During a requirements gathering workshop, the customer provides the following requirement:
A new vSphere platform must be designed securely and all interfaces must be protected against potential snooping.
How should this non-functional security requirement be documented?