SI-08 Spam Protection
a. Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages; and
b. Update spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.
Baselines
- L
- M
- H
- P
Guidance
System entry and exit points include firewalls, remote-access servers, electronic mail servers, web servers, proxy servers, workstations, notebook computers, and mobile devices. Spam can be transported by different means, including email, email attachments, and web accesses. Spam protection mechanisms include signature definitions.
References 2
- SP 800-45 Tracy MC, Jansen W, Scarfone KA, Butterfield J (2007) Guidelines on Electronic Mail Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-45, Version 2.
- SP 800-177 Rose SW, Nightingale S, Garfinkel SL, Chandramouli R (2019) Trustworthy Email. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-177, Rev. 1.
Control Enhancements 3
- SI-08(01) Central Management
- SI-08(02) Automatic Updates L M H P
- SI-08(03) Continuous Learning Capability L M H P
Related controls 6
- PL-09 Central Management L M H P
- SC-05 Denial-of-service Protection L M H P
- SC-07 Boundary Protection L M H P
- SC-38 Operations Security L M H P
- SI-03 Malicious Code Protection L M H P
- SI-04 System Monitoring L M H P