Skip to main content

Transmit data using secure protocols

Summary

The transmission of sensitive information and the execution of sensitive functions must be performed through secure protocols.

Description

A system can send information through a non-encrypted channel using insecure protocols. The use of these protocols makes it easier to perform a man-in-the-middle attack (MitM) to intercept and modify the information. Examples of such insecure protocols are HTTP, FTP, POP3 and Telnet.

Supported In

This requirement is verified in following services:

PlanSupported
Machine🟢
Squad🟢
One-Shot🟢

References

Vulnerabilities