7.10: Sandbox All Email Attachments

Use sandboxing to analyze and block inbound email attachments with malicious behavior.

Asset Type

Security Function

Implementation Groups

Network

Protect

3

Dependencies

  • Sub-control 2.1: Maintain Inventory of Authorized Software

Inputs

  1. The list of authorized software

Operations

  1. Enumerate all e-mail servers in the enterprise

  2. For each identified e-mail server, examine its configuration to ensure that either native attachment sandboxing is configured or that an external system is configured to be used for that purpose, noting appropriately and inappropriately configured servers

Assumptions

  • The majority of e-mail servers have appropriate configuration attributes to examine.

Measures

  • M1 = List of all e-mail servers in the enterprise

  • M2 = List of appropriately configured e-mail servers

  • M3 = List of inappropriately configured e-mail servers

  • M4 = Count of all e-mail servers in the enterprise (count of M1)

  • M5 = Count of appropriately configured e-mail servers (count of M2)

  • M6 = Count of inappropriately configured e-mail servers (count of M3)

Metrics

Coverage

Metric

The ratio of appropriately configured e-mail servers to the total number of e-mail
servers

Calculation

M5 / M4