Under active development Content is continuously updated and improved

SI-8Spam Protection

PBMM (P1)
Secret (P1)
Operational

>Control Description

(A) The organization employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages. (B) The organization updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.

>Supplemental Guidance

Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, mobile devices, and notebook/laptop computers. Spam can be transported by different means including, for example, electronic mail, electronic mail attachments, and web accesses. Spam protection mechanisms include, for example, signature definitions.

Related controls: AT-2, AT-3, SC-5, SC-7, SI-3

>Tailoring Guidance

Spam filters are increasingly relying on the reputation of the email originator. Consequently, these systems need to be continuously updated in order to be effective.

Ask AI

Configure your API key to use AI features.