SlideShare a Scribd company logo
1 of 31
M3AAWG 26th General Meeting | Baltimore, October 2012
M3AAWG DMARC Training Series
Mike Adkins, Paul Midgen
DMARC.org
October 22, 2012
Segment 1
What is DMARC?
(about 20 minutes)
Segment 2
DMARC Identifier
Alignment
(about 20 minutes)
Segment 3
DMARC Policy Records
(about 30 minutes)
Segment 4
DMARC Reporting
(about 15 minutes)
Segment 5
DMARC Information
for
Mailbox Providers
(about 20 minutes)
Segment 6
DMARC Information for
Domain Owners and 3rd
Parties
(about 40 minutes)
M3AAWG DMARC Training Videos
(2.5 hours of training)
This is Segment 6 of 6
The complete series of DMARC training videos is available at:
https://www.m3aawg.org/activities/maawg-training-series-videos
M3AAWG 26th General Meeting | Baltimore, October 2012
M3AAWG 26th General Meeting | Baltimore, October 2012
DMARC Information for Doman Owners and 3rd Parties
DMARC Segment 6 – about 40 minutes
Michael Adkins, DMARC.org and M3AAWG Co-Vice Chairman
October 22, 2012
Information for Domain Owners
M3AAWG 26th General Meeting | Baltimore, October 2012
• The Reporting and Compliance Process
• Initial Record Publishing
• 3rd Party Deployment Profiles
• Report Processing and Analysis
• Rolling out Policies
• Long Term Monitoring
The Reporting and Compliance Process
For Domain Owners
M3AAWG 26th General Meeting | Baltimore, October 2012
Publish Initial
Record
Process
Reports
Fix
Infrastructure
Issues
Assess Initial
Threat Level
Process
Reports
Make Policy
Changes
Assess
Current Threat
Level
Process
Reports
Fix
Infrastructure
Issues
Phase 1:
Initial Auditing
Phase 2:
Initial Policy Ramp-up
Phase 3:
Ongoing Monitoring
Make Policy
Changes /
Other
Response
Abuse Detected
No Abuse
Detected
Initial Record Publishing
M3AAWG 26th General Meeting | Baltimore, October 2012
Everyone’s first DMARC record
v=DMARC1; p=none; rua=mailto:aggregate@example.com;!
3rd Party Deployment Profiles
M3AAWG 26th General Meeting | Baltimore, October 2012
Controlled – The Domain Owner fully
controls their own DNS, and wants as
much control over their email as
possible.
Authorized – The Domain Owner lets
the 3rd party dictate the content of
some DNS records, while still retaining
some operational control.
Delegated – The Domain Owner
delegates control of their DNS to the
3rd party, and wants to be mostly
hands-off with their email.
Hosted – The Domain Owner allows
the 3rd party to handle everything, and
has little control
Control /
Visibility
Technical
Responsibility
Delegated
Hosted
Controlled
Authorized
3rd Party Deployment Profiles
M3AAWG 26th General Meeting | Baltimore, October 2012
Controlled
The Domain Owner retains control of the domain or subdomain, provides a DKIM
signing key to 3rd party and publishes the public key, and includes the appropriate
information in their SPF record.
Pro
• This scenario allows 3rd parties to send as the organizational domain if desired.
• The Domain Owner retains operational control.
Cons
• Coordination between the domain owner and the 3rd party mailer is required to
ensure proper DKIM key rotation, accurate SPF records, etc.
• Risk of coordination overhead/issues increases as the number of bilateral
relationships increase for domain owners and vendors.
3rd Party Deployment Profiles
M3AAWG 26th General Meeting | Baltimore, October 2012
Controlled
Contractual points
• Process for DKIM key rotation. Obligations of each party, including testing.
• SPF record requirements and process for adding new hosts.
3rd Party Deployment Profiles
M3AAWG 26th General Meeting | Baltimore, October 2012
Authorized
Similar to Controlled Profile, except the 3rd party creates the DKIM key pair and
generally takes a more active role in dictating record content. This approach is
useful for Domain Owners where a different 3rd party is providing DNS and other
services for the domain.
Pros
• Can streamline provisioning for the 3rd party.
• One less task for the Domain Owner.
Cons
• Can create additional management issues for Domain Owners who use multiple
3rd parties.
• Possible additional contractual point for key strength requirements.
3rd Party Deployment Profiles
M3AAWG 26th General Meeting | Baltimore, October 2012
Delegated
The Domain Owner delegates a subdomain to 3rd party mailer and relies on
contractual relationship to ensure appropriate SPF records, DKIM signing, and
DMARC records.
Pros
• Reduces Domain Owner implementation issues to mostly contractual.
• The 3rd party is responsible for SPF records, DKIM signing and publishing, etc.
• Domain owner may still be responsible for ensuring Identifier Alignment.
Con
• The Domain Owner potentially gives up day to day control and visibility into
operations and conformance.
3rd Party Deployment Profiles
M3AAWG 26th General Meeting | Baltimore, October 2012
Delegated
Contractual points
• Creation and maintenance of SPF, DKIM and DMARC records
• (Quarterly) Rotation of DKIM keys and minimum length of key (1024
recommended)
• Investigation of DMARC rejections
• Handling of DMARC Reports
• Requirements for reporting back to the Domain Owner
• Indemnification (if any) for mail lost due to improper records or signatures.
3rd Party Deployment Profiles
M3AAWG 26th General Meeting | Baltimore, October 2012
Hosted
The 3rd party is also providing DNS, webhosting, etc for the Domain Owner and
makes the process mostly transparent to the domain owner.
Pro
• Very easy for less sophisticated Domain Owners.
• Can be mostly automated by the 3rd party.
Con
• The domain owner is significantly more dependent on the 3rd party.
3rd Party Deployment Profiles
M3AAWG 26th General Meeting | Baltimore, October 2012
3rd Party responsibilities
Controlled Authorized Delegated Hosted
Provide SPF record content Y Y Y Y
Maintain SPF records N N Y Y
