<section title="15.2. Email Infrastructure"><subsection title="Objective"><paragraph
    title="15.2.1."


><![CDATA[<p>Email infrastructure is hardened, email is secured, and protective marking of email messages is enforced.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="15.2.2."


><![CDATA[<p>This section covers information on email infrastructure security, specifically email authentication and secure email transport. Information on using email applications can be found in <a title="Email applications" href="http://nzism.gcsb.govt.nz/ism-document#Section-15183">Section 15.1 - Email Applications</a> and <a title="Using the internet" href="http://nzism.gcsb.govt.nz/ism-document#Section-13449">Section 9.3 - Using the Internet</a>.</p>]]></paragraph>
<paragraph
    title="15.2.3."


><![CDATA[<p>Email is a critical tool for communication, and is commonly targeted by cyber-attacks. It is hard to protect because email is historically insecure and subject to social engineering. This section covers email authentication, secure email transport, and securing non-email sending domains.</p>]]></paragraph>
</block>
<block title="Email authentication"><paragraph
    title="15.2.4."


><![CDATA[<p>Email authentication protects your email from impersonation attacks like spoofing and phishing; phishing and malware distribution attacks are common internet security threats.&nbsp; To avoid agency domains being used fraudulently (e.g. for spam or spear-phishing), the following should be implemented:</p>
<ul>
<li>Sender Policy Framework (SPF)</li>
<li>DomainKeys Identified Mail (DKIM)</li>
<li>Domain-based Message Authentication, Reporting &amp; Conformance (DMARC) records</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.5."


><![CDATA[<p>Implementation of these features will help other mail servers authenticate the email they receive from your domains.&nbsp; It is important to note that DMARC is designed to protect against direct domain spoofing only.&nbsp; DMARC does not eliminate the need for additional forms of protection and analysis.&nbsp; It does, however, provide a way for participating senders and receivers to coordinate protective activities and streamline security processes.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Domain-based Message Authentication, Reporting and Conformance (DMARC)"> <block title="Vocabulary"><paragraph
    title="15.2.6"


><![CDATA[<p>The terms “none”, “reject” and “quarantine” are used to describe DMARC actions based on policy modes.&nbsp; In this usage:</p>
<ul>
<li>“none” means no action on the transmission or receipt of the email but continue to collect data and send reports;</li>
<li>By default, email under a “reject” policy setting is not delivered.&nbsp; “Reject” either:
<ul>
<li>refuses to accept non-compliant email, or</li>
<li>initially accepts the non-compliant email but prevents an email reaching the user.&nbsp; The acceptance process can generate a Delivery Status Notification (block/“bounce”) or simply delete/drop the email (block/delete);</li>
</ul>
</li>
<li>“quarantine” prevents an email from reaching the user but safely storing it so it can be accessed if required (a potentially suspicious email and/or attachment subject to additional scrutiny).&nbsp; Quarantined items can be released following a review and release process.</li>
</ul>]]></paragraph>
</block>
<block title="What is DMARC"><paragraph
    title="15.2.7."


><![CDATA[<p>Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication policy and reporting protocol that:</p>
<ul>
<li>complements and unifies the existing validation checks performed by SPF and DKIM;</li>
<li>checks the stated origin of inbound emails using a combination of <a rel="noopener noreferrer" href="https://www.gov.uk/government/publications/email-security-standards/sender-policy-framework-spf" target="_blank">Sender Policy Framework</a> (SPF) and <a rel="noopener noreferrer" href="https://www.gov.uk/government/publications/email-security-standards/domainkeys-identified-mail-dkim" target="_blank">DomainKeys Identified Mail</a> (DKIM);</li>
<li>establishes a recipient email response for emails that fail the check;</li>
<li>requests recipient email services to report email sources and origins;</li>
<li>provides visibility over potentially illegitimate or fraudulent email.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.8."


><![CDATA[<p>DMARC builds on SPF and DKIM protocols, adding links to the author (“From:”) domain name, published policies for recipient handling of authentication failures, and reporting from receivers to senders, in order to improve and monitor protection of the recipient domain from fraudulent email.</p>]]></paragraph>
<paragraph
    title="15.2.9."


><![CDATA[<p>Most email services will check your DMARC record and send aggregated reports including details of all email the service received from the agency, and its origin.&nbsp; This assists in identifying if an individual within the agency is sending email inappropriately or if the agency domain is being spoofed.</p>]]></paragraph>
</block>
<block title="Background, Reference and Implementation Guidance Sources"><paragraph
    title="15.2.10."


><![CDATA[<p>The IETF published RFC 7489, “Domain-based Message Authentication, Reporting, and Conformance (DMARC)” 18 March 2015. This is the principal standards guidance on the implementation and use of DMARC.&nbsp;Further guidance is available from The Global Cyber Alliance (GCA) - see References below.</p>]]></paragraph>
</block>
<block title="Using DMARC"><paragraph
    title="15.2.11."


><![CDATA[<p>The combination of DMARC, SPF, and DKIM records in DNS automates the ability of email service providers to confirm which servers should be legitimately sending email from the agency’s domain, and what action to take with mail received from any other domains.</p>]]></paragraph>
<paragraph
    title="15.2.12."


><![CDATA[<p>As a pre-requisite for implementing DMARC, agencies <strong>must</strong> publish an SPF and a DKIM record in DNS. Agencies must also ensure that emails sent by the agency (including from third party services sending on behalf of the agency) have a DKIM signature that matches the signature in the DKIM record.</p>]]></paragraph>
<paragraph
    title="15.2.13."


