Requirement:
The cybersecurity requirements for email service must be implemented.
Control Implementation Guidelines:
- Email protection cybersecurity requirements in the organization must be implemented, including:
- Approved cybersecurity requirements must be implemented to protect the organization's email, including but not limited to the use of appropriate and advanced technologies to analyze and filter emails
- Advanced technologies must be used to protect the organization's email from phishing emails and spam messages, including but not limited to the presence of an official and effective subscription with email protection service providers
- Email access must be through an intermediary, including but not limited to Load balancer
Expected Deliverables:
- An action plan to implement Email protection cybersecurity requirements at the organization
- Email protection controls in the organization must be implemented, including but not limited to:
- Advanced email protection and filtering technologies must be used by the organization to block suspicious messages, such as spam and phishing emails
- Antivirus solutions must be configured to email servers in order to scan all inbound and outbound emails
- Email field of the organization must be documented by using necessary means, such as the Sender Policy Framework, and reliability of incoming mail fields must be ensured through modern technologies such as (Incoming Message DMARC verification)
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you