STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← IA-6 — Authentication Feedback

CCI-000206

Definition

Obscure feedback of authentication information during the authentication process to protect the information from possible exploitation and use by unauthorized individuals.

Parent Control

IA-6Authentication FeedbackIdentification and Authentication

Linked STIG Checks (48)

V-259542CAT IIThe macOS system must disable password hints.Apple macOS 14 (Sonoma) Security Technical Implementation GuideV-259544CAT IIThe macOS system must remove password hints from user accounts.Apple macOS 14 (Sonoma) Security Technical Implementation GuideV-268539CAT IIThe macOS system must disable password hints.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-268541CAT IIThe macOS system must remove password hints from user accounts.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-277148CAT IIThe macOS system must disable password hints.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277149CAT IIThe macOS system must remove password hints from user accounts.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-222554CAT IThe application must not display passwords/PINs as clear text.Application Security and Development Security Technical Implementation GuideV-204757CAT IIThe application server must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.Application Server Security Requirements GuideV-237322CAT IThe ArcGIS Server must use Windows authentication to enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.ArcGIS for Server 10.3 Security Technical Implementation GuideV-276012CAT IAx-OS must have no local accounts for the user interface.Axonius Federal Systems Ax-OS Security Technical Implementation GuideV-206481CAT IThe Central Log Server must obfuscate authentication information during the authentication process so that the authentication is not visible.Central Log Server Security Requirements GuideV-233102CAT IIThe container platform must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.Container Platform Security Requirements GuideV-206561CAT IThe DBMS must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.Database Security Requirements GuideV-224171CAT IApplications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.EDB Postgres Advanced Server v11 on Windows Security Technical Implementation GuideV-224172CAT IWhen using command-line tools such as psql, users must use a logon method that does not expose the password.EDB Postgres Advanced Server v11 on Windows Security Technical Implementation GuideV-213601CAT IApplications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.EDB Postgres Advanced Server v9.6 Security Technical Implementation GuideV-213602CAT IWhen using command-line tools such as psql, users must use a logon method that does not expose the password.EDB Postgres Advanced Server v9.6 Security Technical Implementation GuideV-259252CAT IWhen using command-line tools such as psql, users must use a logon method that does not expose the password.EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation GuideV-259253CAT IApplications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation GuideV-217406CAT IIThe BIG-IP appliance must be configured to obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.F5 BIG-IP Device Management Security Technical Implementation GuideV-203635CAT IIThe operating system must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.General Purpose Operating System Security Requirements GuideV-213700CAT IApplications using the database must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.IBM DB2 V10.5 LUW Security Technical Implementation GuideV-213701CAT IWhen using command-line tools such as db2, users must use a Connect method that does not expose the password.IBM DB2 V10.5 LUW Security Technical Implementation GuideV-223509CAT IIACF2 TSOTWX GSO record values must be set to obliterate the logon password on TWX devices.IBM z/OS ACF2 Security Technical Implementation GuideV-223510CAT IIACF2 TSOCRT GSO record values must be set to obliterate the logon to ASCII CRT devices.IBM z/OS ACF2 Security Technical Implementation GuideV-223511CAT IIACF2 TSO2741 GSO record values must be set to obliterate the logon password on 2741 devices.IBM z/OS ACF2 Security Technical Implementation GuideV-213896CAT IApplications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.MS SQL Server 2014 Instance Security Technical Implementation GuideV-213897CAT IWhen using command-line tools such as SQLCMD in a mixed-mode authentication environment, users must use a logon method that does not expose the password.MS SQL Server 2014 Instance Security Technical Implementation GuideV-214045CAT IWhen using command-line tools such as SQLCMD in a mixed-mode authentication environment, users must use a logon method that does not expose the password.MS SQL Server 2016 Instance Security Technical Implementation GuideV-214046CAT IApplications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.MS SQL Server 2016 Instance Security Technical Implementation GuideV-205508CAT IIThe Mainframe Product must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.Mainframe Product Security Requirements GuideV-253702CAT IMariaDB must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.MariaDB Enterprise 10.x Security Technical Implementation GuideV-276323CAT IWhen using command-line tools with Azure SQL Server Managed Instance, such as SQLCMD, in a mixed-mode authentication environment, users must use a logon method that does not expose the password.Microsoft Azure SQL Managed Instance Security Technical Implementation GuideV-276324CAT IIApplications connecting to Azure SQL Server Managed Instance must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.Microsoft Azure SQL Managed Instance Security Technical Implementation GuideV-271313CAT IWhen using command-line tools such as SQLCMD in a mixed-mode authentication environment, users must use a logon method that does not expose the password.Microsoft SQL Server 2022 Instance Security Technical Implementation GuideV-221200CAT IMongoDB must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.MongoDB Enterprise Advanced 3.x Security Technical Implementation GuideV-252162CAT IMongoDB must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.MongoDB Enterprise Advanced 4.x Security Technical Implementation GuideV-265921CAT IMongoDB must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.MongoDB Enterprise Advanced 7.x Security Technical Implementation GuideV-279353CAT IMongoDB must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.MongoDB Enterprise Advanced 8.x Security Technical Implementation GuideV-202071CAT IThe network device must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.Network Device Management Security Requirements GuideV-219787CAT IApplications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.Oracle Database 11.2g Security Technical Implementation GuideV-219788CAT IWhen using command-line tools such as Oracle SQL*Plus, which can accept a plain-text password, users must use an alternative login method that does not expose the password.Oracle Database 11.2g Security Technical Implementation GuideV-270568CAT IWhen using command-line tools such as Oracle SQL*Plus, which can accept a plain-text password, users must use an alternative logon method that does not expose the password.Oracle Database 19c Security Technical Implementation GuideV-235140CAT IThe MySQL Database Server 8.0 must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.Oracle MySQL 8.0 Security Technical Implementation GuideV-252843CAT IRancher MCM must use a centralized user management solution to support account management functions. For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation GuideV-251228CAT IRedis Enterprise DBMS must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.Redis Enterprise 6.x Security Technical Implementation GuideV-234382CAT IIThe UEM server must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.Unified Endpoint Management Server Security Requirements GuideV-207382CAT IIThe VMM must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.Virtual Machine Manager Security Requirements Guide