><![CDATA[<p>Agencies can choose to quarantine or reject messages that fail checks.&nbsp; More specifically:</p>
<ul>
<li>Sender Policy Framework (SPF) is used to specify legitimate locations of servers which can send email for your domain;</li>
<li>DomainKeys Identified Mail (DKIM) isn't supported by all mail servers, but if it is, it can be used to cryptographically sign outgoing mail sent by your servers to give email service providers further confidence that it's legitimate;</li>
<li>DMARC is used to inform email service providers what action they should take if SPF or DKIM (or both) validation fails;</li>
<li>One important aspect of DMARC is the action you ask email service providers to take when&nbsp;SPF or DKIM validation fails:
<ul>
<li>a policy of p=none means that they should allow non-compliant emails to be delivered but report the failure to the agency;</li>
<li>a policy of p=quarantine requests that they mark the email as spam;</li>
<li>a policy of p=reject requests the email service provider to refuse to deliver the email.</li>
</ul>
</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.14."


><![CDATA[<p>A text record published in DNS is used to notify other organisations of the use of DMARC. The following demonstrates an example DMARC record:</p>
<ul>
<li>v=DMARC1;</li>
<li>p=quarantine;</li>
<li>rua=mailto:dmarc@agency.govt.nz (where agency is the name of the respective agency).</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.15."


><![CDATA[<p>This informs email recipients that:</p>
<ul>
<li>you have a DMARC policy (v=DMARC1)</li>
<li>any messages that fail DMARC checks should be treated as spam (p=quarantine)</li>
<li>they should send reports of email received back to you (rua=mailto:dmarc@agency.govt.nz)</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.16."


><![CDATA[<p>It is not unusual to experience minor errors in syntax or other elements of DMARC configuration when first implementing DMARC.&nbsp; Some discussion on common problems, issues and solutions can be found on the DMARC website (see the References table below).</p>]]></paragraph>
<paragraph
    title="15.2.17."


><![CDATA[<p>For domains expected to be used for email, it is not recommended to move directly to a full implementation of DMARC until there is certainty that the configuration and implementation are stable and operating as intended. The following implementation outline is recommended by the GCA and DMARC organisations (<a title="References" href="http://nzism.gcsb.govt.nz/ism-document#SubSection-15279">see 15.2.19 References</a>):</p>
<ol>
<li>Deploy DKIM &amp; SPF;</li>
<li>Ensure mailers are correctly aligning the appropriate identifiers;</li>
<li>Publish a DMARC record with the “none” flag set for the policies, which requests data reports;</li>
<li>Analyse the data and modify mail streams as appropriate; and</li>
<li>Modify DMARC policy flags from “none” to “quarantine” to “reject” as experience dictates.</li>
</ol>]]></paragraph>
</block>
<block title="Securing non-email sending domains"><paragraph
    title="15.2.18."


><![CDATA[<p>Threat actors may attempt to spoof a domain that is not intended to send or receive email. Operators of domains that do not send mail can publish Sender Policy Framework (SPF) "-all" policies to make an explicit declaration that the domains send no mail. The following DNS entries create blank SPF and DKIM entries effectively forcing every email sent (spoofed) from a non-mail-enabled domain to fail all checks, giving the highest possible chance of these emails not reaching their intended destination.</p>
<ul>
<li>SPF&nbsp; &nbsp; &nbsp;“v=spf1 -all”</li>
<li>DKIM &nbsp; “v=DKIM1; p=”</li>
<li>DMARC&nbsp; “V=DMARC1;p=reject;sp=reject;adkim-s;aspf=s;rua=mailto:&lt;your dmarc report RUA email address&gt;;”</li>
</ul>]]></paragraph>
</block>
<block title="DMARC Reporting"><paragraph
    title="15.2.19"


><![CDATA[<p>DMARC reporting provides information to assist an agency’s IT system and email administrators.&nbsp; It can also provide an email asset inventory as well as providing data on spam, phishing and other email exploitation techniques.</p>]]></paragraph>
<paragraph
    title="15.2.20."


><![CDATA[<p>DMARC can be configured to produce an aggregate report and a forensic report.&nbsp; In some cases agencies may also send reports to an external organisation such as a DMARC reporting service or a third-party IT service provider.&nbsp; Discretion should be used when providing such information to third parties in order to maintain security and privacy.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Secure email transport"><paragraph
    title="15.2.21."


><![CDATA[<p>Over time, several protocols have emerged to support the encryption of email traffic in transit. Secure email transport protects your email from person-in-the middle attacks like eavesdropping, manipulation, and cryptographic downgrade.</p>]]></paragraph>
<paragraph
    title="15.2.22."


><![CDATA[<p>With parties that you contact regularly by email (eg, partner organisations), it is possible to configure connections so that TLS will always be used, and the certificates presented by both mail servers are authenticated, verifying the identities of both parties.</p>]]></paragraph>
 <block title="STARTTLS, Opportunistic TLS"><paragraph
    title="15.2.23."


><![CDATA[<p>Opportunistic TLS is configured on the sending server. STARTTLS (RFC 3207) is a protocol command that upgrades an insecure connection to a secure connection using TLS. Agencies must enable opportunistic TLS encryption.</p>]]></paragraph>
</block>
<block title="Using MTA-STS"><paragraph
    title="15.2.24."


