Tag

Email Security

Browsing

By Pavlos Ioannou Katidis

In today’s digital landscape, efficient and secure email management is essential for businesses facing the complexities of cyber threats and regulatory compliance. Companies are seeking ways to safeguard against unauthorized access and apply audit rules, while maintaining operational efficiency. Amazon SES Mail Manager is designed to meet these challenges, offering a suite of features that enhance both inbound and outbound email flows.

Mail Manager provides key components such as traffic policies for detailed email filtering, authenticated ingress endpoints that ensure emails are received only from verified senders, and customizable rule sets that enable administrators to precisely manage email traffic. These tools aim to bolster security and streamline the email management process.

The blog explores Mail Manager’s capabilities by demonstrating how each component works and can be utilized in practical business scenarios. Some common use cases include security, where Mail Manager blocks harmful emails based on IP ranges, TLS versions, and authentication checks while leveraging third-party security add-ons. Another use case is email archiving, where you can use Mail Manager to set up multiple archives with customizable retention periods and encryption, ensuring compliance and easy searchability.

Familiarize with some of mail manager’s key components below before proceeding with the customer use cases.

Mail manager components definition:

  • Ingress endpoints:
    • Open ingress endpoint: a SMTP endpoint responsible for accepting connections, and process SMTP conversation key infrastructure. It’s a key component that utilizes traffic polices and rules that you can configure to determine which emails should be allowed into your organization and which ones should be rejected.
    • Authenticated ingress endpoint: Mail sent to your domain has to come from authorized senders whom you’ve shared your SMTP credentials with, such as your on-premise email servers.
  • Traffic policies: let you determine the email you want to allow or block from your ingress endpoint. A traffic policy consists of one or more policy statements where you allow or deny traffic based on a variety of protocols including recipient address, sender IP address and TLS protocol version.
  • Rules sets: A Rule set is a container for an ordered set of rules you create to perform actions on your email. Each rule consists of conditions and rules.
  • Email add-ons: A suite of 3rd party applications that are seamlessly integrated with Amazon SES mail manager. Some of them are Trend Micro Virus Scanning, Abusix Mail intelligence and Spamhaus Domain Block List.

For a deep dive into Mail Manager’s capabilities, ready this blog.

Customer background and use case

Nutrition.co is an online retail business with multiple departments, including marketing, tech, and sales, that send and receive emails. Nutrition.co is looking for a solution to monitor both outbound and inbound emails and apply various controls such as filtering, message processing, and archiving. Nutrition.co uses Outlook as an enterprise mailbox environment for its employees.

Use case 1: Nutrition.co to the world

This use case focuses on the outbound email flow, where Nutrition.co employees are sending emails outside of Nutrition.co. Some of the requirements include the archival of all outbound emails originated by the marketing department, blocking any tech emails exceeding 1mb and scanning the email content of emails originated by sales. These controls should be centrally managed and provide flexibility to edit/create/delete new ones.

Solution: Each department will direct its outbound emails to an authenticated ingress endpoint by configuring an Exchange transport rule. These endpoints ensure that only authorized senders with SMTP credentials can send emails. Each ingress endpoint generates an A record, which is added as an MX record to the DNS provider for each department’s subdomain. Additionally, each ingress endpoint is associated with a specific traffic policy and rule set. According to Nutrition.co’s requirements, all connections between the departments and the ingress endpoints must use TLS 1.3 or higher. Emails that comply with the traffic policies are processed through distinct rule sets. Emails from marketing that comply with DKIM and SPF are first archived and then sent to the recipient via the Send to Internet action. Tech emails have their recipient’s address rewritten to a test email address, while emails from the sales department undergo content scanning before being sent to the final recipients via the Send to Internet action.

Mail manager outbound

Use case 2: World to Nutrition.co

This use case focuses on the inbound email flow, where third parties send emails to Nutrition.co. Nutrition.co requires inbound emails to pass SPF and DKIM and have TLS 1.3 or higher to be archived. Emails originating from warehouse.com, Nutrition.co’s fulfilment partner, are containing customer order updates. These emails should be processed by Nutrition.co and accordingly update the customers’ order status database. Furthermore, warehouse.com emails should originate from a certain IP range, have TLS 1.3 or higher and pass SPF and DKIM.

Solution: Nutrition.co will use an open ingress endpoint without authentication for all inbound external emails. This is achieved by adding an MX record generated by Mail Manager upon the creation of the ingress endpoint. This ingress endpoint will be associated with a traffic policy that evaluates TLS. If the inbound email conforms to the traffic policy, it will proceed through the rule set condition and actions. The rule set condition is to pass SPF and DKIM and the actions are to be archived and then sent to the final recipient (Nutrition.co employee) via SMTP Relay. Emails containing parcel delivery updates from warehouse.com will be directed to a separate Nutrition.co subdomain, which routes all inbound emails to an authenticated ingress endpoint. Emails from warehouse.com with TLS 1.3 or higher will meet the traffic policy requirements. If they are SPF and DKIM passing, they will be stored in a Nutrition.co Amazon S3 bucket as part of the rule set. Using Amazon S3 notifications, an AWS Lambda function is invoked upon receiving an email. This function processes the email payload, and performs an API call to update the Nutrition.co customers’ order status database.

