Email Security Policy

Document Version: 1.1
Last Updated: July 20, 2025
Owner: Information Security Officer


1. Purpose

This policy establishes controls to ensure the secure and compliant use of email systems at [Your Company Name], in line with ISO/IEC 27001 and SOC 2 requirements. It aims to protect against unauthorized access, phishing, malware, and information silos, while supporting operational continuity.


2. Scope

This policy applies to all employees, contractors, vendors, and third parties who access or manage the organization’s email systems.


3. Policy Requirements

3.1 Acceptable Use

  • Email must be used primarily for business purposes.
  • Limited personal use is permitted if it does not interfere with business operations or violate any policy.
  • Inappropriate or offensive content must never be transmitted via email.

3.2 Access Control

  • Email access must be managed through centralized IAM systems with unique user credentials.
  • Multi-factor authentication (MFA) is mandatory.
  • Generic administrative accounts (e.g., AppAdmin, BillingAdmin) may be used for system setup or billing purposes where necessary, provided:
    • The credentials are stored securely (e.g., password manager).
    • The account is only used for its intended function (e.g., billing setup).
    • Access is reviewed quarterly and rotated when personnel change.
  • Shared mailboxes (e.g., renewals@company.com, billing@company.com) must be used for software renewals, invoices, and subscription-related communications to prevent single-point-of-failure when a staff member is unavailable.

3.3 Security Controls

  • All inbound/outbound email must be scanned for malware, phishing, and spam.
  • TLS must be used for secure transmission.
  • Do not send sensitive data unencrypted. Use secure messaging platforms or encryption (S/MIME, PGP, or encrypted attachments).
  • Disable automatic forwarding to external accounts unless explicitly approved.

3.4 Email Retention and Archiving

  • Email must be archived based on classification:
    • General emails: 2 years.
    • Legal, contractual, or financial communications: 7 years.
  • Archived data must be encrypted at rest and tamper-evident.

3.5 Monitoring and Logging

  • Maintain logs of email activity for 12 months minimum.
  • Monitor for abnormal activity such as bulk sending or failed login attempts.
  • Email alerts should be triggered on detection of possible data leaks or phishing campaigns.

3.6 Anti-Phishing and Threat Protection

  • Implement threat protection systems for real-time analysis of attachments and links.
  • Enforce DMARC, SPF, and DKIM for domain authenticity.
  • Educate users on identifying phishing attempts.

3.7 Incident Response

  • All email-related security incidents must be reported immediately.
  • Follow the Incident Response Policy for containment and resolution.

3.8 Training and Awareness

  • Conduct annual training on email security, phishing, and proper use of shared accounts/mailboxes.
  • Run quarterly phishing simulations and report metrics to security leadership.

4. Roles and Responsibilities

RoleResponsibility
IT SecurityMaintain email security tools, shared mailbox access, and account audits
System AdminsManage provisioning of shared mailboxes and generic admin accounts securely
Department HeadsEnsure renewals/billing messages are sent to shared mailboxes
All UsersPractice email hygiene, report incidents, avoid siloing information

5. Compliance

Violations of this policy may result in disciplinary action. Email systems and access configurations are subject to periodic audit.


6. References

  • ISO/IEC 27001: A.9 (Access Control), A.13.2.3 (Electronic Messaging), A.12.4 (Logging), A.16 (Incident Management)
  • SOC 2: CC6.1, CC6.6 (Logical Access), CC7.2–CC7.4 (System Monitoring), CC8.1 (Change and Recovery)

Subscribe to devsecopsbook

Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
jamie@example.com
Subscribe