><![CDATA[<p>SMTP MTA Strict Transport Security (MTA-STS) is a standard that adds support for strict encryption without relying on DNSSEC (RFC 8461). With MTA-STS, you can specify that mail traffic sent to a domain is encrypted with a specific public encryption key. Agencies should enable MTA-STS.</p>]]></paragraph>
<paragraph
    title="15.2.25."


><![CDATA[<p>The objectives of MTA-STS are to:&nbsp;</p>
<ul>
<li>make it harder for an attacker to intercept and redirect emails&nbsp;</li>
<li>make sure that TLS encryption is always used,</li>
<li>prevent attackers downgrading email encryption on emails to cleartext,</li>
<li>provide visibility reports through the TLS reporting protocol.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.26."


><![CDATA[<p>To achieve this, MTA-STS works in the following ways:</p>
<ul>
<li>Your organisation can advertise the mail server hostname on a separate secure web page, which means an attacker cannot subvert your DNS entry (specifically your MX record, which is the record that indicates how an email should be routed using the Simple Mail Transfer Protocol).<br><br></li>
<li>Your organisation can publish an ‘MTA-STS enforce policy’, which tells any server sending you emails to always send with TLS encryption, and to not allow connections to be downgraded. If there is a failure to establish a secure TLS connection, emails will not be delivered. Note that when your organisation sets up MTA-STS, you are securing inbound connections only.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.27."


><![CDATA[<p>MTA-STS is relatively simple to implement, but organisations must step through their implementation with care; if you switch on controls too quickly then inbound emails may not be delivered. To mitigate this risk, we always recommend using MTA-STS in ‘testing mode’ first, and to set up TLS-RPT (TLS Reporting) as a mechanism for getting feedback before you progress.</p>]]></paragraph>
<paragraph
    title="15.2.28."


><![CDATA[<p>The goal ultimately is to work towards implementing an MTA-STS policy of ‘enforce’. When a sending email service detects you have an MTA-STS policy of ‘enforce’, they should only send email to your domain if the connection is secure. Note however, that whilst many major email providers have built support for MTA-STS, there is not yet complete support from all vendors. For those that don’t yet support it, emails will continue to be delivered in all cases.</p>]]></paragraph>
<paragraph
    title="15.2.29."


><![CDATA[<p>While they achieve the same aim, DNS-based Authentication of Named Entities (DANE) and MTA-STS do not conflict and can be implemented in parallel. You can implement MTA-STS by deploying signed TLS certificates to a domain’s email and web servers, publishing an MTA-STS policy on the web server, and publishing MTA-STS records in DNS. Like DMARC, MTA-STS supports the delivery of aggregate reporting to system owners.&nbsp;</p>]]></paragraph>
<paragraph
    title="15.2.30."


><![CDATA[<p>MTA-STS (Mail Transfer Agent – Strict Transport Security) is configured on the receiving server, forcing inbound email connections to use TLS if the sending server supports MTA-STS; there is no drop down to cleartext. If the sending server does not support MTA-STS the connection can use opportunistic TLS, or even send in the clear.</p>]]></paragraph>
</block>
<block title="TLS reporting"><paragraph
    title="15.2.31."


><![CDATA[<p>Organisations should also enable TLS reporting when implementing MTA-STS (RFC 8460). By implementing TLS reporting, organisations will be able to see the performance of its domains, the success or failure rate, and the impact of the organisation’s MTA-STS and policies. This will give organisations important insight into which mail services it needs to configure to ensure no interruption in mail flow.&nbsp;</p>]]></paragraph>
</block>
<block title="Secure cryptography"><paragraph
    title="15.2.32."


><![CDATA[<p>Historically, network traffic between mail servers was unencrypted, leaving it vulnerable to interception or modification in transit. Although it is possible to encrypt individual emails using protocols like PGP or S/MIME, this requires the sender and recipient to have the necessary trust infrastructure in place. Approved implementation of S/MIME and OpenPGP are discussed in Chapter 17, 17.6 Secure Multipurpose Internet Mail Extension, and 17.7 OpenPGP Message Format.</p>]]></paragraph>
<paragraph
    title="15.2.33."


><![CDATA[<p>This is not likely to be possible for all the parties you communicate with. So, your email servers should be configured to support encryption of the communications channel that the email is sent over. This task is best handled by TLS. Agencies should use the current version of TLS, see [CID:2598]. When implementing MTA-STS, agencies should use TLS1.2 or above on email servers.</p>]]></paragraph>
<paragraph
    title="15.2.34."


