SI-8 - Spam Protection
Control requirements
SI-8 (a)
Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages.
SI-8 (b)
Update spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.
Additional IBM Cloud for Financial Services specifications
The organization must send email to or on behalf of the customer, in accordance with customer requirements including the following:
- Email must be sent in accordance with Domain-based Message Authentication, Reporting & Conformance (DMARC) to protect their domain from unauthorized use (i.e., email spoofing).
- Organization senders using customer domains, must use a subdomain in the message From header, as opposed to a top level domain.
- Organizations must provide customers with the needed information (including any changes) for customers to publish Domain Keys Identified Mail (DKIM) and Sender Policy Framework (SPF) records for the assigned subdomain.
- DKIM key must be 1024 bits in length.
NIST supplemental guidance
System entry and exit points include firewalls, remote-access servers, electronic mail servers, web servers, proxy servers, workstations, notebook computers, and mobile devices. Spam can be transported by different means, including email, email attachments, and web accesses. Spam protection mechanisms include signature definitions.