From 67726f1976a759c58a82669d0dad3b16b9c04ecc Mon Sep 17 00:00:00 2001 From: Jim Manico Date: Thu, 20 Jun 2024 17:32:07 +0200 Subject: [PATCH] Making 2.1.14 more straightforward (#1980, #1977) * Update 0x11-V2-Authentication.md Making 2.1.14 more straightforward * Update 0x11-V2-Authentication.md --------- Co-authored-by: Josh Grossman --- 5.0/en/0x11-V2-Authentication.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/5.0/en/0x11-V2-Authentication.md b/5.0/en/0x11-V2-Authentication.md index 831981fbd7..19ff16e321 100644 --- a/5.0/en/0x11-V2-Authentication.md +++ b/5.0/en/0x11-V2-Authentication.md @@ -43,7 +43,7 @@ Credential Service Providers (CSPs) provide federated identity for users. Users | **2.1.11** | Verify that "paste" functionality, browser password helpers, and external password managers are permitted. | ✓ | ✓ | ✓ | 521 | 5.1.1.2 | | **2.1.12** | [MODIFIED] Verify that password input fields use type=password to mask the entry. Applications may allow the user to temporarily view the entire masked password, or the last typed character of the password. | ✓ | ✓ | ✓ | 549 | 5.1.1.2 | | **2.1.13** | [ADDED, SPLIT FROM 2.1.10, LEVEL L1 > L2] Verify that the application does not keep a password history. | | ✓ | ✓ | | 5.1.1.2 | -| **2.1.14** | [ADDED, SPLIT FROM 2.1.7, LEVEL L1 > L3] Verify that passwords submitted during account registration or password changes are checked against a set of breached username and password pairs. | | | ✓ | | 5.1.1.2 | +| **2.1.14** | [ADDED, SPLIT FROM 2.1.7, LEVEL L1 > L3] Verify that passwords submitted during account registration or password changes are checked against a set of breached passwords. | | | ✓ | | 5.1.1.2 | | **2.1.15** | [ADDED] Verify that the documented list of context specific words is used to prevent easy to guess passwords being created. | | ✓ | ✓ | 521 | 5.1.1.2 | Possible sources of frequently used passwords for requirement 2.1.7 include: