1 Authentication Policy and Deployment Strategy for Financial Services Firms A PUBLICATION OF THE BITS SECURITY PROGRAM February 2013 BITS/The Financial Services Roundtable 1001 Pennsylvania Avenue NW Suite 500 South (202)
2 Table of Contents Executive Summary... 4 Background... 5 Historical Perspective on Security... 5 Emergence of DKIM and SPF... 5 Moving from Reactive to Proactive Security... 6 Introduction of DMARC... 6 Case Study for Authentication... 8 Very Large Bank... 9 Success Implementation Approach Five Phases of Deployment Business and Process Considerations Identifying and Engaging Stakeholders Business Units Enumerated Need Details Policies Implementing the Technology Recommendations Measuring Effectiveness Metrics BITS Trusted Registry Responding to External Threats: Investigations and Takedowns DKIM and SPF Implementation Guide What Is Authentication And Why Is It Important? How Does Authentication Work? General Considerations for Authentication Deployment Organizational Disciplines Departmental Organization and Participation Political Issues and Policy Determination Architectural and Technical Considerations Third-Party Senders... 31
3 Remote Employees Domain Segmentation Protecting Brand Domains That Do Not Send DomainKeys Identified Mail (DKIM) Implementation High-level Technical and Functional Overview Signing Versus Verifying Technical Implementation and Best Practices Sender Policy Framework (SPF) Implementation High-level Technical and Functional Overview Publishing Considerations The Forwarding Issue Considerations for the Joint Use of SPF and DKIM Implementation tradeoffs Combined DKIM/SPF use benefits Metrics and Reporting Signing Validity Gathering Spoofing Data Desirable Future Data Technical Implementation of DMARC DMARC Overview How DMARC Works: An Overview Anatomy of a DMARC Resource Record in the DNS Sender DMARC Implementation Appendix A Resources Appendix B Agari and Return Path Partnerships for Authentication Appendix C Acknowledgements... 54
4 Executive Summary The BITS Authentication Policy and Deployment Strategy for Financial Services Firms explains how financial institutions can leverage several protocols and tools to detect and reduce the number of spoofed messages that reach consumers and business partners. This paper was developed by the BITS Security Working Group and leverages previous papers published in 2007 and 2009, and collaboration among technology leaders in financial institutions, Internet Service Providers (ISPs), Service Providers (ESPs), and others to reduce the rampant spoofing of addresses. The paper discusses the Sender Policy Framework (SPF), Domain Keys Identified Message (DKIM), and Domain-based Message Authentication, Reporting & Conformance (DMARC) standards. Implementation of these standards provides a foundation for building complete end-to-end security solutions. is a critical communications channel for business today. Fraudsters, criminals, and others have learned how to create messages that appear to come from another sender. Brands are regularly and effectively abused by criminals who impersonate, or spoof, addresses and Internet domains of financial services and other companies. In a practice known as phishing, spoofed messages are sent in an attempt to persuade individuals to provide confidential personal or company information to the spoofer. This information is then used to commit identity theft, gain unauthorized access to computer systems, and other criminal acts. Brands are regularly and effectively abused by criminals who spoof addresses and Internet domains of financial services and other companies. security has been a challenge, especially when considering the original usage of the technology and the lack of security controls when was first created in 1971 to allow researchers to collaborate over the Advanced Research Projects Agency Network (ARPANET). At the time, security was not a priority because communications occurred among a closed group of people over a trusted network. Today, is ubiquitous, travels across the open and unsecured Internet, and has become essential to personal, consumer-to-business, and business-to-business communications. This paper is designed as a guide for information security professionals to assist in developing policies and procedures to implement the DMARC, SPF and DKIM protocols, and to leverage tools such as the Trusted Registry. It discusses strategies for developing policies and procedures and working with ISPs and ESPs, coordinating within large financial institutions to effectively implement these protocols, and the benefits of adopting these protocols and metrics for measuring success. Benefits include: Significant reduction in fraudulent to customers and prospective customers Reduction in phishing attacks against high-value/trusted domains Increase in customer/partner confidence and trust in the authenticity of the sender s Enhanced brand and reducing the exposure of customers to phishing attacks that could lead to fraud or malware infection.
5 Background As has evolved and become a ubiquitous business communication channel, the BITS Security Working Group has actively tracked new developments and made recommendations to members on best practices. This paper provides information about the BITS Trusted Registry 1 and guidance on how organizations can take advantage of new functionality to detect and reduce the number of spoofed messages that reach consumers and business partners. Historical Perspective on Security security has been a challenge, especially when considering the original usage of the technology. Modern using a computer network was first established in 1971 to allow researchers to collaborate over the Advanced Research Projects Agency Network (ARPANET). At the time, security was not a priority because communications occurred among a closed group of people over a trusted network. Today, is ubiquitous, travels across the open and unsecured Internet, and has become essential to personal, consumer-to-business, and business-to-business communications. Credit card numbers, social security numbers, intellectual property, and more are sent using a technology that was never designed to be secure. Figure 1 Merged Feedback Version Lacking authentication, ISPs are unable to reliably determine the legitimacy of . Pranksters, criminals, and others have learned how to create messages that appear to come from another sender. In a practice known as phishing, spoofed messages are sent in an attempt to persuade individuals to provide confidential personal or company information to the spoofer. This information is then used to commit identity theft, gain unauthorized access to computer systems, and other criminal acts. Emergence of DKIM and SPF Efforts to reduce the rampant spoofing of addresses began in earnest in the early 2000s and resulted in the development of the Sender Policy Framework (SPF) in SPF provides a method 1 The BITS Trusted Registry provides complimentary domain-specific reports to our member companies that will help an institution strengthen the security of its channel and reduce enterprise and consumer risks.. Information is available at
6 that allows domain owners to publish lists of servers authorized to send s on behalf of their domains, granting receivers the ability to check s against the authorized lists and easily detect fraudulent messages. Several approaches based upon digital signatures emerged in 2004 and culminated in the 2007 DomainKeys Identified Message (DKIM) standard. While SPF and DKIM provide critical first steps towards improving security, the effectiveness of these authentication efforts is limited due to a lack of visibility as to who is sending on behalf of an organization and the lack of active policy enforcement to ensure receiving service providers, such as Google and Yahoo, are rejecting or quarantining suspicious messages. Figure 2 Merged Feedback Version With authentication, ISPs can begin to determine the legitimacy of and reduce the volume of delivered fraudulent . Moving from Reactive to Proactive Security In the past, detection of phishing attacks relied on mail receivers (ISPs) ability to perform statistical analysis of large volumes of . Unfortunately, most of the damage of a phishing campaign is inflicted in the first few hours of an attack when volumes remain low enough to avoid detection by statistical analysis. The time difference between the initial phishing attack and eventual detection forced organizations to respond reactively to phishing attacks, with response coming in the form of remediating compromised accounts, cleaning up damage, and mitigating the breadth of phishing attacks by attempting to shutdown infrastructure involved in an attack. Introduction of DMARC In January 2012, a consortium of senders and receivers sought to address the continued spoofing of high-value or trusted Internet domains by publishing a new specification: Domain-based Message Authentication, Reporting & Conformance (DMARC). DMARC-based solutions, such as the Trusted Registry, provide organizations with Internet-wide visibility into both legitimate and malicious usage of an organization s domains, as well as the ability to direct receivers of s to enforce quarantine or reject policies against malicious messages. The DMARC
7 specification leverages the established technologies of SPF and DKIM and provides a foundation for building complete end-to-end security solutions. The DMARC specification builds upon the successful prototype of an industry leading payments provider and is the result of a collaborative effort between key members of the ecosystem. DMARC relies on SPF and DKIM to determine the authenticity of messages. When authenticity cannot be established, a DMARC policy can cause inauthentic messages to be blocked before reaching the inbox. Senders using DMARC see an increase in the value of communication through a significant reduction in the viability of phishing attacks against high-value/trusted domains and an increase in customer/partner confidence in the authenticity of the sender s . The Trusted Registry provides a convenient way to coordinate and visualize DMARC activity across all of an institution s domains and brands. Figure 3 Merged Feedback Version Audit/Detect/Remediate Phase.
