<section title="15.1. Email Applications"><subsection title="Objective"><paragraph
    title="15.1.1."


><![CDATA[<p>Email messages have appropriate protective markings to facilitate the application of handling instructions.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="15.1.2."


><![CDATA[<p>This section covers information on email policy and usage as it applies to content and protective markings. &nbsp;Information on email infrastructure is located in <a title="Email infrastructure" href="http://nzism.gcsb.govt.nz/ism-document#Section-15250">Section 15.2 - Email Infrastructure</a>.</p>]]></paragraph>
</block>
<block title="Automatically generated emails"><paragraph
    title="15.1.3."


><![CDATA[<p>The requirements for emails within this section equally apply to automatically and manually generated emails.</p>]]></paragraph>
</block>
<block title="Exceptions for receiving unmarked email messages"><paragraph
    title="15.1.4."


><![CDATA[<p>Where an agency receives unmarked non-government emails as part of its business practice the application of protective markings can be automated.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="15.1.5."


><![CDATA[<p>Further references can be found at:</p><table class="table-main" style="width: 819.844px;">
<tbody>
<tr>
<td style="width: 79px;"><strong>Reference</strong></td>
<td style="width: 88px;"><strong>Title</strong></td>
<td style="width: 74px;"><strong>Publisher</strong></td>
<td style="width: 550.844px;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 79px;">
<p><strong>SP 800-45</strong></p>
</td>
<td style="width: 88px;">
<p><strong>NIST publication SP 800-45 v2, Guidelines on Electronic Mail Security</strong></p>
</td>
<td style="text-align: center; width: 74px;">NIST</td>
<td style="width: 550.844px;">
<p><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-45/version-2/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-45/version-2/final</a></p>
</td>
</tr>
<tr>
<td style="width: 79px;">&nbsp;</td>
<td style="width: 88px;">
<p><strong>Detecting socially engineered emails August 2012</strong></p>
</td>
<td style="text-align: center; width: 74px;">ASD</td>
<td style="width: 550.844px;">
<p><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/detecting-socially-engineered-messages" target="_blank">Detecting Socially Engineered Messages | Cyber.gov.au</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="15.1.6."


><![CDATA[<p class="NormS10C7">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>
<p>GOV2, GOV3, GOV4, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</p>
</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a><a title="PSR Mandatory Requirements - Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/information-security/mandatory-requirements-2/" target="_blank"></a>&nbsp;&nbsp;&nbsp;</p>
<p><a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a><a title="PSR Mandatory Requirements - Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/physical-security/physical-security-mandatory-requirements-2/" target="_blank">/</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Email usage policy"><paragraph
    title="15.1.7.R.01."

    tags="Governance,Information Security Documentation,Email,Email Security"


><![CDATA[<p>There are many security risks associated with the unsecure nature of email that are often overlooked. Documenting them will inform information owners about these security risks and how they might affect business operations.</p>]]></paragraph>
<paragraph
    title="15.1.7.C.01."