Mail manager inbound

Archiving inbound emails

In the following section, you will use AWS CloudShell and AWS CLI commands to create a traffic policy that rejects emails with TLS versions lower than 1.3, includes an open ingress endpoint, and establishes a ruleset that archives emails that are DKIM passing.

Prerequisites: Own a domain and have access to its DNS provider, in order to add the MX record.

Navigate to the AWS Management Console and open CloudShell, find CloudShell availability here. Follow the steps below by copying and pasting the AWS CLI commands to the CloudShell terminal. Note that creating and configuring these resources, can also be done from the AWS Console.

# 1. Creating archive

ARCHIVE=$(aws mailmanager create-archive \
  --archive-name NutritionCo \
  --retention RetentionPeriod=THREE_MONTHS \
  --region ${AWS_REGION} \
  --tags Key=Company,Value=NutritionCo | jq -r '.ArchiveId') && echo $ARCHIVE

# 2. Creating traffic policy

TRAFFIC_POLICY=$(aws mailmanager --region ${AWS_REGION} create-traffic-policy \
  --traffic-policy-name ArchiveTrafficPolicy \
  --default-action DENY \
  --policy-statements '[
    {
      "Action": "ALLOW",
      "Conditions": [
        {
          "TlsExpression": {
            "Evaluate": {
              "Attribute": "TLS_PROTOCOL"
            },
            "Operator": "MINIMUM_TLS_VERSION",
            "Value": "TLS1_3"
          }
        }
      ]
    }
  ]'| jq -r '.TrafficPolicyId') && echo $TRAFFIC_POLICY

# 3. Creating Mailmanager RuleSet for archiving

RULE_SET=$(aws mailmanager --region ${AWS_REGION} create-rule-set \
  --rule-set-name ArchiveRuleSet \
  --rules '[
    {
      "Name": "Archive",
      "Actions": [
        {
          "Archive": {
            "TargetArchive": "'"${ARCHIVE}"'"
          }
        }
      ],
      "Conditions": [
        {
          "VerdictExpression": {
            "Evaluate": {
              "Attribute": "DKIM"
            },
            "Operator": "EQUALS",
            "Values": ["PASS"]
          }
        }
      ]
    }
  ]'| jq -r '.RuleSetId') && echo $RULE_SET

# 4. Create ingress endpoint

aws mailmanager --region ${AWS_REGION} create-ingress-point \
--ingress-point-name Archiving \
--type OPEN \
--traffic-policy-id ${TRAFFIC_POLICY} \
--rule-set-id ${RULE_SET}

To view the resources created above, navigate to the Amazon SES console > Mail Manager and view Traffic policies and Rule sets. Below, you can see the rule in edit mode.

Mail-Manager-RulesetNavigate to Amazon SES > Mail Manager > Ingress endpoint, select the ingress endpoint named Archiving and copy the ARecord, which looks like this <unique-id>.fips.wmjb.mail-manager-smtp.amazonaws.com – see screenshot below. Add this value to your MX record.

Mail-Manager-IngressEndpoint

To test if the MX record has been added successfully, open your local terminal and execute the command below:
nslookup -type=MX <your-domain.com>
The response should return the MX preference and mail exchanger containing the A record value.

Testing

To test if the inbound emails are archived successfully, send an email to an address within the domain for which you have added the MX record. Wait for 3-5 minutes to allow for email processing. Then, navigate to the AWS Management Console, go to Amazon SES, and select Mail Manager. Under Email Archiving, select NutritionCo under Archive and click on Search. This should return all the emails you have sent.

MailManager-Archive

Conclusion & Next steps

In this blog, we delved into the essential features of Amazon SES Mail Manager and its application in managing both inbound and outbound email flows. We explored key components such as traffic policies, authenticated ingress endpoints, and customizable rule sets that enhance security and operational efficiency. Through practical use cases, this blog demonstrates how these features can be implemented to meet the specific needs of a business like Nutrition.co. By leveraging Amazon SES Mail Manager, businesses can significantly enhance their email security and management processes, safeguarding against cyber threats while ensuring compliance and efficiency.

Continue exploring Mail Manager’s features such as SMTP relays and Email add-ons.

By Pavlos Ioannou Katidis

Pavlos Ioannou Katidis is an Amazon Pinpoint and Amazon Simple Email Service Senior Specialist Solutions Architect at AWS. He enjoys diving deep into customers’ technical issues and help in designing communication solutions. In his spare time, he enjoys playing tennis, watching crime TV series, playing FPS PC games, and coding personal projects.

