STIGhub
STIGs
RMF Controls
Compare
← SC-8 (2) — Transmission Confidentiality and Integrity
CCI-002422
Definition
Maintain the confidentiality and/or integrity of information during reception.
Parent Control
SC-8 (2)
Transmission Confidentiality and Integrity
System and Communications Protection
Linked STIG Checks (135)
V-279040
CAT II
ColdFusion must configure WebSocket Service.
Adobe ColdFusion Security Technical Implementation Guide
V-279098
CAT II
The ColdFusion administrator must be using HTTPS to maintain the confidentiality and integrity of information during reception.
Adobe ColdFusion Security Technical Implementation Guide
V-274038
CAT I
Amazon Linux 2023 must have SSH installed.
Amazon Linux 2023 Security Technical Implementation Guide
V-274039
CAT I
Amazon Linux 2023 must implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
Amazon Linux 2023 Security Technical Implementation Guide
V-268159
CAT I
NixOS must protect the confidentiality and integrity of transmitted information.
Anduril NixOS Security Technical Implementation Guide
V-214230
CAT II
The Apache web server must use cryptography to protect the integrity of remote sessions.
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
V-214308
CAT II
The Apache web server must use encryption strength in accordance with the categorization of data hosted by the Apache web server when remote connections are provided.
Apache Server 2.4 Windows Server Security Technical Implementation Guide
V-222599
CAT II
The application must maintain the confidentiality and integrity of information during reception.
Application Security and Development Security Technical Implementation Guide
V-204820
CAT II
The application server must maintain the confidentiality and integrity of information during reception.
Application Server Security Requirements Guide
V-237338
CAT I
The ArcGIS Server SSL settings must use NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
ArcGIS for Server 10.3 Security Technical Implementation Guide
V-272629
CAT I
CylanceON-PREM must be configured to use TLS 1.2 or higher.
Arctic Wolf CylanceON-PREM Security Technical Implementation Guide
V-272417
CAT I
A BIND 9.x server implementation must maintain the integrity and confidentiality of DNS information while it is being prepared for transmission, in transmission, and in use and must perform integrity verification and data origin verification for all DNS information.
BIND 9.x Security Technical Implementation Guide
V-224386
CAT II
The BlackBerry UEM server must connect to [assignment: [SQL Server]] with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.
BlackBerry UEM Security Technical Implementation Guide
V-251645
CAT II
The system storage used for data collection by the CA IDMS server must be protected.
CA IDMS Security Technical Implementation Guide
V-251647
CAT II
The storage used for data collection by CA IDMS web services must be protected.
CA IDMS Security Technical Implementation Guide
V-251648
CAT II
The storage used for data collection by CA IDMS Server and CA IDMS Web Services must be protected from online display and update.
CA IDMS Security Technical Implementation Guide
V-219313
CAT I
The Ubuntu operating system must use SSH to protect the confidentiality and integrity of transmitted information unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-238215
CAT I
The Ubuntu operating system must use SSH to protect the confidentiality and integrity of transmitted information.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-260523
CAT I
Ubuntu 22.04 LTS must have SSH installed.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260524
CAT I
Ubuntu 22.04 LTS must use SSH to protect the confidentiality and integrity of transmitted information.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-270665
CAT I
Ubuntu 24.04 LTS must have SSH installed.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270666
CAT I
Ubuntu 24.04 LTS must use SSH to protect the confidentiality and integrity of transmitted information.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-234565
CAT I
Citrix Delivery Controller must implement DoD-approved encryption.
Citrix Virtual Apps and Desktop 7.x Delivery Controller Security Technical Implementation Guide
V-234228
CAT II
Citrix License Server must maintain the confidentiality and integrity of information during reception.
Citrix Virtual Apps and Desktop 7.x License Server Security Technical Implementation Guide
V-234257
CAT I
Citrix Linux Virtual Delivery Agent must implement DoD-approved encryption.