    tags="Governance,Information Security Documentation,Email,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1684"
><![CDATA[<p>Agencies MUST develop and implement a policy governing the use of email.</p>]]></paragraph>
</block>
<block title="Email distribution"><paragraph
    title="15.1.8.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Often the membership, clearance level and nationality of members of email distribution lists is unknown. As such, personnel sending sensitive emails with NZEO or other nationality releasability marked information could be accidentally causing an information security incident by sending such information to distribution lists.</p>]]></paragraph>
<paragraph
    title="15.1.8.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1687"
><![CDATA[<p>Agencies MUST ensure that emails containing NZEO or other nationality releasability marked information are sent only to named recipients.</p>]]></paragraph>
<paragraph
    title="15.1.8.C.02."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must Not"
    cid="1688"
><![CDATA[<p>Agencies MUST NOT transmit emails or other documents, containing NZEO or other nationality releasability marks, to groups or distribution lists unless the nationality of all members of the distribution lists can be confirmed.</p>]]></paragraph>
</block>
<block title="Protective marking standard"><paragraph
    title="15.1.9.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Applying markings that reflect the protective requirements of an email informs the recipient on how to appropriately handle the email and any related documents.</p>]]></paragraph>
<paragraph
    title="15.1.9.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1691"
><![CDATA[<p>Agencies SHOULD comply with the national classification system for the application of protective markings.</p>]]></paragraph>
</block>
<block title="Marking tools"><paragraph
    title="15.1.10.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Requiring system user intervention in the marking of system user-generated emails assures a conscious decision by the system user, lessening the chance of incorrectly marked emails.</p>]]></paragraph>
<paragraph
    title="15.1.10.R.02."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Limiting the protective markings a system user is allowed to choose, to those for which the system is accredited lessens the chance that a system user inadvertently over-classifies an email and reminds them of the maximum classification of information that is permitted on the system.</p>]]></paragraph>
<paragraph
    title="15.1.10.R.03."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Gateway filters usually check only the most recent protective marking.  Care MUST be taken when changing protective markings to a classification lower than that of the original email as this can result in emails being forwarded to systems or individuals NOT authorised and cleared to receive them.   The instructions in the classification system on changing classifications MUST be observed to avoid a security breach.</p>]]></paragraph>
<paragraph
    title="15.1.10.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must Not"
    cid="1696"
><![CDATA[<p>Agencies MUST NOT allow system users to select protective markings that the system has not been accredited to process, store or communicate.</p>]]></paragraph>
<paragraph
    title="15.1.10.C.02."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1697"
><![CDATA[<p>Agencies SHOULD NOT allow a protective marking to be inserted into system user generated emails without their intervention.</p>]]></paragraph>
<paragraph
    title="15.1.10.C.03."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1698"
><![CDATA[<p>Agencies SHOULD NOT permit system users replying to or forwarding an email to select a protective marking that indicates that the classification of the email is lower than a previous classification used for the email.</p>]]></paragraph>
</block>
<block title="Marking classified and unclassified emails"><paragraph
    title="15.1.11.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>As with paper-based information, all electronic-based information should be marked with an appropriate protective marking in accordance with the classification system.  This ensures that appropriate security measures are applied to the information and also assists in preventing the inadvertent release of information into the public domain.</p>]]></paragraph>
<paragraph
    title="15.1.11.R.02."

    tags="Governance,Email,Email Security"


><![CDATA[<p>When a protective marking is applied to an email it is important that it reflects the highest classification in the body of the email and any attachments within the email.</p>]]></paragraph>
<paragraph
    title="15.1.11.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1702"
><![CDATA[<p>All classified and unclassified emails MUST have a protective marking.</p>]]></paragraph>
<paragraph
    title="15.1.11.C.02."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1703"
><![CDATA[<p>Email protective markings MUST accurately reflect the highest classification of all elements in an email, including any attachments.</p>]]></paragraph>
<paragraph
    title="15.1.11.C.03."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1704"
><![CDATA[<p>Agencies SHOULD include protective markings in the email subject line or header to facilitate early identification of the classification.</p>]]></paragraph>
</block>
<block title="Emails from outside the government"><paragraph
    title="15.1.12.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>If an email is received from outside government the system user has an obligation to determine the appropriate protective measures for the email if it is to be responded to, forwarded or printed.</p>]]></paragraph>
<paragraph
    title="15.1.12.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1707"
><![CDATA[<p>Where an unmarked email has originated outside the government, the agency MUST assess the information and determine how it is to be handled in accordance with the classification system.</p>]]></paragraph>
</block>
<block title="Marking personal emails"><paragraph
    title="15.1.13.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Applying protective markings to personal emails may create system overheads and will be misleading.</p>]]></paragraph>
<paragraph
    title="15.1.13.R.02."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Personal emails can be marked as “PERSONAL” or “UNOFFICIAL” to avoid confusion with Official or Classified information.</p>]]></paragraph>
<paragraph
    title="15.1.13.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1711"
><![CDATA[<p>Where an email is of a personal nature and does not contain government information, protective markings SHOULD NOT be used.</p>]]></paragraph>
</block>
<block title="Receiving unmarked emails"><paragraph
    title="15.1.14.R.01."

