7.8: Implement DMARC and Enable Receiver-Side Verification
To lower the chance of spoofed or modified emails from valid domains, implement Domain-based Message Authentication, Reporting and Conformance (DMARC) policy and verification, starting by implementing the Sender Policy Framework (SPF) and the DomainKeys Identified Mail (DKIM) standards.
Asset Type |
Security Function |
Implementation Groups |
---|---|---|
Network |
Protect |
2, 3 |
Dependencies
Sub-control 2.4: Track Software Inventory Information
Inputs
DMARC policy
TXT record published in DNS
The Mail Transfer Agent used by the organization (this could indicate DKIM is used to sign outgoing messages)
The Mail User Agent used by the organization (this could indicate DKIM is used to verify incoming messages)
Assumptions
The DMARC configuration policy includes instructions to produce either Aggregate (rua) or Forensic (ruf) reports.
The organization has access to these reports either daily (for Aggregate) or in real-time (for Forensic).
Operations
Examine the TXT records in DNS for a
v
value indicating DMARCExamine the TXT records in DNS for a
v
value indicating SPFExamine the TXT records in DNS for a
v
value indicating DKIM
Measures
M1 = 1 if Input 1 exists and Operation 1 indicates the use of DMARC
M2 = 1 if Operation 2 indicates the use of SPF
M3 = 1 if Operation 3 indicates the use of DKIM
Metrics
DMARC Usage
Metric |
Ensure usage and proper configuration of DMARC/SPF/DKIM
|
Calculation |
|