8 Case Study for Authentication In April of 2007, the BITS Security Working Group created a whitepaper titled BITS Security Toolkit: Protocols and Recommendations for Reducing the Risks. The paper described technologies and methods companies could use to mitigate the risks associated when using to conduct business. Although the paper s core recommendations and observations remain relevant today, the ecosystem has evolved alongside increasingly sophisticated criminal attacks against institutions and consumers. Figure 4 Merged Feedback Version Secure (Blocking) Phase. Criminals have been relentlessly exploiting s weaknesses causing the amount of spam and phishing to dramatically increase. The Gartner Group reports a 700% increase in -based phishing between , with 67% of those attacks targeting financial services and payment firms, costing consumers and companies close to $8 billion. The estimated cost to victims by a single phishing campaign is more than $1.4 million [Cyveillance (December, 2008)]. Credential theft also occurs very quickly. For example, of all the credentials successfully obtained through criminal phishing attacks, 50% are harvested in the first 60 minutes of a campaign [Trusteer]. The prevalence of phishing attacks has caused a decline in consumer trust of . In a 2010 Identity Theft Resource Center survey, 81% of consumer respondents cited phishing s as a significant concern relating to the security of their personal and financial information when conducting online transactions. continues to play a role as a significant propagation vector in the spread of malware, causing 54 million U.S. adults in 2011 to report desktop malware infections. The Gartner Group estimates that more than 40% of U.S. consumers have altered their level of trust in messages and online shopping as a result of this continuing threat (see Figure 5).
9 Figure 5 Security concerns have affected behaviors, Gartner Group. Traditionally, authentication has been an unreliable method of determining legitimacy due to complexities of deployment inconsistencies, gaps in coverage, and reliability concerns. As a result, consumer mailbox providers (Hotmail/Outlook.com, AOL, GMail, Yahoo! Mail) have been unable to leverage authentication technologies when evaluating that otherwise appears to be legitimate messages that are likely to be phishing attacks designed to fool consumers. Very Large Bank To illustrate a success story, a BITS member has provided the following case-study so that others may learn from their experience in coordinating within a large organization the deployment of authentication technology and policies. This institution, hereafter known as Very Large Bank (VLB) had participated in the drafting of the 2007 BITS whitepaper. The widely circulated paper influenced numerous banks and other financial service organizations (including VLB s senior management) to adopt many of its recommendations. Despite these positive steps, the problem of trust-eroding phishing attacks continued to worsen. VLB decided in 2011 to launch a project to address the problem of consumer phishing. Figure 6 VLB Merged Feedback Version Threat Intelligence Phase.
10 Data for the initial business case was based on an early estimate of 600,000 annual s sent by unauthorized third parties that purported to be VLB. Unauthorized third-party sources were located in almost every country, despite VLB having no business operation in most countries. Annually, VLB sent approximately 4 billion legitimate s, forcing customers and potential customers to determine which 20% (1 in 5) of the s purporting to be VLB were fraudulent. The large volume of unauthorized competed with legitimate VLB for consumers attention and caused significant brand erosion as consumers lost confidence in the channel. To meet business case requirements, the VLB project sought to meet three specific objectives: Improve the customer s experience by eliminating fraudulent and resulting phishing and malware attacks Lower customer service call volume attributed to phishing attacks Enhance the VLB brand by improving campaign results Eliminating fraudulent required enabling receivers with a way to easily identify legitimate VLB by implementing SPF and DKIM across all legitimate streams. Discovering the sources of all legitimate streams can be problematic as large companies such as VLB often consist of multiple lines of business. Each line of business can communicate directly with customers via , employ third-party Service Providers (ESPs) to send on behalf of the business, or partner with small consulting or marketing operations that send on behalf of the business. The VLB project team leveraged vendor-provided intelligence to identify the sources of all sent to consumers using VLB-owned domains. Based on this intelligence, VLB identified lines of businesses, ESPs, and third parties sending on behalf of VLB. As the project progressed, the process of discovering legitimate sources was occasionally complicated by ESPs using other third parties to deliver , individuals sending using residential networks while working from home, and the presence of external campaign management software platforms used both by VLB staff and third parties that originated to customers and prospects. During the process of installing controls to eliminate fraudulent , the project team contacted ISPs and asked them to only deliver that originated from an authenticated VLB domain. Based on this action, the project team identified several third parties that sent low volumes of legitimate on behalf of VLB that had not been made aware of the project s domain authentication requirements. To address needs for ongoing internal education, the project team implemented a communications plan to inform all line of business marketing groups and product teams of the new requirements for authentication. Marketing teams quickly recognized the potential benefits of the project and worked with their contracted ESPs to implement the necessary changes. VLB was then able to notify all ISPs of the policy to drop purporting to be from VLB-owned domains that failed authentication checks.