Alexey Kiselev

Alexey Kiselev is a Senior SDE working on Amazon Email. Alexey has played a pivotal role in shaping the design, infrastructure, and delivery of MailManager. With years of experience, deep understanding of the industry and a passion for innovation he is enthusiast and a builder with a core area of interest on scalable and cost-effective email management and email security solutions.

Sourced from AWS

By Candid Wüest

It only takes one successful attack to spell disaster for a company. Learn how to protect your company with this email security best practice guide.

The number of emails sent each day is expected to top 330 billion this year.

Cybercriminals know this, with phishing and other email-targeting tactics the top attack vectors ― because they work so well. And as we discussed in the first article of this two-part series, “For MSPs, Next-Gen Email Security Is a Must,” advances in automation have made it easy to run these attacks at scale, with no organization too small to target anymore.

It only takes one successful attack to spell disaster. What can you do to protect your company? Although proper email security is never a walk in the park, we have prepared a checklist of email security best practices for small and midsize businesses (SMBs), divided into three categories: organizational culture, security posture management, and technology stack.

Organizational Culture

A security-first organizational culture bolsters email safety by prioritizing the following:

  1. Clear policies: Get IT and business leaders to co-formulate clear security policies, including email-specific ones.
  2. Continuous reinforcement: Make email security practices part of employee onboarding, ongoing training, and performance reviews.
  3. Peer buy-in: Buy-in for the company’s security strategy from non-security peers is crucial for good security outcomes for SMBs.
  4. Learning from incidents: Leverage email security incidents to address vulnerabilities and finetune policies.

Security Posture Management

Here are four best practices for email security posture management that SMBs can adopt:

  1. Timely incident response: A companywide incident response plan (that includes notifications, responsibilities, response and mitigation workflows, reporting, etc.) must be regularly tested and updated.
  2. Data loss prevention (DLP) program: A DLP program incurs costs, but the ROI is clear when a company can achieve near-zero RPO/RTO outcomes in response to ransomware or other data theft exploits.
  3. Systematic management of email passwords: UK survey: 82% of security breaches over the previous year started with weak email passwords. IT should enforce strong, unique passwords that are updated regularly.
  4. Clear reporting: Be able to demonstrate diligent tracking of email security metrics and effectively address incidents and vulnerabilities.

Staying on Top of Technology

Cyber threats are constantly evolving, increasing the pressure on businesses to optimize and modernize their protection. Ensure that your current email security stack is best of breed and up to date:

  1. Proactive refreshing of email security stack: SMBs with a process in place to proactively refresh their security technology stack achieve superior security outcomes.
  2. SaaS: A SaaS email security solution ensures continuous improvement while eliminating infrastructure overhead.
  3. Two-factor authentication (2FA): An additional authentication step considerably hardens email security. There are plenty of freeware and commercial 2FA solutions out there.
  4. Multiple, overlapping layers of defence: Sophisticated exploits require a multilayer defence based on email security gateways; anti-phishing or anti-malware tools; and threat intelligence solutions.

Using an MSP

MSPs have the resources and experience to deploy a well-integrated, end-to-end solution that protects their customers’ email flows. The benefits of using an MSP include:

  • 24/7/365 threat detection and response
  • Scalability
  • Easy integration with existing email infrastructure
  • Flexibility and configurability

It’s a win-win solution: The MSP works against the weaponization of email while the SMB can focus its resources on core business activities.

Acronis and Email Security

Whether a business manages email security itself or turns to an MSP, having an integrated data protection and cybersecurity solution that secures an organization’s online assets — including email — is critical. Learn how Acronis can help with its cyber protection solutions, featuring ML-based anti-malware, antivirus, and anti-ransomware protection, fail-proof patching, continuous backups, safe and rapid recovery, global threat monitoring, smart alerts, and more.

Feature Image Credit: ar130405 via Adobe Stock

By Candid Wüest

Candid Wüest is the VP of Cyber Protection Research at Acronis, where he researches new threat trends and comprehensive protection methods. Previously, he worked for more than 16 years as the tech lead for Symantec’s global security response team. Wüest is a frequent speaker at security-related conferences, including RSAC and AREA41, and is an adviser for the Swiss federal government on cyber-risks. He holds a master’s in computer science from ETH Zurich and various certifications and patents.

Sourced from DARK Reading

By Chris Odogwu

Having an email security policy can protect you and your company from malicious threats.

When was the last time you sent an email? It was probably today. Just like you, many people around the world send emails daily.Emails have been a part of our lives for the longest time. Since it’s almost impossible to do without them, you must secure yourself with an effective email security policy.

You don’t want your emails to get into the wrong hands, do you? Implementing an email security policy helps to keep them safer.

