Skip to main content
โ† All controls
CIS-9.5 / SC-7 / A.9.1.2 CIS Controls v8

Email security: SPF + DKIM + DMARC + ATP

Demonstrate that the organization has deployed and properly configured SPF, DKIM, DMARC, and ATP mechanisms to authenticate legitimate email, reject or quarantine spoofed messages, and protect users from advanced email-borne threats.

Description

What this control does

This control implements a layered email authentication and threat protection framework combining Sender Policy Framework (SPF) to authorize sending mail servers, DomainKeys Identified Mail (DKIM) to cryptographically sign messages, Domain-based Message Authentication Reporting and Conformance (DMARC) to enforce policy and provide reporting on authentication failures, and Advanced Threat Protection (ATP) to detect and block sophisticated phishing, malware, and impersonation attacks in real-time. Together, these technologies prevent domain spoofing, verify email integrity, provide visibility into abuse attempts, and block advanced threats before they reach user inboxes. Implementation reduces successful phishing attacks, protects brand reputation, and provides forensic data on email-based attack campaigns.

Control objective

What auditing this proves

Demonstrate that the organization has deployed and properly configured SPF, DKIM, DMARC, and ATP mechanisms to authenticate legitimate email, reject or quarantine spoofed messages, and protect users from advanced email-borne threats.

Associated risks

Risks this control addresses

  • Attackers spoof the organization's domain to conduct phishing campaigns targeting customers, partners, or employees, damaging brand reputation and enabling credential theft
  • Email-based ransomware or malware bypasses perimeter defenses and executes on endpoint systems due to lack of advanced content inspection
  • Business email compromise (BEC) attacks impersonate executives or vendors to initiate fraudulent wire transfers or data exfiltration
  • Lack of DMARC enforcement allows attackers to send fraudulent invoices or payment requests appearing to originate from legitimate company domains
  • Credential harvesting phishing campaigns succeed because malicious emails are not blocked by advanced threat detection mechanisms
  • Zero-day phishing threats using URL obfuscation, sandbox evasion, or time-delayed activation reach users before signature-based defenses are updated
  • Absence of DMARC reporting prevents security teams from identifying unauthorized use of corporate domains and measuring email authentication effectiveness

Testing procedure

How an auditor verifies this control

  1. Obtain the list of all organizational domains used for email communication, including primary, subsidiary, and marketing domains
  2. Query DNS records for each domain to retrieve published SPF, DKIM, and DMARC records using command-line tools (dig, nslookup) or online DNS lookup services
  3. Analyze SPF records to verify all authorized mail servers and IP ranges are included, the record does not exceed 10 DNS lookups, and the policy ends with '-all' or '~all' directive
  4. Verify DKIM records are published for active signing selectors and validate the public key length meets minimum cryptographic standards (at least 1024-bit RSA or equivalent)
  5. Review DMARC policy configuration to confirm policy is set to 'quarantine' or 'reject' (not 'none'), aggregate (rua) and forensic (ruf) reporting addresses are configured, and percentage tag is set appropriately
  6. Access the email security gateway or Microsoft 365/Google Workspace admin console to review ATP configuration including safe links, safe attachments, anti-phishing policies, and impersonation protection settings
  7. Examine DMARC aggregate reports from the past 30 days to identify authentication failure patterns, unauthorized sending sources, and policy enforcement statistics
  8. Conduct test email transmissions from external services to verify SPF/DKIM/DMARC authentication results appear correctly in email headers and ATP policies trigger appropriately for simulated malicious content
Evidence required DNS query results showing published SPF, DKIM, and DMARC records for all organizational domains. Screenshots or configuration exports from the email security platform demonstrating ATP policies including safe links, safe attachments, anti-phishing rules, and impersonation protection settings. Sample DMARC aggregate reports (XML or parsed format) covering a recent 30-day period showing authentication pass/fail rates and policy enforcement actions.
Pass criteria All organizational email domains have valid SPF records with restrictive policies, DKIM signing enabled with published keys, DMARC policies set to 'quarantine' or 'reject' with active reporting, and ATP features configured to scan links and attachments while blocking impersonation attempts, with DMARC reports demonstrating high authentication pass rates and appropriate handling of failures.

Where this control is tested

Audit programs including this control