Number | Title | Impact | Priority | Subject Area |
---|---|---|---|---|
SI-8 | Spam Protection | MODERATE | P2 | System And Information Integrity |
Instructions |
---|
The organization: SI-8a. Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and SI-8b. Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures. |
Guidance |
---|
Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, mobile devices, and notebook/laptop computers. Spam can be transported by different means including, for example, electronic mail, electronic mail attachments, and web accesses. Spam protection mechanisms include, for example, signature definitions. |
Enhancements | ||||||
---|---|---|---|---|---|---|
The organization centrally manages spam protection mechanisms.
The information system automatically updates spam protection mechanisms.
The information system implements spam protection mechanisms with a learning capability to more effectively identify legitimate communications traffic. |