><![CDATA[<p>Implementation details</p>
<ul>
<li>Configure all your email servers to support TLS, regardless of whether they are accessible from the internet or private networks only.</li>
<li>Ensure your email servers present a certificate with suitable cryptographic properties and that it is signed by a trusted Certificate Authority.</li>
<li>Ensure your email servers prefer to use a good cryptographic profile, but that lesser cryptographic profiles are supported too. You should support the case where TLS is not used at all, if you want to be confident you can receive emails from any entity.</li>
<li>Where possible, consider configuring your email service to force TLS between you and organisations you regularly communicate with.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="15.2.35"


><![CDATA[<p>Further information on email security is available from the following sources:</p>
<table class="table-main" style="width: 100%; height: 1449px;">
<tbody>
<tr style="height: 18px;">
<td style="width: 9.84204%; height: 18px;"><strong>Reference</strong></td>
<td style="width: 19.0765%; height: 18px;"><strong>Title</strong></td>
<td style="width: 9.35601%; height: 18px;"><strong>Publisher</strong></td>
<td style="width: 61.7254%; height: 18px;"><strong>Source</strong></td>
</tr>
<tr style="height: 90px;">
<td style="width: 9.84204%; height: 90px;"><strong><strong>RFC 3207</strong></strong></td>
<td style="width: 19.0765%; height: 90px;"><strong>SMTP Service Extension for Secure SMTP over Transport Layer Security</strong></td>
<td style="text-align: center; width: 9.35601%; height: 90px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 90px;"><a title="SMTP Service Extension for Secure SMTP over Transport Layer Security" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3207" target="_blank"></a><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc3207/" target="_blank">RFC 3207 - SMTP Service Extension for Secure SMTP over Transport Layer Security (ietf.org)</a><a title="SMTP Service Extension for Secure SMTP over Transport Layer Security" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3207" target="_blank"></a></td>
</tr>
<tr style="height: 90px;">
<td style="width: 9.84204%; height: 90px;"><strong>RFC 4686</strong></td>
<td style="width: 19.0765%; height: 90px;"><strong>Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)</strong></td>
<td style="text-align: center; width: 9.35601%; height: 90px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 90px;"><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc4686/" target="_blank">RFC 4686 - Analysis of Threats Motivating DomainKeys Identified Mail (DKIM) (ietf.org)</a></td>
</tr>
<tr style="height: 54px;">
<td style="width: 9.84204%; height: 54px;"><strong><strong>RFC 6376</strong></strong></td>
<td style="width: 19.0765%; height: 54px;"><strong>DomainKeys Identified Mail (DKIM) Signatures</strong></td>
<td style="text-align: center; width: 9.35601%; height: 54px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 54px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc6376/" target="_blank">RFC 6376 - DomainKeys Identified Mail (DKIM) Signatures (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 90px;">
<td style="width: 9.84204%; height: 90px;"><strong><strong>RFC 5617</strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 90px;"><strong>DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP)</strong></td>
<td style="text-align: center; width: 9.35601%; height: 90px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 90px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc5617/" target="_blank">RFC 5617 - DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP) (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 126px;">
<td style="width: 9.84204%; height: 126px;"><strong><strong>RFC 7817</strong></strong></td>
<td style="width: 19.0765%; height: 126px;"><strong>Updated Transport Layer Security (TLS) Server Identity Check Procedure for Email-Related Protocols</strong></td>
<td style="text-align: center; width: 9.35601%; height: 126px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 126px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc7817/" target="_blank">RFC 7817 - Updated Transport Layer Security (TLS) Server Identity Check Procedure for Email-Related Protocols (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 90px;">
<td style="width: 9.84204%; height: 90px;"><strong><strong>RFC 7208</strong></strong></td>
<td style="width: 19.0765%; height: 90px;"><strong>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</strong></td>
<td style="text-align: center; width: 9.35601%; height: 90px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 90px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc7208/" target="_blank">RFC 7208 - Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1 (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 108px;">
<td style="width: 9.84204%; height: 108px;"><strong><strong>RFC 7489</strong></strong></td>
<td style="width: 19.0765%; height: 108px;"><strong>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</strong></td>
<td style="text-align: center; width: 9.35601%; height: 108px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 108px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc7489/" target="_blank">RFC 7489 - Domain-based Message Authentication, Reporting, and Conformance (DMARC) (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 180px;">
<td style="width: 9.84204%; height: 180px;"><strong><strong>&nbsp;RFC 7960</strong></strong></td>
<td style="width: 19.0765%; height: 180px;"><strong>&nbsp;Interoperability Issues between Domain-based Message Authentication, Reporting, and Conformance (DMARC) and Indirect Email Flows</strong></td>
<td style="text-align: center; width: 9.35601%; height: 180px;"><span>IETF&nbsp;</span></td>
<td style="width: 61.7254%; height: 180px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc7960/" target="_blank">RFC 7960 - Interoperability Issues between Domain-based Message Authentication, Reporting, and Conformance (DMARC) and Indirect Email Flows (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 108px;">
