Куда я попал?
ГОСТ Р № 57580.1-2017 от 01.01.2018
Безопасность финансовых (банковских) операций. Защита информации финансовых организаций. Базовый состав организационных и технических мер. Раздел 7. Требования к системе защиты информации
ПУИ.10
Для проведения оценки соответствия по документу войдите в систему.
Список требований
-
ПУИ.10 Ограничение на размеры файлов данных, передаваемых в качестве вложений в сообщения электронной почты
3-Н 2-Т 1-ТОбязательно для уровня защиты 1 2
Похожие требования
Guideline for a healthy information system v.2.0 (EN):
24 STRENGTHENED
/STRENGTHENED
Not directly exposing the mailbox servers to the Internet is preferable. In this case, a relay server dedicated to send and receive messages must be implemented in case the Internet is cut off.
While spam - whether malicious or not - accounts for the majority of email exchanges on the Internet, the deployment of an anti-spam service must be able to remove this source of risks.
Finally, the email administrator will ensure the implementation of authenticity verification mechanisms and the correct configuration of public DNS records linked to its email infrastructure (MX, SPF, DKIM, DMARC).
Not directly exposing the mailbox servers to the Internet is preferable. In this case, a relay server dedicated to send and receive messages must be implemented in case the Internet is cut off.
While spam - whether malicious or not - accounts for the majority of email exchanges on the Internet, the deployment of an anti-spam service must be able to remove this source of risks.
Finally, the email administrator will ensure the implementation of authenticity verification mechanisms and the correct configuration of public DNS records linked to its email infrastructure (MX, SPF, DKIM, DMARC).
Strategies to Mitigate Cyber Security Incidents (EN):
1.14.
Block spoofed emails. Use Sender Policy Framework (SPF) or Sender ID to check incoming emails. Use ‘hard fail’ SPF TXT and DMARC DNS records to mitigate emails that spoof the organisation’s domain.
Relative Security Effectiveness: Very Good | Potential User Resistance: Low | Upfront Cost: Low | Ongoing Maintenance Cost: Low
Relative Security Effectiveness: Very Good | Potential User Resistance: Low | Upfront Cost: Low | Ongoing Maintenance Cost: Low
1.6.
Email content filtering. Allow only approved attachment types (including in archives and nested archives). Analyse/sanitise hyperlinks, PDF and Microsoft Office attachments. Quarantine Microsoft Office macros.
Relative Security Effectiveness: Excellent | Potential User Resistance: Medium | Upfront Cost: Medium | Ongoing Maintenance Cost: Medium
Relative Security Effectiveness: Excellent | Potential User Resistance: Medium | Upfront Cost: Medium | Ongoing Maintenance Cost: Medium
Связанные защитные меры
Ничего не найдено