Citrix Virtual Apps and Desktop 7.x Linux Virtual Delivery Agent Security Technical Implementation Guide
V-234252
CAT II
Citrix StoreFront server must accept Personal Identity Verification (PIV) credentials.
Citrix Virtual Apps and Desktop 7.x StoreFront Security Technical Implementation Guide
V-234253
CAT I
Citrix Windows Virtual Delivery Agent must implement DoD-approved encryption.
Citrix Virtual Apps and Desktop 7.x Windows Virtual Delivery Agent Security Technical Implementation Guide
V-213206
CAT II
XenDesktop License Server must maintain the confidentiality and integrity of information during reception.
Citrix XenDesktop 7.x License Server Security Technical Implementation Guide
V-213208
CAT I
Citrix Receiver must implement DoD-approved encryption.
Citrix XenDesktop 7.x Receiver Security Technical Implementation Guide
V-213211
CAT II
XenDesktop StoreFront must accept Personal Identity Verification (PIV) credentials.
Citrix XenDesktop 7.x StoreFront Security Technical Implementation Guide
V-213213
CAT I
Citrix Windows Virtual Delivery Agent must implement DoD-approved encryption.
Citrix XenDesktop 7.x Windows VDA Security Technical Implementation Guide
V-269437
CAT II
All AlmaLinux OS 9 networked systems must implement SSH to protect the confidentiality and integrity of transmitted and received information, including information being prepared for transmission.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269438
CAT II
All AlmaLinux OS 9 networked systems must have the OpenSSH server installed.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-283456
CAT I
AlmaLinux OS 9 must implement DOD-approved encryption in the bind package.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-233227
CAT II
The container platform must maintain the confidentiality and integrity of information during reception.
Container Platform Security Requirements Guide
V-233538
CAT II
PostgreSQL must maintain the confidentiality and integrity of information during reception.
Crunchy Data PostgreSQL Security Technical Implementation Guide
V-261933
CAT II
PostgreSQL must maintain the confidentiality and integrity of information during reception.
Crunchy Data Postgres 16 Security Technical Implementation Guide
V-206608
CAT II
The DBMS must maintain the confidentiality and integrity of information during reception.
Database Security Requirements Guide
V-235776
CAT II
TCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
V-205219
CAT II
The DNS server implementation must maintain the integrity of information during reception.
Domain Name System (DNS) Security Requirements Guide
V-224209
CAT II
The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during reception.
EDB Postgres Advanced Server v11 on Windows Security Technical Implementation Guide
V-213634
CAT II
The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during reception.
EDB Postgres Advanced Server v9.6 Security Technical Implementation Guide
V-259293
CAT II
The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during reception.
EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation Guide
V-278405
CAT II
NGINX must be configured to use FIPS-approved algorithms to protect the confidentiality and integrity of transmitted information.
F5 NGINX Security Technical Implementation Guide
V-203751
CAT II
The operating system must maintain the confidentiality and integrity of information during reception.
General Purpose Operating System Security Requirements Guide
V-255239
CAT II
SSMC must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
HPE 3PAR SSMC Operating System Security Technical Implementation Guide
V-255251
CAT I
The SSMC web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
HPE 3PAR SSMC Web Server Security Technical Implementation Guide
V-255253
CAT I
SSMC web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.
HPE 3PAR SSMC Web Server Security Technical Implementation Guide
V-237818
CAT I
DoD-approved encryption must be implemented to protect the confidentiality and integrity of remote access sessions, information during preparation for transmission, information during reception, and information during transmission in addition to enforcing replay-resistant authentication mechanisms for network access to privileged accounts.
HPE 3PAR StoreServ 3.2.x Security Technical Implementation Guide
V-255272
CAT I
The HPE 3PAR OS must be configured to restrict the encryption algorithms and protocols to comply with DOD-approved encryption to protect the confidentiality and integrity of remote access sessions.
