manage.get.gov/docs/compliance/dist/system-security-plans/ato/si-8.md
Logan McDonald 1d3dfdb8d5
Add compliance documentation to source control (#116)
* add initial setup of compliance-trestle
2022-09-14 08:46:43 -04:00

2 KiB

implementation-status control-origination
c-not-implemented
c-inherited-cloud-gov
c-inherited-cisa
c-common-control
c-system-specific-control

si-8 - [catalog] Spam Protection

Control Statement

  • [a] Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages; and

  • [b] Update spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.

Control guidance

System entry and exit points include firewalls, remote-access servers, electronic mail servers, web servers, proxy servers, workstations, notebook computers, and mobile devices. Spam can be transported by different means, including email, email attachments, and web accesses. Spam protection mechanisms include signature definitions.

Control assessment-objective

spam protection mechanisms are employed at system entry points to detect unsolicited messages; spam protection mechanisms are employed at system exit points to detect unsolicited messages; spam protection mechanisms are employed at system entry points to act on unsolicited messages; spam protection mechanisms are employed at system exit points to act on unsolicited messages; spam protection mechanisms are updated when new releases are available in accordance with organizational configuration management policies and procedures.


What is the solution and how is it implemented?


Implementation a.

Add control implementation description here for item si-8_smt.a


Implementation b.

Add control implementation description here for item si-8_smt.b