Maintain DKIM records N N Y Y
Create DKIM Keys N Y Y Y
Rotate DKIM Keys Y Y Y Y
Maintain DMARC Records N N Y Y
Process DMARC reports N ? ? Y
Report Processing and Analysis
M3AAWG 26th General Meeting | Baltimore, October 2012
Publish Initial
Record
Process
Reports
Fix
Infrastructure
Issues
Assess Initial
Threat Level
Process
Reports
Make Policy
Changes
Assess
Current Threat
Level
Process
Reports
Fix
Infrastructure
Issues
Phase 1:
Initial Auditing
Phase 2:
Initial Policy Ramp-up
Phase 3:
Ongoing Monitoring
Make Policy
Changes /
Other
Response
Abuse Detected
No Abuse
Detected
Report Processing and Analysis
M3AAWG 26th General Meeting | Baltimore, October 2012
Report Parsing Tools
http://dmarc.org/resources.html
If you develop report parsing tools you are willing to share, please send a
note to the dmarc-discuss list and let us know.
Report Processing and Analysis
M3AAWG 26th General Meeting | Baltimore, October 2012
Step 1: Categorize the IPs in the Aggregate Report
• Your Infrastructure
• Authorized 3rd Parties
• Unauthorized 3rd Parties *
* - You should consider everything an Unauthorized 3rd Party by default.
Report Processing and Analysis –
Infrastructure Auditing
M3AAWG 26th General Meeting | Baltimore, October 2012
Step 2: Infrastructure Auditing
For both your Infrastructure and Authorized 3rd Parties
• Identify owners
• LOE for Deploying Domain Authentication
• LOE for Identifier Alignment
• Business case / Justification
Report Processing and Analysis
M3AAWG 26th General Meeting | Baltimore, October 2012
Step 3: Identify Malicious Email
Research Unauthorized 3rd Parties and label the Abusers
• Use public data sources
• Vendor services
• Look for known failure cases
• Forensic reports
Report Processing and Analysis
M3AAWG 26th General Meeting | Baltimore, October 2012
Step 4: Perform Threat Assessment
Categories
• Your Infrastructure
• Authorized 3rd parties
• Unauthorized 3rd parties
• Abusers
Calculate the Sum of Unaligned Email from each Category
Report Processing and Analysis
M3AAWG 26th General Meeting | Baltimore, October 2012
Step 4: Perform Threat Assessment
Phish = Unaligned Email From Abusers
Definite False Positives = Unaligned Email from Your Infrastructure + Unaligned
Email from Authorized 3rd parties
Potential False Positives = Unaligned Email from Unauthorized 3rd parties
Consider:
• Phish vs. False Positives
• Phish vs. Total Aligned Email
If there is no Phish, you don’t have a Domain Spoofing problem and don’t
need to move forward with DMARC policies.
Initial Policy Ramp-up
M3AAWG 26th General Meeting | Baltimore, October 2012
Publish Initial
Record
Process
Reports
Fix
Infrastructure
Issues
Assess Initial
Threat Level
Process
Reports
Make Policy
Changes
Assess
Current Threat
Level
Process
Reports
Fix
Infrastructure
Issues
Phase 1:
Initial Auditing
Phase 2:
Initial Policy Ramp-up
Phase 3:
Ongoing Monitoring
Make Policy
Changes /
Other
Response
Abuse Detected
No Abuse
Detected
Initial Policy Ramp-up
M3AAWG 26th General Meeting | Baltimore, October 2012
Step 1: Verify Authentication and Alignment for all of your
Infrastructure and all Authorized 3rd Parties.
Step 2: Update your record to:
p=quarantine; pct=10;!
!
Do not:
• Skip ‘quarantine’ and go straight to ‘reject’
• Change the policy action from ‘none’ without setting a ‘pct’
Initial Policy Ramp-up
M3AAWG 26th General Meeting | Baltimore, October 2012
Step 3: Monitor your reports for issues and address them.
Make a ‘go forward / go back’ decision.
Step 4: Update your record to increase the ‘pct’.
Rinse and repeat until you get to ‘pct=100’.
Initial Policy Ramp-up
M3AAWG 26th General Meeting | Baltimore, October 2012
Step 5: If needed, update your record to:
p=reject!
Ongoing Monitoring
M3AAWG 26th General Meeting | Baltimore, October 2012
Publish Initial
Record
Process
Reports
Fix
Infrastructure
Issues
Assess Initial
Threat Level
Process
Reports
Make Policy
Changes
Assess
Current Threat
Level
Process
Reports
Fix
Infrastructure
Issues
Phase 1:
Initial Auditing
Phase 2:
Initial Policy Ramp-up
Phase 3:
Ongoing Monitoring
Make Policy
Changes /
Other
Response
Abuse Detected
No Abuse
Detected
Ongoing Monitoring
M3AAWG 26th General Meeting | Baltimore, October 2012
• Categorize new IPs in Aggregate reports
• Your Infrastructure
• Authorized 3rd Parties
• Unauthorized 3rd Parties
• Abusers
• Reassess the Threat Level
• Increases in phish
• Changes in unaligned email volume
• Make changes accordingly
• Takedowns or other phish responses
Ongoing Monitoring
M3AAWG 26th General Meeting | Baltimore, October 2012
Be on the look out for:
• Infrastructure changes
• New products / new subdomains
• New authorized 3rd parties
• Mergers and acquisitions
Resources
M3AAWG 26th General Meeting | Baltimore, October 2012
Dmarc.org
Resources page for tools
Participate page for list sign up
M3AAWG 26th General Meeting | Baltimore, October 2012
This has been the sixth of six DMARC video segments
View the entire
M3AAWG DMARC Training Series
from the public training video pages on the M3AAWG website at:
https://www.m3aawg.org/activities/maawg-training-series-videos
Our thanks to Michael Adkins, Paul Midgen and DMARC.org
for developing the material in this series and allowing M3AAWG to videotape it
for professionals worldwide. Thanks to Message Bus for additional videotaping
and to videographer Ilana Rothman.
This video is presented by the
Messaging, Malware and Mobile Anti-Abuse Working Group
© slide PDF files and video copyrighted by the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG
M3AAWG 26th General Meeting | Baltimore, October 2012
For information about M3AAWG:
www.m3aawg.org
www.facebook.com/maawg
www.twitter.com/maawg
www.youtube.com/maawg
Contact us at:
https://www.m3aawg.org/contact_form

