3.5.11 — Mask the Password Field
What It Says
Section titled “What It Says”Obscure feedback of authentication information.
What It Actually Means
Section titled “What It Actually Means”Don’t show passwords on screen as they’re typed. Mask authentication fields with dots or asterisks. This prevents shoulder surfing — someone watching your screen as you type.
Most modern systems do this by default. The risk is in three places:
- Custom applications — internally developed tools that display passwords in input fields
- Admin CLI tools — command-line interfaces that echo passwords to the terminal
- ‘Show password’ toggles — some applications have a toggle that reveals the password and leaves it visible indefinitely
The assessor may walk around the office during a login demonstration and check that password fields are masked. It’s a low-point requirement (1 point) but an easy one to satisfy — or to fail if you have a custom app nobody thought to check.
Pass or Fail
Section titled “Pass or Fail”Your assessor needs a “yes” to every row:
| # | Question | What “yes” looks like |
|---|---|---|
| 1 | Is feedback of authentication information obscured during the authentication process? | Password fields masked with dots/asterisks across all login interfaces |
What to Have Ready on Assessment Day
Section titled “What to Have Ready on Assessment Day”Documents they’ll review: Identification and authentication policy; system security plan; system design documentation; system configuration settings
People they’ll talk to: Personnel with information security responsibilities; system developers
Live demos they’ll ask for: Mechanisms supporting or implementing authentication feedback obscuring
The Assessor’s Playbook
Section titled “The Assessor’s Playbook”These are the actual questions. Have answers ready.
- “Are all password fields masked across your applications?”
- “Do any custom or internal applications display passwords in clear text?”
- “Do your CLI admin tools echo passwords to the screen?”
- “Is there a ‘show password’ feature on any login page? How does it behave?”
Where Companies Trip Up
Section titled “Where Companies Trip Up”Custom app with visible passwords. An internally built tool that displays the password in the input field. Developer fix — change the input type to ‘password’.
CLI tools echoing passwords. Running a script that prompts for a password and echoes it to the terminal. Use secure input methods (Read-Host -AsSecureString in PowerShell, getpass in Python).
Passwords visible in URL bar. A web application that passes credentials as URL parameters, visible in the address bar. Fix the application to use POST instead of GET for login.
Show-password toggle with no auto-hide. ‘Show password’ button that reveals the password and leaves it visible indefinitely. Implement an auto-hide after 2-3 seconds or on mouse-up.
How to Talk About This
Section titled “How to Talk About This”Connected Requirements
Section titled “Connected Requirements”| Requirement | Why it matters here |
|---|---|
| 3.5.10 — Never Plain Text | Passwords protected in storage and transit; this protects them on screen |
| 3.1.10 — Lock the Screen | Screen lock prevents viewing of any data including masked password fields |
Implementation (coming soon)
Section titled “Implementation (coming soon)”Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.
CMMC Practice ID: IA.L2-3.5.11 | SPRS Weight: 1 point | POA&M Eligible: Yes