NIST Special Publication 800-53 (Rev. 4)

Security and Privacy Controls for Federal Information Systems and Organizations

SI-8 SPAM PROTECTION

Family:
System and Information Integrity
Class:
Priority:
P2 - Implement P2 security controls after implementation of P1 controls.
Baseline Allocation:
Low Moderate High
SI-8 (1) (2)
SI-8 (1) (2)

Control Description

The organization:

a. Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and

b. Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.

Supplemental Guidance

Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, mobile devices, and notebook/laptop computers. Spam can be transported by different means including, for example, electronic mail, electronic mail attachments, and web accesses. Spam protection mechanisms include, for example, signature definitions.

Related to: AT-2AT-3SC-5SC-7SI-3

Control Enhancements

SI-8 (1) SPAM PROTECTION | CENTRAL MANAGEMENT
The organization centrally manages spam protection mechanisms.
Supplemental Guidance: Central management is the organization-wide management and implementation of spam protection mechanisms. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed spam protection security controls.
Related to: AU-3SI-2SI-7
SI-8 (2) SPAM PROTECTION | AUTOMATIC UPDATES
The information system automatically updates spam protection mechanisms.
SI-8 (3) SPAM PROTECTION | CONTINUOUS LEARNING CAPABILITY
The information system implements spam protection mechanisms with a learning capability to more effectively identify legitimate communications traffic.
Supplemental Guidance: Learning mechanisms include, for example, Bayesian filters that respond to user inputs identifying specific traffic as spam or legitimate by updating algorithm parameters and thereby more accurately separating types of traffic.

References

NIST Special Publication 800-45 https://csrc.nist.gov/publications/search?keywords-lg=800-45