graphgrc

SCF - IAC-11 - Authenticator Feedback

Mechanisms exist to obscure the feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

Mapped framework controls

NIST 800-53

Control questions

Does the organization obscure the feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals?