7.8: Implement DMARC and Enable Receiver-Side Verification

To lower the chance of spoofed or modified emails from valid domains, implement Domain-based Message Authentication, Reporting and Conformance (DMARC) policy and verification, starting by implementing the Sender Policy Framework (SPF) and the DomainKeys Identified Mail (DKIM) standards.

Asset Type

Security Function

Implementation Groups

Network

Protect

2, 3

Dependencies

  • Sub-control 2.4: Track Software Inventory Information

Inputs

  1. DMARC policy

  2. TXT record published in DNS

  3. The Mail Transfer Agent used by the organization (this could indicate DKIM is used to sign outgoing messages)

  4. The Mail User Agent used by the organization (this could indicate DKIM is used to verify incoming messages)

Assumptions

  • The DMARC configuration policy includes instructions to produce either Aggregate (rua) or Forensic (ruf) reports.

  • The organization has access to these reports either daily (for Aggregate) or in real-time (for Forensic).

Operations

  1. Examine the TXT records in DNS for a v value indicating DMARC

  2. Examine the TXT records in DNS for a v value indicating SPF

  3. Examine the TXT records in DNS for a v value indicating DKIM

Measures

  • M1 = 1 if Input 1 exists and Operation 1 indicates the use of DMARC

  • M2 = 1 if Operation 2 indicates the use of SPF

  • M3 = 1 if Operation 3 indicates the use of DKIM

Metrics

DMARC Usage

Metric

Ensure usage and proper configuration of DMARC/SPF/DKIM

Calculation

M1 AND M2 AND M3