Page 876 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 876

stipulated that professional, business-oriented email and a limited
               amount of personal email can be sent and received. Specific

               restrictions are usually placed on performing personal business (that
               is, work for another organization, including self-employment) and
               sending or receiving illegal, immoral, or offensive communications as
               well as on engaging in any other activities that would have a
               detrimental effect on productivity, profitability, or public relations.

               Access control over email should be maintained so that users have

               access only to their specific inbox and email archive databases. An
               extension of this rule implies that no other user, authorized or not, can
               gain access to an individual’s email. Access control should provide for
               both legitimate access and some level of privacy, at least from other
               employees and unauthorized intruders.

               The mechanisms and processes used to implement, maintain, and
               administer email for an organization should be clarified. End users

               may not need to know the specifics of email management, but they do
               need to know whether email is considered private communication.
               Email has recently been the focus of numerous court cases in which
               archived messages were used as evidence—often to the chagrin of the
               author or recipient of those messages. If email is to be retained (that
               is, backed up and stored in archives for future use), users need to be
               made aware of this. If email is to be reviewed for violations by an

               auditor, users need to be informed of this as well. Some companies
               have elected to retain only the last three months of email archives
               before they are destroyed, whereas others have opted to retain email
               for years. Depending upon your country and industry, there are often
               regulations that dictate retention policies.


               Understand Email Security Issues


               The first step in deploying email security is to recognize the
               vulnerabilities specific to email. The standard protocols used to
               support email (i.e., SMTP, POP, and IMAP) do not employ encryption
               natively. Thus, all messages are transmitted in the form in which they
               are submitted to the email server, which is often plain text. This makes

               interception and eavesdropping easy. However, the lack of native
               encryption is one of the least important security issues related to
   871   872   873   874   875   876   877   878   879   880   881