Use of to non-encrypted protocols such as
ftp can cause data leaks.
Always use encrypted protocols to transfer data in and out of the instance.
Time to fix
This rule is linked to Common Weakness Enumeration CWE-311 Missing Encryption of Sensitive Data.