More Related Content

Similar to DMARC_Training_2012-10-Segment6.pdf

BCM For Outsourced Vendors
BCM For Outsourced VendorsBCM For Outsourced Vendors
BCM For Outsourced Vendorspmbs
 
Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightNICSA
 
6. Schedule Management
6. Schedule Management6. Schedule Management
6. Schedule ManagementSanjay Rajpoot
 
UK Conference 2018_All change - Aligning SAM with your Data Centre change pro...
UK Conference 2018_All change - Aligning SAM with your Data Centre change pro...UK Conference 2018_All change - Aligning SAM with your Data Centre change pro...
UK Conference 2018_All change - Aligning SAM with your Data Centre change pro...Martin Thompson
 
Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0Armor
 
Firehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Validating your Cardholder Data EnvirnmentFirehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Validating your Cardholder Data EnvirnmentArmor
 
L5M3 Managing Contractual Risk (CORE) Study Guide By Certs Warrior.pptx
L5M3 Managing Contractual Risk (CORE) Study Guide By Certs Warrior.pptxL5M3 Managing Contractual Risk (CORE) Study Guide By Certs Warrior.pptx
L5M3 Managing Contractual Risk (CORE) Study Guide By Certs Warrior.pptxCerts Warrior
 
Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRCorporater
 
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...Martin Thompson
 
AUS Conference 2018_All change - aligning sam with your data centre change pr...
AUS Conference 2018_All change - aligning sam with your data centre change pr...AUS Conference 2018_All change - aligning sam with your data centre change pr...
AUS Conference 2018_All change - aligning sam with your data centre change pr...Martin Thompson
 