11 During the execution of the project, the DMARC.ORG working group produced a draft specification to allow domain owners to request quarantine or rejection of unauthenticated . The DMARC specification, published in January 2012, standardizes the SPF, DKIM, and policy deployment model implemented by the VLB project team during Success As of late 2012, VLB has eliminated close to 90% of fraudulent to customers and prospective customers using VLB-owned domains, significantly enhancing the VLB brand and reducing the exposure of VLB customers to phishing attacks that would otherwise lead to fraud or malware infection. This is likely to increase as additional ISPs implement DMARC (with most large ISPs expected to be DMARC-compliant at the end of 2012). The VLB project team is currently seeking to determine the specific benefit of -based brand protection by measuring the potential lift in response rates due to fraud reduction. The elimination of fraudulent is now easy to measure due, in large part, to the feedback mechanisms provided by DMARC, and is available in an enhanced form through the BITS Trusted Registry. VLB s project required an active internal communication program to reach and work with the diverse service providers that originated on behalf of VLB. Based on the success of the communication program, various marketing teams requested to directly participate in the project. Figure 7 VLB Authenticated Controls.
12 Implementation Approach To implement controls based on authentication, financial services organizations can adopt a deployment lifecycle consisting of five phases. A summary of each phase appears below. Please note that this document focuses primarily on outbound authentication, or from the financial services organization to customers and business partners. The equally important subject of inbound authentication is out of scope of this paper. Five Phases of Deployment Monitor Audit Secure Detect Remediate Figure 8 The Five Phase Deployment Lifecycle. Audit: The Audit phase consists of creating an inventory of an organization s domains, streams, and types. The domain inventory includes all domains actively sending as well as inactive domains registered for defensive or brand protection purposes. Active domains can contain multiple streams originating from different groups or vendors. streams can contain different types of messages (e.g., transactional, corporate, marketing). Domains, streams, and types must be discovered and tracked in order to implement controls. While most of this information can be found through in-house research, DMARC-provided data and/or the Trusted Registry can augment in-house research and reduce the cost of discovering streams. Detect: The Detect phase compares and contrasts real-world data against the organization s stated authentication implementation strategy. The result of this analysis directly informs the next phase. Remediate: The Remediate phase aims to resolve any authentication implementation issues or operational issues uncovered during the Audit or Detect phases. During this phase, all issues with authorized senders should be corrected to ensure that quarantine or reject policies can be enforced without impacting the delivery of legitimate .
13 Secure: During the Secure phase, blocking policies are implemented for both active and inactive domains. Publishing a blocking policy allows participating ISPs to either quarantine or reject unauthenticated on behalf of the organization, allowing only legitimate to be delivered to end-users. Monitor: Successful implementers continuously monitor their deployment state, looking for new signs of abuse, operational issues with authorized senders, changes in network topology, and other anomalies. Monitoring can be performed in-house or through a vendor. Abuse such as new phishing campaigns will show up in the reporting and can be turned over for investigation and takedown. Operational issues can consist of newly hired third party senders, company acquisitions, new or replacement servers, and changes to DKIM signatures and SPF records. An organization can begin implementing authentication by following the five phases in the presented order. The phases also represent an on-going process that can be used to maintain an implementation after initial deployment. The continuing process can be used to detect, remediate, and secure streams that change due in a fluid business and technology environment. For example, as new products and services are introduced, contracts with third-party senders begin and end, portions of the business are sold off or acquired, or threats from bad actors appear on the scene, existing implementations will need to be updated.