<td style="width: 9.84204%; height: 108px;"><strong><strong>&nbsp;RFC 8463</strong></strong></td>
<td style="width: 19.0765%; height: 108px;"><strong>&nbsp;A New Cryptographic Signature Method for DomainKeys Identified Mail (DKIM)</strong></td>
<td style="text-align: center; width: 9.35601%; height: 108px;"><span>IETF&nbsp;</span></td>
<td style="width: 61.7254%; height: 108px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc8463/" target="_blank">RFC 8463 - A New Cryptographic Signature Method for DomainKeys Identified Mail (DKIM) (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 90px;">
<td style="width: 9.84204%; height: 90px;"><strong>NIST SP 800-45 Version 2</strong></td>
<td style="width: 19.0765%; height: 90px;"><strong>Guidelines on Electronic Mail Security</strong></td>
<td style="text-align: center; width: 9.35601%; height: 90px;">NIST</td>
<td style="width: 61.7254%; height: 90px;"><a rel="noopener noreferrer" href="https://csrc.nist.gov/pubs/sp/800/45/ver2/final" target="_blank">SP 800-45 Version 2, Guidelines on Electronic Mail Security | CSRC (nist.gov)</a></td>
</tr>
<tr style="height: 54px;">
<td style="width: 9.84204%; height: 54px;"><strong>NIST SP 800-177 Rev. 1</strong></td>
<td style="width: 19.0765%; height: 54px;"><strong>Trustworthy Email</strong></td>
<td style="text-align: center; width: 9.35601%; height: 54px;">NIST</td>
<td style="width: 61.7254%; height: 54px;"><a rel="noopener noreferrer" href="https://csrc.nist.gov/pubs/sp/800/177/r1/final" target="_blank">SP 800-177 Rev. 1, Trustworthy Email | CSRC (nist.gov)</a></td>
</tr>
<tr style="height: 90px;">
<td style="width: 9.84204%; height: 90px;"><strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 90px;"><strong>Email Authentication Mechanisms: DMARC, SPF and DKIM</strong></td>
<td style="text-align: center; width: 9.35601%; height: 90px;">NIST</td>
<td style="width: 61.7254%; height: 90px;"><a rel="noopener noreferrer" href="https://www.nist.gov/publications/email-authentication-mechanisms-dmarc-spf-and-dkim" target="_blank">Email Authentication Mechanisms: DMARC, SPF and DKIM | NIST</a></td>
</tr>
<tr style="height: 36px;">
<td style="width: 9.84204%; height: 36px;"><strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 36px;"><strong>DMARC</strong></td>
<td style="text-align: center; width: 9.35601%; height: 36px;">DMARC</td>
<td style="width: 61.7254%; height: 36px;"><a rel="noopener noreferrer" href="https://dmarc.org/" target="_blank">dmarc.org – Domain Message Authentication Reporting &amp; Conformance</a></td>
</tr>
<tr style="height: 45px;">
<td style="width: 9.84204%; height: 45px;"><strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 45px;"><strong>Guidelines for Email</strong></td>
<td style="text-align: center; width: 9.35601%; height: 45px;">ASD</td>
<td style="width: 61.7254%; height: 45px;"><a rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-guidelines/guidelines-email" target="_blank">Guidelines for Email | Cyber.gov.au</a></td>
</tr>
<tr style="height: 36px;">
<td style="width: 9.84204%; height: 36px;"><strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 36px;"><strong>Enhance Email &amp; Web Security</strong></td>
<td style="text-align: center; width: 9.35601%; height: 36px;">CISA</td>
<td style="width: 61.7254%; height: 36px;"><a rel="noopener noreferrer" href="https://www.cisa.gov/resources-tools/resources/enhance-email-web-security" target="_blank">Enhance Email &amp; Web Security | CISA</a></td>
</tr>
<tr style="height: 54px;">
<td style="width: 9.84204%; height: 54px;"><strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 54px;"><strong>Implementation guidance: email domain protection</strong></td>
<td style="text-align: center; width: 9.35601%; height: 54px;">CCCS</td>
<td style="width: 61.7254%; height: 54px;"><a rel="noopener noreferrer" href="https://www.cyber.gc.ca/en/guidance/implementation-guidance-email-domain-protection" target="_blank">Implementation guidance: email domain protection (ITSP.40.065 v1.1) - Canadian Centre for Cyber Security</a></td>
</tr>
<tr style="height: 18px;">
<td style="width: 9.84204%; height: 18px;"><strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 18px;"><strong>Email security and anti-spoofing</strong></td>
<td style="text-align: center; width: 9.35601%; height: 18px;">NCSC-UK</td>
<td style="width: 61.7254%; height: 18px;"><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/collection/email-security-and-anti-spoofing" target="_blank">Email security and anti-spoofing - NCSC.GOV.UK</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Domain-based Message Authentication, Reporting and Conformance (DMARC)"><paragraph
    title="15.2.36.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Phishing and malware distribution attacks are common internet security threats.&nbsp; To limit the possibility of agency domains being used fraudulently (e.g. for spam or spear-phishing), agencies should implement:</p>
<ul>
<li>A Sender Policy Framework (SPF);</li>
<li>DomainKeys Identified Mail (DKIM); and</li>
<li>Domain-based Message Authentication, Reporting &amp; Conformance (DMARC) records.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.36.R.02."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>It is important to note that DMARC depends on the proper implementation of both SPF and DKIM.&nbsp; DMARC records are published in the DNS and provide guidance to the email receiver on actions to take when emails received do not conform to the published record.</p>]]></paragraph>
<paragraph
    title="15.2.36.C.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="6019"
><![CDATA[<p class="Default">Before implementing DMARC agencies MUST:</p>
<ul>
<li>Create a DMARC policy;</li>
<li>List all domains, in particular those used for the sending and/or receiving of email;</li>
<li>Review the configuration of SPF and DKIM for all active domains and all published domains; and</li>
<li>Establish one or more monitored inboxes to receive DMARC reports.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.36.C.02"


