9.7
IG3

Deploy and Maintain Email Server Anti>Malware Protections

Asset Type: Network
Security Function: Protect

Description

Deploy and maintain email server anti-malware protections, such as attachment scanning and/or sandboxing.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Select and configure vulnerability scanning tool
7
Define scan scope, frequency, and credentials
8
Establish vulnerability remediation SLAs by severity
9
Create exception/waiver process for unremediated findings
10
Deploy anti-malware solution to all applicable endpoints
11
Configure automatic signature updates
12
Enable real-time scanning and scheduled full scans
13
Establish centralized management and alerting
14
Configure email authentication (SPF, DKIM, DMARC)
15
Deploy email security gateway with filtering
16
Configure attachment and URL scanning

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Zero-Day Malware Delivery via Email Attachments

Integrity

Novel malware that has not yet been signatured by antivirus vendors arrives as email attachments, and without server-side sandboxing and behavioral analysis the malicious attachments reach user inboxes and execute upon opening.

Evasive Malware Bypassing Signature-Based Email Scanning

Confidentiality

Polymorphic or metamorphic malware attached to emails evades signature-based detection on the email server, requiring behavioral analysis and sandboxing capabilities that are not deployed, allowing the payload to reach endpoints.

Weaponized Document Exploitation via Email

Confidentiality

Carefully crafted documents exploiting application vulnerabilities (such as Follina, CVE-2023-21716, or embedded OLE objects) pass through email servers without anti-malware inspection that would detect the exploit behavior in a sandbox environment.

Vulnerabilities (When Safeguard Absent)

No Email Server Anti-Malware or Sandboxing Solution

The email server lacks dedicated anti-malware protection with sandboxing capabilities, relying solely on endpoint antivirus to catch malicious attachments after they have already been delivered to user mailboxes.

Email Anti-Malware Limited to Signature-Based Detection

Email server protection uses only signature-based scanning without behavioral analysis or detonation sandboxing, missing zero-day threats, polymorphic malware, and sophisticated document-based exploits that require dynamic analysis.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Technical Vulnerability scan reports showing scope and findings Per scan cycle
Record Vulnerability remediation tracking with SLA compliance metrics Monthly
Technical Email security configuration (SPF, DKIM, DMARC records) Verified quarterly
Technical Anti-malware deployment status and detection statistics Monthly
Document Governing policy document (current, approved, communicated) Reviewed annually