13.07.2015 Views

Email Security Implementation Guidance - Cloud Security Alliance

Email Security Implementation Guidance - Cloud Security Alliance

Email Security Implementation Guidance - Cloud Security Alliance

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CLOUD SECURITY ALLIANCE SecaaS <strong>Implementation</strong> <strong>Guidance</strong>, Category 4: <strong>Email</strong> <strong>Security</strong>3.1.3 Programmatic Access ............................................................................................................................. 153.1.4 Self-Service ............................................................................................................................................. 153.1.5 Client Controls ........................................................................................................................................ 163.1.6 Management and Monitoring ................................................................................................................ 163.1.7 Integration .............................................................................................................................................. 163.2 Concerns ........................................................................................................................................................ 163.2.1 Data <strong>Security</strong> .......................................................................................................................................... 163.2.2 Regulatory Compliance........................................................................................................................... 173.2.3 Data Disclosure ....................................................................................................................................... 173.2.4 Data Residency ....................................................................................................................................... 173.2.5 Identity ................................................................................................................................................... 183.2.6 Logging .................................................................................................................................................... 183.2.7 Communications ..................................................................................................................................... 184.0 Architecture and <strong>Implementation</strong> Steps ........................................................................................................... 194.1 Architecture Overview ................................................................................................................................... 194.1.1 Fully Outsourced <strong>Email</strong> <strong>Implementation</strong> ................................................................................................ 204.1.2 <strong>Email</strong> <strong>Security</strong> <strong>Cloud</strong> Augmentation to Premise Enterprise <strong>Implementation</strong>s ...................................... 204.2 <strong>Guidance</strong> and <strong>Implementation</strong> Steps ............................................................................................................ 224.2.1 Client <strong>Security</strong> ......................................................................................................................................... 224.2.2 Administration ........................................................................................................................................ 234.2.3 Submission End-Point, the Mail Submission Agent ................................................................................ 234.2.4 Mail Delivery Agent ................................................................................................................................ 234.2.5 Mail Transfer Agent ................................................................................................................................ 244.2.6 Mail Storage ............................................................................................................................................ 24© Copyright 2012, <strong>Cloud</strong> <strong>Security</strong> <strong>Alliance</strong>. All rights reserved. 4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!