    classification="All Classifications"
    compliance="Must"
    cid="6020"
><![CDATA[<p>Agencies MUST enable DMARC with&nbsp;a policy of p=reject for all email originating from or received by their domain(s). <a rel="noopener noreferrer" href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-15275" target="_blank">See 15.2.16</a> for a recommended approach where a domain is used for sending and/or receiving email and disruption would cause a business impact.</p>]]></paragraph>
<paragraph
    title="15.2.36.C.03"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="7519"
><![CDATA[<p>Agencies MUST manage “received DMARC messages” in accordance with the agency’s published DMARC policy.</p>]]></paragraph>
<paragraph
    title="15.2.36.C.04"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="6021"
><![CDATA[<p>Agencies MUST review DMARC reports on a regular basis and address any identified anomalies or security issues.</p>]]></paragraph>
<paragraph
    title="15.2.36.C.05"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="7520"
><![CDATA[<p>Agencies SHOULD produce failure reports and aggregate reports according to the agency’s DMARC policies.</p>]]></paragraph>
</block>
<block title="Filtering suspicious emails and attachments"><paragraph
    title="15.2.37.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>The intent of blocking specific types of emails is to reduce the likelihood of phishing emails and emails or attachments containing malicious code entering the agency’s networks.</p>]]></paragraph>
<paragraph
    title="15.2.37.C.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1745"
><![CDATA[<p>Agencies SHOULD configure the following gateway filters:</p>
<ul>
<li>inbound and outbound email, including any attachments, that contain:
<ul>
<li>malicious code;</li>
<li>content in conflict with the agency’s email policy;</li>
<li>content that cannot be identified;</li>
<li>deny listed or unauthorised filetypes; and</li>
</ul>
</li>
<li>encrypted content, when that content cannot be inspected for malicious code or authenticated as originating from a trusted source;</li>
<li>emails addressed to internal-use only email aliases with source addresses located from outside the domain; and</li>
<li>all emails arriving via an external connection where the source address uses an internal agency domain name.</li>
</ul>]]></paragraph>
</block>
<block title="Active web addresses (URL) embedded in emails"><paragraph
    title="15.2.38.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Spoofed emails often contain an active (embedded) email address directing users to a malicious website in order to infect the workstation or agency systems with malicious code.</p>]]></paragraph>
<paragraph
    title="15.2.38.R.02."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>An effective defence is to strip and replace active addresses and hyperlinks with text only versions.</p>]]></paragraph>
<paragraph
    title="15.2.38.C.01"