HPE 3PAR StoreServ 3.3.x Security Technical Implementation Guide
V-215284
CAT II
AIX must protect the confidentiality and integrity of transmitted information during preparation for transmission and maintain the confidentiality and integrity of information during reception and disable all non-encryption network access methods.
IBM AIX 7.x Security Technical Implementation Guide
V-213732
CAT II
DB2 must maintain the confidentiality and integrity of information during reception.
IBM DB2 V10.5 LUW Security Technical Implementation Guide
V-255776
CAT II
The MQ Appliance messaging server must implement cryptography mechanisms to protect the integrity of the remote access session.
IBM MQ Appliance V9.0 AS Security Technical Implementation Guide
V-250339
CAT I
The WebSphere Liberty Server must use FIPS 140-2 approved encryption modules when authenticating users and processes.
IBM WebSphere Liberty Server Security Technical Implementation Guide
V-283668
CAT I
The WebSphere Liberty Server must use FIPS 140-3-approved encryption modules when authenticating users and processes.
IBM WebSphere Liberty Server Security Technical Implementation Guide
V-255875
CAT II
The WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-283677
CAT II
The WebSphere Application Server must use FIPS 140-3-approved encryption modules when authenticating users and processes.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-223610
CAT II
IBM z/OS SSL encryption options for the TN3270 Telnet Server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223831
CAT II
IBM z/OS SSL encryption options for the TN3270 Telnet Server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.
IBM z/OS RACF Security Technical Implementation Guide
V-224067
CAT II
IBM z/OS SSL encryption options for the TN3270 Telnet server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.
IBM z/OS TSS Security Technical Implementation Guide
V-224772
CAT II
The ISEC7 SPHERE must protect the confidentiality and integrity of transmitted information during preparation for transmission and during reception using cryptographic mechanisms.
ISEC7 Sphere Security Technical Implementation Guide
V-214198
CAT II
The DNS server implementation must maintain the integrity of information during reception.
Infoblox 7.x DNS Security Technical Implementation Guide
V-233926
CAT II
The Infoblox DNS service member implementation must maintain the integrity of information during reception.
Infoblox 8.x DNS Security Technical Implementation Guide
V-241818
CAT I
The Jamf Pro EMM server must connect to [Authentication Gateway Service (AGS)] with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.
Jamf Pro v10.x EMM Security Technical Implementation Guide
V-213878
CAT II
The confidentiality and integrity of information managed by SQL Server must be maintained during reception.
MS SQL Server 2014 Instance Security Technical Implementation Guide
V-253742
CAT II
MariaDB must maintain the confidentiality and integrity of information during reception.
MariaDB Enterprise 10.x Security Technical Implementation Guide
V-255349
CAT II
Azure SQL Database must maintain the confidentiality and integrity of information during reception.
Microsoft Azure SQL Database Security Technical Implementation Guide
V-224844
CAT II
Protection methods such as TLS, encrypted VPNs, or IPsec must be implemented if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-205829
CAT II
Windows Server 2019 must implement protection methods such as TLS, encrypted VPNs, or IPsec if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-254263
CAT II
Windows Server 2022 must implement protection methods such as TLS, encrypted VPNs, or IPsec if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-278010
CAT II
Windows Server 2025 must implement protection methods such as TLS, encrypted VPNs, or IPsec if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-259399
CAT II
The Windows DNS Server must maintain the integrity of information during reception.
Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide
V-260908
CAT I
FIPS mode must be enabled.
Mirantis Kubernetes Engine Security Technical Implementation Guide
V-221198
CAT II
MongoDB must maintain the confidentiality and integrity of information during reception.
MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide
V-252180
CAT II
MongoDB must maintain the confidentiality and integrity of information during reception.
MongoDB Enterprise Advanced 4.x Security Technical Implementation Guide
V-265949
CAT II
MongoDB must maintain the confidentiality and integrity of information during reception.
