IA-06 Authenticator Feedback

Identification and Authentication

Low Moderate High

Description

The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.\n

Supplemental Guidance

The feedback from the information system does not provide information that would allow an unauthorized user to compromise the authentication mechanism. Displaying asterisks when a user types in a password is an example of obscuring feedback of authentication information.\n

Enhancements

(0) None.\n

Compliance Mappings

ISO 17799 (legacy)

11.5.1

COBIT 4.1 (legacy)

None.