    tags="Emanation Security,Technical,Email,Email Infrastructure"


    classification="All Classifications"
    compliance="Should"
    cid="1749"
><![CDATA[<p>Email servers SHOULD be configured to strip active addresses and URL’s and replace them with text only versions.</p>]]></paragraph>
</block>
<block title="Preventing unmarked or inappropriately marked emails"><paragraph
    title="15.2.39.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Unmarked or inappropriately marked emails can be blocked at two points, the workstation or the email server. The email server is often the preferred location to block emails as it is a single location under the control of system administrators that can enforce the requirement for the entire network. In addition email servers can apply controls for emails generated by applications.</p>]]></paragraph>
<paragraph
    title="15.2.39.R.02."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Whilst blocking at the email server is considered the most appropriate control there is an advantage in also blocking at the workstation. This approach adds an extra layer of security and will also reduce the likelihood of a data spill occurring on the email server.</p>]]></paragraph>
<paragraph
    title="15.2.39.R.03."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>For classified systems is it important to note that all emails containing classified information MUST be protectively marked. &nbsp;This requirement is outlined in <a title="Email applications" href="http://nzism.gcsb.govt.nz/ism-document#Section-15183">Section 15.1 - Email Applications</a>.</p>]]></paragraph>
<paragraph
    title="15.2.39.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="1754"
><![CDATA[<p>Agencies MUST prevent unmarked and inappropriately marked emails being sent to intended recipients by blocking the email at the email server, originating workstation or both.</p>]]></paragraph>
<paragraph
    title="15.2.39.C.02"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="1755"
><![CDATA[<p>Agencies MUST enforce protective marking of emails so that checking and filtering can take place.</p>]]></paragraph>
<paragraph
    title="15.2.39.C.03"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1756"
><![CDATA[<p>Agencies SHOULD enforce protective marking of emails so that checking and filtering can take place.</p>]]></paragraph>
</block>
<block title="Blocking of outbound emails"><paragraph
    title="15.2.40.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Blocking an outbound email with a valid protective marking or endorsement (e.g. NZEO) that indicates the email exceeds the classification of the communication path, stops data spills.</p>]]></paragraph>
<paragraph
    title="15.2.40.R.02."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Agencies may remove protective markings from emails destined for private citizens and businesses once they have been approved for release from the agency’s gateways.</p>]]></paragraph>
<paragraph
    title="15.2.40.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1760"
><![CDATA[<p>Agencies MUST configure systems to block any outbound emails with a protective marking or endorsement indicating that the content of the email exceeds the classification of the communication path.</p>]]></paragraph>
<paragraph
    title="15.2.40.C.02"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1761"
><![CDATA[<p>Agencies SHOULD configure systems to log every occurrence of a blocked email.</p>]]></paragraph>
</block>
<block title="Blocking of inbound emails"><paragraph
    title="15.2.41.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Blocking an inbound email with a valid protective marking that indicates the email or its attachment exceeds the classification the receiving system is accredited to process will prevent a data spill from occurring on the receiving system.</p>]]></paragraph>
<paragraph
    title="15.2.41.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1764"
><![CDATA[<p>Agencies MUST configure email systems to reject, log and report inbound emails with protective markings indicating that the content of the email exceeds the accreditation of the receiving system.</p>]]></paragraph>
<paragraph
    title="15.2.41.C.02"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1765"
><![CDATA[<p>Agencies SHOULD notify the intended recipient of any blocked emails.</p>]]></paragraph>
</block>
<block title="Undeliverable messages"><paragraph
    title="15.2.42.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Undeliverable or “bounce” emails are commonly sent by email servers to the original sender when the email cannot be delivered, often because the destination address is invalid. &nbsp;Because of the common spamming practice of spoofing sender addresses, this can result in a large amount of bounce emails being sent to an innocent third party. &nbsp;Sending bounces only to senders that can be verified via the Sender Policy Framework (SPF) or other trusted means avoids contributing to this problem and allows other government agencies and trusted parties to receive legitimate bounce messages. See also 15.2.15 - Sender Policy Framework.</p>]]></paragraph>
<paragraph
    title="15.2.42.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1768"
><![CDATA[<p>Agencies SHOULD <strong>only</strong> send notification of undeliverable, bounced, or blocked emails to senders that can be verified via SPF or other trusted means.</p>]]></paragraph>
</block>
<block title="Automatic forwarding of emails"><paragraph
    title="15.2.43.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Unsecured automatic forwarding of emails can pose a serious risk to the unauthorised disclosure of classified information, for example, a system user may set up a server-side rule to automatically forward all emails to a personal email account. This can result in classified emails being forwarded to the personal email account.&nbsp;This tactic may also be employed when an email account is compromised.</p>]]></paragraph>
<paragraph
    title="15.2.43.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1771"
><![CDATA[<p>Agencies MUST ensure that the requirements for blocking unmarked and outbound emails are also applied to automatically forwarded emails.</p>]]></paragraph>
</block>
<block title="Open relay email servers"><paragraph
    title="15.2.44.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>An open relay email server (or open mail relay) is a server that is configured to allow anyone on the Internet to send emails through the server. &nbsp;Such configurations are highly undesirable as they allow spammers and worms to exploit this functionality to send emails through the server.&nbsp;Although no longer considered a significant vector for spam email, mail servers identified as an open relay will still be added to reputation based block lists.</p>]]></paragraph>
<paragraph
    title="15.2.44.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1774"
><![CDATA[<p>Agencies MUST disable open email relaying so that email servers will only relay messages destined for the agency’s domain(s) and those originating from authorised systems or users within that domain.</p>]]></paragraph>
</block>
<block title="Email server maintenance activities"><paragraph
    title="15.2.45.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Email servers perform a critical business function for many agencies; as such it is important that agencies perform regular email server auditing, security reviews and vulnerability analysis activities.</p>]]></paragraph>
<paragraph
    title="15.2.45.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1777"
><![CDATA[<p>Agencies SHOULD perform regular email server auditing, security reviews and vulnerability analysis activities.</p>]]></paragraph>
</block>
<block title="Centralised email gateways"><paragraph
    title="15.2.46.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Without a centralised email gateway it is exceptionally difficult to deploy Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM) and outbound email protective markings verification.<br>Attackers will almost invariably avoid using the primary email server when sending malicious emails. This is because the backup or alternative gateways are often poorly maintained with out-of-date deny lists and content filtering.</p>]]></paragraph>
<paragraph
    title="15.2.46.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1780"
><![CDATA[<p>Where an agency has system users that send email from outside the agency’s network, an authenticated and encrypted channel MUST be configured to allow email to be sent via the centralised email gateway.<br><br></p>]]></paragraph>
<paragraph
    title="15.2.46.C.02"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1781"
><![CDATA[<p>Agencies SHOULD route email through a centralised email gateway.</p>]]></paragraph>
<paragraph
    title="15.2.46.C.03"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1782"
><![CDATA[<p>Where backup or alternative email gateways are in place, additional email gateways SHOULD be maintained at the same standard as the primary email gateway.</p>]]></paragraph>
</block>
<block title="Transport Layer Security (TLS)"><paragraph
    title="15.2.47.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security,TLS"


><![CDATA[<p>Email can be intercepted anywhere between the originating email server and the destination email server. Email transport between organisations and agencies is usually over the internet or other unsecured public infrastructure so it is important that email interception is carefully managed and suitable controls applied. One effective measure is to use TLS to encrypt the email traffic<strong> between email servers</strong>.</p>]]></paragraph>
<paragraph
    title="15.2.47.R.02."

    tags="Technical,Email,Email Infrastructure,Email Security,TLS"


><![CDATA[<p>Enabling TLS on the originating and accepting email server will defeat passive attacks on the network, with the exception of cryptanalysis against email traffic. &nbsp;TLS encryption <strong>between email servers</strong> will not interfere with email content filtering schemes. &nbsp;Email servers will remain compatible with other email servers as IETF’s RFC 3207 specifies the encryption as opportunistic</p>]]></paragraph>
<paragraph
    title="15.2.47.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security,TLS"


    classification="All Classifications"
    compliance="Must"
    cid="1786"
><![CDATA[<p>Agencies MUST enable opportunistic TLS encryption as defined in IETF’s RFC 3207 on email servers that make incoming or outgoing email connections over public infrastructure.</p>]]></paragraph>
<paragraph
    title="15.2.47.C.02"

    tags="Technical,Email,Email Infrastructure,Email Security,TLS"


    classification="All Classifications"
    compliance="Should"
    cid="1787"
><![CDATA[<p>Agencies SHOULD implement TLS between email servers where significant volumes of classified information are passed via email to other agencies.</p>]]></paragraph>
</block>
<block title="Mail transfer agent - strict transfer security"><paragraph
    title="15.2.48.R.01."