MongoDB Enterprise Advanced 7.x Security Technical Implementation Guide
V-279389
CAT II
MongoDB must maintain the confidentiality and integrity of information during preparation for transmission.
MongoDB Enterprise Advanced 8.x Security Technical Implementation Guide
V-254231
CAT II
Nutanix AOS must maintain the confidentiality and integrity of information during reception.
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
V-279628
CAT II
Nutanix OS must install and use SSH for remote access.
Nutanix Acropolis GPOS Security Technical Implementation Guide
V-221539
CAT II
OHS must have the LoadModule ossl_module directive enabled to maintain the confidentiality and integrity of information during reception.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221540
CAT II
OHS must have the SSLFIPS directive enabled to maintain the confidentiality and integrity of information during reception.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221541
CAT II
OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to maintain the confidentiality and integrity of information during reception.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221542
CAT II
OHS must have the SSLCipherSuite directive enabled to maintain the confidentiality and integrity of information during reception.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221543
CAT II
If using the WebLogic Web Server Proxy Plugin and configuring end-to-end SSL, OHS must have the SSLSecureProxy directive enabled to maintain the confidentiality and integrity of information during reception.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221544
CAT II
If using the WebLogic Web Server Proxy Plugin and configuring end-to-end SSL, OHS must have the WLSSLWallet directive enabled to maintain the confidentiality and integrity of information during reception.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221545
CAT II
If using the WebLogic Web Server Proxy Plugin and configuring SSL termination at OHS, OHS must have the WLProxySSL directive enabled to maintain the confidentiality and integrity of information during reception.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221847
CAT II
The Oracle Linux operating system must be configured so that all networked systems have SSH installed.
Oracle Linux 7 Security Technical Implementation Guide
V-248866
CAT II
All OL 8 networked systems must have SSH installed.
Oracle Linux 8 Security Technical Implementation Guide
V-248867
CAT II
All OL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
Oracle Linux 8 Security Technical Implementation Guide
V-283451
CAT I
OL 8 must implement DOD-approved encryption in the bind package.
Oracle Linux 8 Security Technical Implementation Guide
V-271482
CAT II
OL 9 networked systems must have SSH installed.
Oracle Linux 9 Security Technical Implementation Guide
V-271483
CAT II
OL 9 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
Oracle Linux 9 Security Technical Implementation Guide
V-271759
CAT I
OL 9 must implement DOD-approved encryption in the bind package.
Oracle Linux 9 Security Technical Implementation Guide
V-214073
CAT II
PostgreSQL must maintain the confidentiality and integrity of information during reception.
PostgreSQL 9.x Security Technical Implementation Guide
V-254553
CAT I
Rancher RKE2 must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.
Rancher Government Solutions RKE2 Security Technical Implementation Guide
V-281001
CAT II
RHEL 10 must have a Secure Shell (SSH) server installed for all networked systems.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281002
CAT II
RHEL 10 must, for all networked systems, have and implement Secure Shell (SSH) to protect the confidentiality and integrity of transmitted and received information.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281015
CAT I
RHEL 10 must implement DOD-approved encryption in the bind package.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-204585
CAT II
The Red Hat Enterprise Linux operating system must be configured so that all networked systems have SSH installed.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204586
CAT II
The Red Hat Enterprise Linux operating system must be configured so that all networked systems use SSH for confidentiality and integrity of transmitted and received information as well as information during preparation for transmission.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-257978
CAT II
All RHEL 9 networked systems must have SSH installed.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-257979
CAT II
All RHEL 9 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-258242
CAT I
RHEL 9 must implement DOD-approved encryption in the bind package.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-251249
CAT II
Redis Enterprise DBMS must maintain the confidentiality and integrity of information during reception.
Redis Enterprise 6.x Security Technical Implementation Guide
V-275617
CAT II
Ubuntu OS must restrict SSH access to allow only NetIM internal communication.