    tags="Emanation Security,Governance,Email"


><![CDATA[<p>If an email is received from a New Zealand or overseas government agency without a protective marking the system user has an obligation to contact the originator to seek clarification on the appropriate protection measures for the email or follow established protocols and policy for protective markings.</p>]]></paragraph>
<paragraph
    title="15.1.14.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1714"
><![CDATA[<p>Where an unmarked email has originated from a New Zealand or overseas government agency, personnel SHOULD contact the originator to determine how it is to be handled.</p>]]></paragraph>
</block>
<block title="Receiving emails with unknown protective markings"><paragraph
    title="15.1.15.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>If an email is received with a protective marking that the system user is not familiar with they have an obligation to contact the originator to seek clarification on the protective marking and the appropriate protection measures for the email.</p>]]></paragraph>
<paragraph
    title="15.1.15.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1717"
><![CDATA[<p>Where an email is received with an unknown protective marking from a New Zealand or overseas government agency, personnel SHOULD contact the originator to determine appropriate protection measures.</p>]]></paragraph>
</block>
<block title="Printing"><paragraph
    title="15.1.16.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>The PSR requires that paper-based information have the classification of the information placed at the top and bottom of each piece of paper, in CAPITALS and appearing as the first and last item on each page.</p>]]></paragraph>
<paragraph
    title="15.1.16.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1720"
><![CDATA[<p>Agencies SHOULD configure systems so that the protective markings appear at the top and bottom of every page when the email is printed, in CAPITALS and appearing as the first and last item on each page.</p>]]></paragraph>
</block>
<block title="Active Web addresses within emails"><paragraph
    title="15.1.17.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Spoofed emails often contain an active Web address directing personnel to a malicious website to either elicit information or infect their workstation with malicious code. In order to reduce the success rate of such attacks agencies can choose to educate their personnel to neither send emails with active Web addresses or to click on Web addresses in emails that they receive.</p>]]></paragraph>
<paragraph
    title="15.1.17.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1723"
><![CDATA[<p>Personnel SHOULD NOT send emails that contain active Web addresses or click on active Web addresses within emails they receive.</p>]]></paragraph>
</block>
<block title="Awareness of email usage policies"><paragraph
    title="15.1.18.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>In order to protect information and systems, system users will need to be familiar with email usage policies.</p>]]></paragraph>
<paragraph
    title="15.1.18.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1726"
><![CDATA[<p>Agencies MUST make their system users aware of the agency’s email usage policies.</p>]]></paragraph>
</block>
<block title="Monitoring email usage"><paragraph
    title="15.1.19.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Agencies may choose to monitor compliance with aspects of email usage policies such as attempts to send prohibited file types or executables, attempts to send excessive sized attachments or attempts to send classified information without appropriate protective markings.</p>]]></paragraph>
<paragraph
    title="15.1.19.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1729"
><![CDATA[<p>Agencies SHOULD implement measures to monitor their personnel’s compliance with email usage policies.</p>]]></paragraph>
<paragraph
    title="15.1.19.C.02."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1730"
><![CDATA[<p>Agencies SHOULD enforce the use of approved government email systems such as SEEMAIL.</p>]]></paragraph>
</block>
<block title="Public Web-based email services"><paragraph
    title="15.1.20.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Using public Web-based email services may allow personnel to bypass security measures that agencies will have put in place to protect against malicious code or phishing attempts distributed via email. Web based email services may also by-pass agency context filtering mechanisms.</p>]]></paragraph>
<paragraph
    title="15.1.20.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1733"
><![CDATA[<p>Agencies SHOULD NOT allow personnel to use public Web-based email services, for processing, receiving or sending emails or attachments for official business.</p>]]></paragraph>
</block>
</subsection>
</section>
