13.07.2015 Views

Email Security Implementation Guidance - Cloud Security Alliance

Email Security Implementation Guidance - Cloud Security Alliance

Email Security Implementation Guidance - Cloud Security Alliance

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CLOUD SECURITY ALLIANCE SecaaS <strong>Implementation</strong> <strong>Guidance</strong>, Category 4: <strong>Email</strong> <strong>Security</strong>1.2 ScopeThis paper discusses the use of SecaaS services to mitigate email threats arising from viruses, phishing, spam,denial of service and operational disruptions. Features covered are email digital signatures, encryption, emailarchival services, threat detection and prevention services and data loss prevention (DLP). One best practicearound email services in the cloud is the use of a federated identity system to ensure proper authenticity ofmessages and service users.The scope of this document includes secure implementation of electronic mail services on cloud architectures,including:• Common electronic mail components• Electronic mail architecture protection• Common electronic mail threats• Peer authentication• Electronic mail message standards• Electronic mail encryption and digital signature• Electronic mail content inspection and filtering• Securing mail clients• Electronic mail data protection and availability assurance techniques© Copyright 2012, <strong>Cloud</strong> <strong>Security</strong> <strong>Alliance</strong>. All rights reserved. 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!