14 Business and Process Considerations Identifying and Engaging Stakeholders Technical and business groups within a company must incorporate authentication into their policies and procedures in order to successfully implement and operate these technologies. Business Units Business units or product teams are usually responsible for the use of communications related to their product or service, acting as the source of internal funding to support these operations and as the arbiter of business risk decisions affecting the product. Depending on the size of the company, business units may be focused around single products or services, ranges of products and services, or be comprised of a number of different product teams. Business units must be made aware of the damage that phishing has on their products and on the company brand as a whole, and of the measures that can be taken to combat this threat. Business units will often champion authentication efforts that can be shown to improve communication with customers and partners. Marketing / Brand Management In many organizations, marketing groups maintain overall responsibility for developing, delivering, and determining the effectiveness of communications to customers, clients, and prospects. remains an important conduit for communicating to these various audiences. Marketing groups are often responsible for the day-to-day business management of both third-party service providers and in-house capabilities for both bulk and transactional communications. As such, marketing groups are key partners in interfacing with vendors in the implementation of authentication. Marketing groups may find significant value in monitoring the general health of their channels through feedback mechanisms such as provided by DMARC and the Trusted Registry. As a brand-strengthening activity, organizations often seek to communicate directly with customers regarding improvements to security and reliability. Marketing groups, in partnership with or on behalf of business units and product teams, are often the best coordinators for developing and delivering these messages. In addition, marketing groups may help promote consistent policies and usage of authentication across the organization, and serve as a clearinghouse for internal education. Customer Service Customer service teams are important stakeholders in any security deployment initiative since they are the first line of engagement with customers. Customer service teams can help spread awareness and education regarding the implementation and meaning of security measures to customers. This function is critical during periods when authentication is being introduced, especially as established practices may unexpectedly break during a transition period. For example, customer use of alumni or affiliate addresses may cause to be blocked due to strict blocking policies and poor forwarding implementations. Frontline customer services teams should
15 be supplied with training and materials to explain how these initially inconvenient measures benefit customers in the long run, and how to address issues in the short term. Engineering / Operations engineering is responsible for the deployment and operation of infrastructure operated within an organization. Responsibilities include operation of externally facing Message Transfer Agents (MTAs), internal servers (such as Microsoft s Exchange), and other related systems within the traffic flow. This function may be responsible for monitoring and managing externally hosted service providers, including fully outsourced employee (e.g. Google Apps, Microsoft Office 365) and bulk mail providers (e.g. Acxiom, Epsilon, ExactTarget) as well as consultative support to business partners utilizing these service providers. In the context of this document, engineering is responsible for supplying addresses for SPF records, implementing DKIM on managed MTAs, and providing public keys to DNS engineering for publication. This group may also provide analytical support for reviewing DMARC reports and making corrective actions as appropriate. Network / DNS Engineering Network/DNS engineering is responsible for managing the Domain Name System records for an organizations registered domains. This includes publishing and updating SPF records, associated DKIM keys, and DMARC records for all sending domains. Network engineering may also publish null (empty) SPF records and DMARC reject policies for non-sending domains to address domain hijacking concerns. IT Risk and Compliance The following functions can span across multiple areas of an enterprise: vendor management, fraud/investigations, and security operations. Vendor Management Companies increasingly rely on vendors to provide service solutions. This may include administrative (corporate) as well as marketing and other external communications. Vendor contracts should contain language requiring support for the organization s authentication deployment policy and contain clear escalation paths should problems be identified from either partner. Fraud / Investigations Corporate fraud and associated investigation teams may find the feedback reporting resulting from the deployment of authentication protocols, especially DMARC, an important source of intelligence related to investigating fraudulent activity. Phishing and other -borne attacks are commonly used to both defraud customers and also gain footholds in corporate networks. Aggregated and real-time reporting can provide valuable information on the source of attacks and ways to counteract them.
16 Security Operations Some organizations may integrate security operations with fraud investigation teams. For purposes of this paper, the security operations function manages detective and preventative controls to protect corporate assets, particularly those related to IT. Security operations will most likely find value in the added detective capabilities as well as the customer and employee protective capabilities provided by security and authentication. Marketing/Brand Mgmt Customer Service Operations Infrastructure IT Risk & Compliance Vendor Management Fraud / Investigations Security Operations 1 General Awareness - Inside 2 Awareness Material - Customer 3 Implementation Strategy 4 Technical Deployment Details 5 Security Metrics / Reports 6 Operational Documentation 7 Data Taxonomy 8 Training 9 Asset Inventory High Need Moderate Need Low or No Need Figure 9 Role of Various Business Teams in DMARC Implementation. Enumerated Need Details The following is a list of actions that may be taken to build a strong authentication program within an organization and forms the basis for cultural change to increase the likelihood of success over the long-term. Marketing Awareness: The value security provides to both financial institutions and their customers are significant. Vendor Engagement: Develop plans to deploy security mechanisms with existing vendors and ensure future vendors support these tools from day one. Marketing should also be the business gatekeeper to ensure appropriate oversight of all communication engagements. Customer Messaging for Security: Develop talking points and customer FAQs related to the deployment of security which may be shared with customers and clients.
