuideV-241742CAT IItc Server API must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation GuideV-256668CAT IIVAMI must implement Transport Layer Security (TLS) 1.2 exclusively.VMware vSphere 7.0 VAMI Security Technical Implementation GuideV-256503CAT IIThe Photon operating system must use an OpenSSH server version that does not support protocol 1.VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation GuideV-256601CAT IVMware Postgres must be configured to use Transport Layer Security (TLS).VMware vSphere 7.0 vCenter Appliance PostgreSQL Security Technical Implementation GuideV-256740CAT IIEnvoy must use only Transport Layer Security (TLS) 1.2 for the protection of client connections.VMware vSphere 7.0 vCenter Appliance RhttpProxy Security Technical Implementation GuideV-256318CAT IThe vCenter Server must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.VMware vSphere 7.0 vCenter Security Technical Implementation GuideV-258749CAT IThe ESXi host must maintain the confidentiality and integrity of information during transmission by exclusively enabling Transport Layer Security (TLS) 1.2.VMware vSphere 8.0 ESXi Security Technical Implementation GuideV-258806CAT IThe Photon operating system must have the OpenSSL FIPS provider installed to protect the confidentiality of remote access sessions.VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation GuideV-259178CAT IIThe vCenter PostgreSQL service must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.VMware vSphere 8.0 vCenter Appliance PostgreSQL Security Technical Implementation GuideV-265978CAT IIThe vCenter Server must use DOD-approved encryption to protect the confidentiality of network sessions.VMware vSphere 8.0 vCenter Security Technical Implementation GuideV-207501CAT IIThe VMM must maintain the confidentiality and integrity of information during reception.Virtual Machine Manager Security Requirements GuideV-206442CAT IIThe web server must maintain the confidentiality and integrity of information during reception.Web Server Security Requirements GuideV-269573CAT IXylok Security Suite must prevent access except through HTTPS.Xylok Security Suite 20.x Security Technical Implementation Guide