What Is Email Security Policy?

Email Newsletter

An email security policy is a series of procedures governing the use of emails within a network or an establishment. It details how a category of users interacts with messages that are sent and received via email.

Keeping your emails organized and secure boosts your productivity. The goal of an email security policy is to secure messages from unauthorized access.

Who may be trying to access the emails without permission, one might ask? Cybercriminals—they are very much interested in the confidential messages that you send within and outside your organization. And that’s because they know that such information is valuable. If they get hold of it, they can use it for a series of malicious activities to enrich themselves.

How Does Email Security Policy Work?

Gmail on Computer Screen

The default security strength of email isn’t so strong. Messages sent via email are in the public space. Hence, they can be easily accessed by anyone with average hacking skills. Creating an email security policy is one of the basic things that you can do to ward off attackers.

Believing that you or your organization can’t fall victim to an email breach is a false premise. As long as you make use of emails, you can be targeted.

Your reluctance to implement an email security policy can only hold water if the emails you send are meaningless. But that’s hardly the case if you run a decent business.

For an email security policy to be effective, it must include the following items:

  1. The scope and purpose of the policy.
  2. Information about the ownership of content contained in the emails.
  3. Privacy concerns and expectations of parties using the email.
  4. The responsibilities of the email users.
  5. Guidelines for using the organization’s email accounts.
  6. Tips to detect and avoid email security threats.
  7. Specific actions to take in the event of a suspected email security breach.

Accessibility is key in the successful implementation of the policy. Team members can only be abreast with the information in the policy if they can access the document.

Instead of storing the document on a physical device, it’s advisable to use a workflow tool with cloud storage and remote access. That way, authorized team members can access the policy from anywhere and at any time.

Training is another essential element to successfully implement an email security policy. Some users may be reluctant to abide by the policy, especially if they haven’t used something similar in the past. It’s up to you to make provision for proper training to make them understand how using the policy is in everyone’s best interest.

How to Build an Effective Email Security Policy

Woman Working on Computer in Office

An email security policy isn’t one-size-fits-all because no two organizations are the same. But the cyber threats that endanger the use of emails have similar effects on organizations regardless of their offerings and sizes. They are common attributes that should be considered in building a standard policy.

Here are some practical tips for building an email security policy that works.

1. Adopt a Template

Creating an email security policy from scratch isn’t a bad idea, but you could save yourself some time by adopting an existing template. This is necessary, especially if you aren’t familiar with the content of the policy.

Instead of creating irrelevant information, you have vital information for creating a policy that works.

2. Modify the Template

Adopting an existing template doesn’t mean you should use it the way it is. The template is to give you an idea of what the policy looks like.

Instead of taking everything contained in the template hook line and sinker, adjust it to suit the unique needs of your business.

In the end, you’ll have an original document that’s tailormade for your organization.

3. Identify User Engagement Terms

Users of your email may engage in indiscriminate activities if they aren’t aware that such activities are prohibited. It’s your responsibility to expressly state how they should use your email.

Identify unhealthy email practices that may expose your network to cyberattacks and warn against involving in such activities.

4. Implement a Tool

Your email security policy is incomplete without implementing a tool that enhances the security of your emails.

Manually protecting your email against cyber threats is insufficient, especially as cybercriminals use advanced technologies for their attacks. Match their energy with tools such as sandboxes, spam filters, and malware prevention software. An effective spam filter prevents you from viewing malicious emails.

5. Enforce User Policy Acknowledgement

The successful implementation of your policy begins with your users’ willingness to abide by it. Change comes with some resistance. Team members who aren’t familiar with an email security policy may decide to overlook it.

Get users to commit to using the policy by appending their signatures as a form of acknowledgment. That way, you have proof of their agreement to use it in case they fail to.

6. Train Users

Users of your email may not understand some information in the policy. Leaving them in a state of confusion is risky as they may take inappropriate actions that will endanger your network.

Ensure that everyone understands the policy by conducting training. Create room for them to ask questions on grey areas so that everyone is up to speed on what to do and what not to do.

7. Develop an Incident Response Plan

Even with all the training on how to implement an email security policy effectively, things might still go wrong.

Develop an incident response plan in the event of a security breach. Your policy should contain what users should do once they suspect malicious activity or attack. Taking the right actions can mitigate the effects of a cyberattack.

Cultivate Healthy Cyberculture With Email Security Policy

Instant messaging may be trendy in communicating with friends and family. But when it comes to work and business, good old email is still relevant. It helps organizations to maintain a sense of order and formality.

You may not be able to stop attackers from targeting your emails, but you can nullify their attacks with an effective email security policy.

When everyone using your email understands how to keep the information safe, cybercriminals will have no opportunity to strike. It’s only a matter of time before they give up trying to penetrate your network and move on to the next one.

By Chris Odogwu

Sourced from MUO