Riverbed NetIM OS Security Technical Implementation Guide
V-254087
CAT I
Innoslate must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.
SPEC Innovations Innoslate 4.x Security Technical Implementation Guide
V-261328
CAT I
SLEM 5 must use SSH to protect the confidentiality and integrity of transmitted information.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-217264
CAT I
All networked SUSE operating systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
V-281376
CAT I
TCMax must protect the confidentiality and integrity of transmitted information.
Soaring Software Solutions TCMax 9.x Security Technical Implementation Guide
V-241046
CAT II
Any Tanium configured EMAIL RESULTS connectors must be configured to enable TLS/SSL to encrypt communications.
Tanium 7.0 Security Technical Implementation Guide
V-234107
CAT II
Any Tanium configured EMAIL RESULTS connectors must be configured to enable TLS/SSL to encrypt communications.
Tanium 7.3 Security Technical Implementation Guide
V-252934
CAT II
All TOSS networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
V-282606
CAT II
All TOSS 5 networked systems must have SSH installed.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-282607
CAT II
All TOSS 5 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-282608
CAT II
TOSS 5 must implement DOD or other applicable U.S. Government agency-approved encryption in the bind package.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-240090
CAT II
HAProxy must maintain the confidentiality and integrity of information during reception.
VMW vRealize Automation 7.x HA Proxy Security Technical Implementation Guide
V-240273
CAT II
Lighttpd must be configured to use SSL.
VMware vRealize Automation 7.x Lighttpd Security Technical Implementation Guide
V-240879
CAT II
tc Server HORIZON must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.
VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide
V-240880
CAT II
tc Server VCAC must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.
VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide
V-240957
CAT II
The vAMI sfcb must have HTTP disabled.
VMware vRealize Automation 7.x vAMI Security Technical Implementation Guide
V-241740
CAT II
tc Server UI must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide
V-241741
CAT II
tc Server CaSa must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide
V-241742
CAT II
tc Server API must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide
V-256668
CAT II
VAMI must implement Transport Layer Security (TLS) 1.2 exclusively.
VMware vSphere 7.0 VAMI Security Technical Implementation Guide
V-256503
CAT II
The Photon operating system must use an OpenSSH server version that does not support protocol 1.
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide
V-256601
CAT I
VMware Postgres must be configured to use Transport Layer Security (TLS).
VMware vSphere 7.0 vCenter Appliance PostgreSQL Security Technical Implementation Guide
V-256740
CAT II
Envoy must use only Transport Layer Security (TLS) 1.2 for the protection of client connections.
VMware vSphere 7.0 vCenter Appliance RhttpProxy Security Technical Implementation Guide
V-256318
CAT I
The vCenter Server must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.
VMware vSphere 7.0 vCenter Security Technical Implementation Guide
V-258749
CAT I
The ESXi host must maintain the confidentiality and integrity of information during transmission by exclusively enabling Transport Layer Security (TLS) 1.2.
VMware vSphere 8.0 ESXi Security Technical Implementation Guide
V-258806
CAT I
The Photon operating system must have the OpenSSL FIPS provider installed to protect the confidentiality of remote access sessions.
VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide
V-259178
CAT II
The vCenter PostgreSQL service must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
VMware vSphere 8.0 vCenter Appliance PostgreSQL Security Technical Implementation Guide
V-265978
CAT II
The vCenter Server must use DOD-approved encryption to protect the confidentiality of network sessions.
VMware vSphere 8.0 vCenter Security Technical Implementation Guide
V-207501
CAT II
The VMM must maintain the confidentiality and integrity of information during reception.
Virtual Machine Manager Security Requirements Guide
V-206442
CAT II
The web server must maintain the confidentiality and integrity of information during reception.
Web Server Security Requirements Guide
V-269573
CAT I
Xylok Security Suite must prevent access except through HTTPS.
Xylok Security Suite 20.x Security Technical Implementation Guide