Description
The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.\n
Supplemental Guidance
The feedback from the information system does not provide information that would allow an unauthorized user to compromise the authentication mechanism. Displaying asterisks when a user types in a password is an example of obscuring feedback of authentication information.\n
Enhancements
(0) None.\n
Compliance Mappings
ISO 17799 (legacy)
11.5.1
COBIT 4.1 (legacy)
None.