UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Central Log Server must obfuscate authentication information during the authentication process so that the authentication is not visible.


Overview

Finding ID Version Rule ID IA Controls Severity
V-81291 SRG-APP-000178-AU-002660 SV-96005r1_rule High
Description
To prevent the compromise of authentication information such as passwords during the authentication process, the feedback from the information system must not provide any information that would allow an unauthorized user to compromise the authentication mechanism. Obfuscation of user-provided information when typed into the system is a method used in addressing this risk. For example, displaying asterisks when a user types in a password is an example of obscuring feedback of authentication information.
STIG Date
Central Log Server Security Requirements Guide 2018-08-29

Details

Check Text ( C-80993r1_chk )
Examine the configuration.

Verify the Central Log Server is configured to obfuscate authentication information during the authentication process so that the authentication is not visible.

If the Central Log Server is not configured to obfuscate authentication information during the authentication process so that the authentication is not visible, this is a finding.
Fix Text (F-88073r1_fix)
Configure the Central Log Server to obfuscate authentication information during the authentication process so that the authentication is not visible to protect the information from possible exploitation/use by unauthorized individuals.