17 Security Metrics: Partner with appropriate IT and/or risk staff to develop security metrics defining the health of the channel which will assist in better managing that resource. Customer Service Awareness: The implementation activities around security that may change the customer experience (e.g. my forwarded s are being blocked ). Training: How to answer customer questions regarding how to determine if an is legitimate. This may include training on the mechanisms deployed at major ISPs which may leverage authentication (e.g., new User Interface (UI) indicators). Engineering / Operations Inclusion in Planning: engineering should be included at the outset in any planning and deployment of authentication mechanisms. engineering provides expertise as to the capabilities of various platforms used in relation to authentication, both inbound and outbound. Awareness: Raise awareness of business objectives related to authentication. Providing business context can help engineering to solve business problems and reduces the risk of inefficiently using finite organizational resources. Data Analysis: Collect and analyze report data (both real-time and aggregate). engineering should be provided with access to tools to fulfill this responsibility. Service Management: Develop Service Level Agreements (SLAs) for making platform changes in support of authentication, including business changes and tactical changes addressing operational criteria and incidents. Network / DNS Engineering Domain Identification: Understand and document domain(s) subject to authentication. Service Management: Service Levels for DNS-related changes for authentication (e.g. changes to SPF, DKIM keys, DMARC policies) DNS Management: Coordination of DNS changes for domains with delegated authority, such as may be in place with mail service providers. Documentation: Operational documentation on the interpretation of authentication reports and response actions to address identified issues. Vendor Management Vendor Identification: Maintain an inventory of all vendors which may provide services directly (marketing companies) or supplemental to their core services (e.g. CRM, customer services, benefits, etc).
18 Vendor Communication: Document and convey to identified vendors expected best practices to develop and maintain high levels of reputation to support deployed authentication mechanisms. Service Management: Develop and incorporate into business agreements expected Service Level Agreements (SLAs) for important actions supporting security. SLA items should include problem resolution timelines dependent on defined severities, change requests (SPF and DKIM record changes, DKIM key rotation, DMARC policy changes if not administered internally). Service Reporting: Define and document methods to deliver ongoing authentication reporting relevant to any given vendor. Fraud/Investigations Reporting: Access to regular and ad-hoc reporting capabilities, if available, related to authentication results. Training: Training on the interpretation of provided reporting. Training on tools, both internally developed and sourced as services, supporting the security program. Security Operations Reporting: Access to regular and ad-hoc reporting capabilities, if available, related to authentication results. Training: Training on the interpretation of provided reporting. Training on tools, both internally developed and sourced as services, supporting the security program. Identification of Traffic Patterns: Profiles of normal activity by source including volumes. Vendor Interaction: Operational contact information with sending vendors. Work with other security service providers, including integration of authentication data with phishing mitigation providers. Policies Successful authentication deployments are achieved when organizations develop clear and consistent policies across the entire enterprise. Clear and consistent policies allow various stakeholders to coordinate activities between functions, maximizing the benefits of authentication while minimizing organizational friction. This section briefly touches on areas of governing policies to situate the additional policies needed to support authentication. Correspondence Versus Transactional When the Internet was first opened to commercial use, companies commonly created one domain and used it for all communications business correspondence, customer communications, transactional , etc. Companies largely continue to operate this way today, and often establish separate domains or sub-domains to separate general correspondence from transactional .