><![CDATA[<p>Where government-to-business and government-to-citizen communications require a higher level of transport security, organisations should consider implementing SMTP MTA Strict Transport Security (“MTA-STS”). MTA-STS provides organisations with a mechanism to encrypt communications between SMTP servers via TLS, preventing Person-In-The-Middle (PITM) attacks during email delivery.</p>]]></paragraph>
<paragraph
    title="15.2.48.R.02."


><![CDATA[<p>Organisations should verify the following prior to deploying MTA-STS:&nbsp;</p>
<ul>
<li>internet-facing mail relays support SMTP over TLS version 1.2 or later,</li>
<li>web server hosting the policy file supports TLS (HTTPS),</li>
<li>internet-facing mail relays use a TLS certificate issued by a root certificate authority that is not expired and matches its domain name.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.48.C.01."


    classification="All Classifications"
    compliance="Should"
    cid="7521"
><![CDATA[<p>Agencies SHOULD enable MTA-STS to prevent the unencrypted transfer of emails between complying servers.</p>]]></paragraph>
<paragraph
    title="15.2.48.C.02."


    classification="All Classifications"
    compliance="Must"
    cid="7522"
><![CDATA[<p>Agencies MUST use TLS 1.2 or above when implementing MTA-STS.</p>]]></paragraph>
<paragraph
    title="15.2.48.C.03."


    classification="All Classifications"
    compliance="Should"
    cid="7523"
><![CDATA[<p>Agencies SHOULD enable TLS reporting when implementing MTA-STS.</p>]]></paragraph>
</block>
<block title="Sender Policy Framework (SPF)"><paragraph
    title="15.2.49.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security,Sender Policy Framework"


><![CDATA[<p>The Sender Policy Framework (SPF) is an open standard specifying a technical method to prevent sender address forgery.<br>An SPF-protected domain is less attractive to spammers and phishers because the forged e-mails are more likely to be caught in spam filters which check the SPF record. Because an SPF-protected domain is less attractive as a spoofed address, it is less likely to be deny listed by spam filters and so is less disruptive to email traffic.</p>]]></paragraph>
<paragraph
    title="15.2.49.R.02."

    tags="Technical,Email,Email Infrastructure,Email Security,Sender Policy Framework"


><![CDATA[<p>Having a proper Sender Policy Framework (SPF) record increases the chances people will get emails you send. &nbsp;Without one, your email has a greater chance of being marked as Spam.</p>]]></paragraph>
<paragraph
    title="15.2.49.R.03."

    tags="Technical,Email,Email Infrastructure,Email Security,Sender Policy Framework"


><![CDATA[<p>SPF and alternatives such as Sender ID aid in the detection of spoofed email server address domains. &nbsp;The SPF record specifies a list of IP addresses or domains that are allowed to send mail from a specific domain. &nbsp;If the email server that transmitted the email is not in the list, the verification fails (there are a number of different fail types available).</p>]]></paragraph>
<paragraph
    title="15.2.49.C.01."

    tags="Technical,Email,Email Infrastructure,Email Security,Sender Policy Framework"


    classification="All Classifications"
    compliance="Must"
    cid="1792"
><![CDATA[<p>Agencies MUST:</p>
<ul>
<li>specify mail servers using SPF or Sender ID; and&nbsp;</li>
<li>mark, block or identify incoming emails that fail SPF checks for notification to the email recipient.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.49.C.02."

    tags="Technical,Email,Email Infrastructure,Email Security,Sender Policy Framework"


    classification="All Classifications"
    compliance="Must"
    cid="1793"
><![CDATA[<p>Agencies MUST:</p>
<ul>
<li>use a fail SPF record when specifying email servers; and&nbsp;</li>
<li>use SPF or Sender ID to verify the authenticity of incoming emails.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.49.C.03"

    tags="Technical,Email,Email Infrastructure,Email Security,Sender Policy Framework"


    classification="All Classifications"
    compliance="Should"
    cid="1794"
><![CDATA[<p>Agencies SHOULD refer to the SPF recommendations in IETF’s RFC 7208.</p>]]></paragraph>
</block>
<block title="DomainKeys Identified Mail (DKIM)"><paragraph
    title="15.2.50.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>DKIM enables a method of determining spoofed email content. The DKIM record specifies a public key that will sign the content of the message. If the signed digest in the email header doesn't match the signed content of the email the verification fails.</p>]]></paragraph>
<paragraph
    title="15.2.50.C.01"


    classification="All Classifications"
    compliance="Must"
    cid="1798"
><![CDATA[<p>Agencies MUST enable DKIM signing on all email originating from their domain.</p>]]></paragraph>
<paragraph
    title="15.2.50.C.02"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1797"
><![CDATA[<p>Agencies MUST use DKIM in conjunction with SPF.</p>]]></paragraph>
<paragraph
    title="15.2.50.C.03"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1799"
><![CDATA[<p>Agencies SHOULD verify DKIM signatures on emails received, taking into account that email distribution list software typically invalidates DKIM signatures.</p>]]></paragraph>
<paragraph
    title="15.2.50.C.04"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1800"
><![CDATA[<p>Where agencies operate email distribution list software used by external senders, agencies SHOULD configure the software so that it does not impair the validity of the sender’s DKIM signature.</p>]]></paragraph>
</block>
</subsection>
</section>
