Email Security Practices
Email remains the most exploited attack vector in enterprise and government environments, serving as the primary delivery mechanism for phishing, business email compromise (BEC), malware distribution, and credential harvesting. This page covers the technical controls, authentication standards, regulatory obligations, and service-sector classifications that define email security as a professional discipline. It maps the operational landscape for practitioners, compliance officers, and organizations evaluating protective measures against documented threat categories.
Definition and scope
Email security encompasses the policies, protocols, technical controls, and administrative procedures applied to protect email infrastructure from unauthorized access, message interception, malicious payload delivery, and sender identity fraud. As a domain of practice, it intersects with network security services listed in the cyber safety directory, identity management, data loss prevention, and regulatory compliance frameworks spanning multiple federal agencies.
The scope of email security practice is defined across four categories:
- Authentication and anti-spoofing — controls that verify sender identity and prevent domain impersonation
- Encryption and confidentiality — protocols that protect message content in transit and at rest
- Filtering and threat detection — systems that identify and quarantine malicious content before delivery
- Policy and compliance — regulatory mandates governing retention, disclosure, and minimum security standards
The Federal Trade Commission (FTC) and the Cybersecurity and Infrastructure Security Agency (CISA) both publish guidance framing email security as a baseline organizational control rather than an advanced capability. CISA's Known Exploited Vulnerabilities (KEV) catalog consistently includes vulnerabilities in email server software, underscoring the attack surface represented by messaging infrastructure.
Regulatory scope extends into sector-specific mandates: the Health Insurance Portability and Accountability Act (HIPAA) Security Rule (45 CFR Part 164) requires covered entities to implement technical safeguards for electronic protected health information (ePHI) transmitted via email. The Gramm-Leach-Bliley Act (GLBA) Safeguards Rule imposes comparable obligations on financial institutions.
How it works
Email security operates through a layered defense architecture in which multiple controls address distinct threat vectors at different points in the message lifecycle. No single control is sufficient; the layers are designed to compensate for individual failure modes.
Authentication protocols form the foundational layer:
- SPF (Sender Policy Framework) — A DNS TXT record that specifies which IP addresses are authorized to send mail on behalf of a domain. Receiving servers check SPF records to detect unauthorized senders.
- DKIM (DomainKeys Identified Mail) — Attaches a cryptographic signature to outgoing messages, allowing receiving servers to verify that message content was not altered in transit and that it originated from an authorized sender.
- DMARC (Domain-based Message Authentication, Reporting, and Conformance) — Builds on SPF and DKIM by specifying a policy (none, quarantine, or reject) for handling messages that fail authentication checks, and generating aggregate reports sent to the domain owner.
CISA's 2023 binding operational directive (BOD 23-01) required all federal civilian executive branch agencies to implement DMARC at enforcement policy (p=reject) — the strictest available setting. Google and Yahoo both announced in 2024 that bulk senders must have DMARC, SPF, and DKIM in place as a delivery prerequisite.
Encryption operates at two distinct layers:
- Transport Layer Security (TLS) — Encrypts the connection between mail servers, protecting messages in transit. NIST SP 800-52 Rev. 2 (NIST SP 800-52) establishes TLS 1.2 as the minimum acceptable version for federal systems, with TLS 1.3 preferred.
- End-to-end encryption (S/MIME or PGP) — Encrypts message content so that only the intended recipient can decrypt it. S/MIME relies on certificate infrastructure, while PGP uses a web-of-trust model. S/MIME is more common in enterprise environments because it integrates with Active Directory certificate services.
Filtering and gateway controls sit between the public internet and the internal mail server. Secure Email Gateways (SEGs) apply reputation analysis, content inspection, attachment sandboxing, and URL rewriting to intercept threats before delivery. Anti-spam frameworks draw on blocklists maintained by organizations including Spamhaus, a nonprofit DNS-based blocklist operator.
Common scenarios
Email security controls address distinct threat profiles that require different response mechanisms:
Business Email Compromise (BEC) — The FBI's Internet Crime Complaint Center (IC3) reported that BEC schemes generated over $2.9 billion in adjusted losses in 2023 alone, making it the highest-loss cybercrime category tracked by IC3. BEC exploits trust in organizational hierarchies by impersonating executives or vendors. DMARC enforcement and user awareness training are the primary mitigations.
Phishing and spear-phishing — Phishing delivers malicious links or attachments at scale; spear-phishing targets specific individuals with contextually tailored content. Gateway filters catch known malicious domains, but zero-day phishing infrastructure bypasses signature-based detection. Multi-factor authentication (MFA) limits credential theft impact even when phishing succeeds.
Malware delivery via attachments — Executable payloads, macro-enabled documents, and archive files (ZIP, ISO) are common delivery vehicles. Attachment sandboxing detonates suspicious files in an isolated environment before delivery. Microsoft's Antimalware Scan Interface (AMSI) integration in Office 365 provides an additional detection layer.
Data exfiltration via email — Insider threats and compromised accounts use email to extract sensitive data. Data Loss Prevention (DLP) rules — configured at the gateway level — can block or quarantine outbound messages containing patterns matching credit card numbers, Social Security numbers, or protected health information.
The directory purpose and scope page outlines how service providers addressing these threat categories are classified within this reference network.
Decision boundaries
Selecting email security controls requires matching the control type to the threat model and the organization's regulatory environment. Key decision points include:
DMARC policy level — A p=none policy generates reports but takes no enforcement action; it is appropriate during an initial audit phase. A p=quarantine policy routes failing messages to spam folders. A p=reject policy discards failing messages entirely. Moving from p=none to p=reject without a complete inventory of all sending sources will cause legitimate mail to be dropped. CISA's email security guidance recommends a phased deployment approach.
Gateway vs. native platform security — Organizations using Microsoft 365 or Google Workspace must decide whether the platform-native filtering (Microsoft Defender for Office 365, Google Workspace's built-in protections) is sufficient or whether a third-party SEG should sit in front of it. Third-party SEGs add a management layer and independent filtering logic; native controls offer tighter integration with the identity and access management stack.
S/MIME vs. PGP for end-to-end encryption — S/MIME requires a Public Key Infrastructure (PKI) and certificate issuance, making it better suited to organizations with existing Active Directory deployments. PGP requires key exchange between parties without a central authority, which reduces administrative overhead but complicates enterprise-scale key management.
Retention and legal hold obligations — HIPAA requires covered entities to retain documentation of security policies for 6 years from creation or last effective date (45 CFR § 164.316(b)(2)). The SEC's Rule 17a-4 imposes specific retention and immutability requirements on broker-dealer electronic communications. These obligations shape archival and DLP configuration decisions independently of threat-driven controls.
Organizations that handle email security incidents or require vendor assessment support can reference the how to use this cyber safety resource page for guidance on navigating available professional categories.
References
- CISA Email Security Guidance
- CISA Binding Operational Directive 23-01
- NIST SP 800-52 Rev. 2 — Guidelines for TLS Implementations
- NIST SP 800-177 Rev. 1 — Trustworthy Email
- FBI Internet Crime Complaint Center (IC3) — 2023 Internet Crime Report
- HHS — HIPAA Security Rule, 45 CFR Part 164
- FTC — Gramm-Leach-Bliley Act Safeguards Rule
- RFC 7208 — Sender Policy Framework (SPF)
- RFC 6376 — DomainKeys Identified Mail (DKIM)
- [RFC 7489 — DMARC Specification](https://www.rfc