19 Separation may be done to simplify management and administration, to support regulatory compliance and discovery, or to reflect internal administrative borders. Domain / Sub-Domain Policies Many companies initially allowed different internal groups to register new Internet domains with little oversight or coordination. Over the course of several years, companies amassed large portfolios of domains ranging from exact matches of major brands, to unwieldy constructs of product names, business units, and overall brands. The variety of formats and conventions used to register domains undermined customer attempts to discern imposters from legitimate senders, and on the whole caused an increase in the attack surface for criminals trying to impersonate these companies. Companies should employ consistent policies regarding how to map brands to domain names. Policies may dictate when to create a sub-domain within a brand/domain for a new product or service, versus creating a new Internet domain to support an advertising campaign lasting only a few months or quarters. Overall brand management and marketing controls heavily influence policies governing domains, and can vary greatly from company to company. Consistent From Addresses The sending address and name shown on coming from a company is part of the overall impression a message delivers. Companies invest tremendous amounts of time and energy to create and standardize logos and related colors, often concurrently standardizing policies to establish consistency of sending addresses. Two different parts of the From line should be considered the address itself and the display name (often called the friendly from ). An example of an address is and an example display name is John Q Smith, Mortgage Services. Consistency allows customers to recognize and trust legitimate communications. Lastly, consistent use of From addresses greatly eases the deployment of controls based on authentication. Similar consideration should go into computer generated alert messages, marketing campaigns, and other transactional communications. Message Content Policies The composition and design of the content is often standardized within product groups, and, depending on the company, across the enterprise. This is an extension of branding and communications practices employed to create effective customer interaction. Depending on the organization or business unit, these practices may be extended to correspondence. An often overlooked facet of content policy is the use of domain names in the hyperlinks and graphical elements within the body. containing links pointing to several different domains can lead to the classification of such as spam. Ideally, all elements of an will
20 reference the same domain (or sub-domain), regardless if those elements are visible to the recipient. An element containing an Internet domain, whether seen by the recipient or not, would optimally use the same domain, or be sub-domains of the same parent domain. Domain Inventory Organizations possessing more than a few Internet domains should establish a central inventory where individual domain status can be tracked. This inventory should identify all groups within the organization that use the domain or sub-domain, regulatory status, whether the domain is considered to be in a production state, the technical groups responsible for the operation of the domain, etc. This inventory should be expanded to include the status of authentication measures implemented for all domains. Static domain inventories quickly become outdated and therefore useless. Companies should modify processes and activities that result in the creation of new domains or sub-domains to require those domains to be added to a centralized domain inventory. This requirement should apply to any unit within the enterprise, as well as third parties that may manage domains or sub-domains on behalf of the company. Authorized Third Parties At some point, most companies will engage a third party to send on their behalf. Contracts with such entities should include provisions requiring third parties to implement any requisite authentication measures and to provide updates on operational matters that may impact any of these measures or delivery. For example, if an ESP begins sending for a company from a different IP address without notification, sent from the new IP address could fail authentication, impact delivery, and potentially disrupt business. Third parties may be required to use addresses within one of the company s domains, a separate product or campaign-specific domain, or a sub-domain of one of the company s domains. The exact arrangement depends on the third party s capabilities and will constrain a company s operational options, such as how to maintain or delegate control of DNS, how the necessary records are published, and where reporting and analysis occur. Stakeholders should be aware of the operational implications of these arrangements on change control, coordination of activity between operations groups at each company, security and risk calculations, etc. Domains and sub-domains used by third parties should always be included in the domain inventory. Additional fields may be necessary to track external contacts, the business unit responsible for the performance of the vendor, and the party managing the relationship. Organizational Domains and Different Policies for Sub-Domains In order to distinguish example.com from the top-level Internet domain.com, DMARC refers to the domain owned by an sender as the Organizational Domain (OD). Organizations typically publish a DMARC policy at the Organizational Domain level. If sub-domains are in use, sub-domains would
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
Protect your brand from phishing emails by implementing DMARC 1 Message from the Certified Senders Alliance supported by AOL, Microsoft and Google In the following article we want to clarify why marketers
June 27, 2012 Defining DMARC A New Way For Emailers To Defend Themselves Against Email Fraud by Shar VanBoskirk with Sarah Glass and Elizabeth Komar Why Read This Report Hundreds of brands are hijacked
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC
THE DMARC GUIDE Understanding DMARC for Securing Email The History - Introduction Email despite its importance, ubiquity, and staying power has never been secure. Prior attempts at security have failed
Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Phishing: Facing the Challenge of Email Identity Theft with Proper Tools and Practices A Leadfusion White Paper 2012 Leadfusion, Inc. All rights reserved. The Threat of Phishing Email is an indispensable
Anti-Phishing Best Practices: Keys to Aggressively and Effectively Protecting Your Organization from Phishing Attacks Prepared by James Brooks, Senior Product Manager Cyveillance, Inc. Overview Phishing
Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
The What, Why, and How of Email Authentication by Ellen Siegel: Director of Technology and Standards, Constant Contact There has been much discussion lately in the media, in blogs, and at trade conferences
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
WHITE PAPER The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks A Cyveillance Report October 2008 EXECUTIVE SUMMARY How much do phishing attacks really cost organizations?
Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Implementing the latest anti-virus software and security protection systems can prevent many internal and external threats. But these security solutions have to be updated regularly to keep up with new
EFFECTIVE PERSONALISED PRINT AND E-COMMUNICATION SOLUTIONS DESIGNED WITH YOU IN MIND DSTSYSTEMS.CO.UK DST EMAIL Product FAQs version 01 Thank you for using our products. DST UK www.dstsystems.co.uk DST
StopBadware s Best Practices for Web Hosting Providers: Responding to Malware Reports Introduction Malware poses a serious threat to the open Internet; a large and growing share of malware is distributed
Best Practices: Corporate Online Banking Security These Best Practices assume that your organization has a commercially-reasonable security infrastructure in place. These Best Practices are not comprehensive
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
THE TRUSTED GATEWAY A simple strategy for managing trust in a diverse portfolio of domains Author: Gunter Ollmann, CTO INTRODUCTION Managing a corporate presence and associated transactional businesses
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...
How to select the right Marketing Cloud Edition Email, Mobile & Web Studios ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire customer lifecycle
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
SPEAR-PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM WHITE PAPER RECENTLY, THERE HAS BEEN A RAPID AND DRAMATIC SHIFT FROM BROAD SPAM ATTACKS TO TARGETED EMAIL-BASED-PHISHING CAMPAIGNS THAT
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX How to create a thriving business through email trust FORWARD Today the role of the CISO is evolving rapidly. Gone are the days of the CISO as primarily
Advanced Security Methods for efraud and Messaging Company Overview Offices: New York, Singapore, London, Tokyo & Sydney Specialization: Leader in the Messaging Intelligence space Market focus: Enterprise,
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Contents INTRODUCTION: UNDERSTANDING HOW ALIGNING DESKTOP SECURITY AND
Internet Reputation Management Guidelines Building a Roadmap for Continued Success Table of Contents Page INTERNET REPUTATION MANAGEMENT GUIDELINES 1. Background 3 2. Reputation Management Roadmap 5 3.
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Migrating to.bank A step-by-step roadmap for migrating to.bank 11/19/2015 Advanced.BANK Webinar for ICBA Members 1 Webinar Presenters Craig Schwartz ftld Registry Managing Director Managing.BANK and.insurance
WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk A Hootsuite & Nexgate White Paper Mapping Organizational Roles & Responsibilities for Social Media Risk Executive Summary
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Securing Remote Vendor Access with Privileged Account Security Table of Contents Introduction to privileged remote third-party access 3 Do you know who your remote vendors are? 3 The risk: unmanaged credentials
Smartphones and tablets are invading the workplace along with the security risks they bring with them. Every day these devices go unchecked by standard vulnerability management processes, even as malware
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Operationalizing Threat Intelligence. Key Takeaways Time is becoming more and more compressed when it comes to protecting the enterprise Security teams must be able to rapidly and effectively translate
EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email
Fraud Investigation and Education FIS www.fisglobal.com Phishing What is it? Phishing is a technique used to gain personal information for purposes of identity theft, using fraudulent e mail messages that
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
A BUSINESS CASE FOR BEHAVIORAL ANALYTICS White Paper Introduction What is Behavioral 1 In a world in which web applications and websites are becoming ever more diverse and complicated, running them effectively
How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Email Marketing Deliverability: Getting into the Inboxes of Healthcare Professionals A Primer On Healthcare Email Marketing Part I Imagine you ve carefully crafted and designed a fantastic email marketing
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
DMARC and your.bank Domain September 2015 v EMAIL MAKES IT EASY FOR CRIMINALS TO REACH YOUR CUSTOMERS USING YOUR BRAND Phishing and brand abuse erode consumer trust Attacks cause lasting brand damage Fallout
Lending Clarity to Security Risk Definitions by Dave Piscitello and Greg Aaron In its Beijing Communiqué of 11 April 2013, the ICANN Government Advisory Committee (GAC) called on ICANN to have new gtld
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Your consent to our cookies if you continue to use this website.