It is becoming more and more common for IS departments to require that weak cryptography on their servers is disabled. The following is a list of crypto that is currently configured weak:
- SSL protocol version v2, v3 and PCT v1
- Symmetric ciphers with keys shorter than 128bit
- Weak ciphers - like RC2, RC4
- Weak hash functions - like MD5
Typically a Windows Server would be "hardened" following a procedure similar to that in this document - https://rootsecdev.medium.com/configuring-secure-cipher-suites-in-windows-server-2019-iis-7d1ff1ffe5...
It is more than likely that this requirement will affect Vault servers
In light of this, Vault should be tested with, and certified to work with a typical, and documented hardened server