RFP For Logistics Project
RFP For Logistics ProjectRFP For Logistics Project
RFP For Logistics ProjectLevi Williams
 
ONDC Integration Guide.pptx
ONDC Integration Guide.pptxONDC Integration Guide.pptx
ONDC Integration Guide.pptxVinodH69
 
Ldar Audits - Cutting Through the Fog
Ldar Audits - Cutting Through the FogLdar Audits - Cutting Through the Fog
Ldar Audits - Cutting Through the FogSteve Probst
 
UK Conference 2018_Data Centre Governance_Chris Morgan
UK Conference 2018_Data Centre Governance_Chris MorganUK Conference 2018_Data Centre Governance_Chris Morgan
UK Conference 2018_Data Centre Governance_Chris MorganMartin Thompson
 
SOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataSOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataKashish Trivedi
 
FedRAMP Certification & FedRAMP Marketplace
FedRAMP Certification & FedRAMP MarketplaceFedRAMP Certification & FedRAMP Marketplace
FedRAMP Certification & FedRAMP MarketplaceControlCase
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementWilliam Tanenbaum
 
Compliance and Audit Readiness: The DevOps Killer?
Compliance and Audit Readiness: The DevOps Killer?Compliance and Audit Readiness: The DevOps Killer?
Compliance and Audit Readiness: The DevOps Killer?DevOps.com
 

Similar to DMARC_Training_2012-10-Segment6.pdf (20)

BCM For Outsourced Vendors
BCM For Outsourced VendorsBCM For Outsourced Vendors
BCM For Outsourced Vendors
 
Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in Oversight
 
6. Schedule Management
6. Schedule Management6. Schedule Management
6. Schedule Management
 
UK Conference 2018_All change - Aligning SAM with your Data Centre change pro...
UK Conference 2018_All change - Aligning SAM with your Data Centre change pro...UK Conference 2018_All change - Aligning SAM with your Data Centre change pro...
UK Conference 2018_All change - Aligning SAM with your Data Centre change pro...
 
Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0
 
Final esjwg aamga 2013
Final   esjwg aamga 2013Final   esjwg aamga 2013
Final esjwg aamga 2013
 
Firehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Validating your Cardholder Data EnvirnmentFirehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Validating your Cardholder Data Envirnment
 
L5M3 Managing Contractual Risk (CORE) Study Guide By Certs Warrior.pptx
L5M3 Managing Contractual Risk (CORE) Study Guide By Certs Warrior.pptxL5M3 Managing Contractual Risk (CORE) Study Guide By Certs Warrior.pptx
L5M3 Managing Contractual Risk (CORE) Study Guide By Certs Warrior.pptx
 
Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPR
 
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
 
AUS Conference 2018_All change - aligning sam with your data centre change pr...
AUS Conference 2018_All change - aligning sam with your data centre change pr...AUS Conference 2018_All change - aligning sam with your data centre change pr...
AUS Conference 2018_All change - aligning sam with your data centre change pr...
 
RFP For Logistics Project
RFP For Logistics ProjectRFP For Logistics Project
RFP For Logistics Project
 
ONDC Integration Guide.pptx
ONDC Integration Guide.pptxONDC Integration Guide.pptx
ONDC Integration Guide.pptx
 
Ldar Audits - Cutting Through the Fog
Ldar Audits - Cutting Through the FogLdar Audits - Cutting Through the Fog
Ldar Audits - Cutting Through the Fog
 
UK Conference 2018_Data Centre Governance_Chris Morgan
UK Conference 2018_Data Centre Governance_Chris MorganUK Conference 2018_Data Centre Governance_Chris Morgan
UK Conference 2018_Data Centre Governance_Chris Morgan
 
SOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataSOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp Drata
 
FedRAMP Certification & FedRAMP Marketplace
FedRAMP Certification & FedRAMP MarketplaceFedRAMP Certification & FedRAMP Marketplace
FedRAMP Certification & FedRAMP Marketplace
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
 
Compliance and Audit Readiness: The DevOps Killer?
Compliance and Audit Readiness: The DevOps Killer?Compliance and Audit Readiness: The DevOps Killer?
Compliance and Audit Readiness: The DevOps Killer?
 
Review_2013
Review_2013Review_2013
Review_2013
 

Recently uploaded

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456KiaraTiradoMicha
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 

Recently uploaded (20)

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

DMARC_Training_2012-10-Segment6.pdf

  • 1. M3AAWG 26th General Meeting | Baltimore, October 2012 M3AAWG DMARC Training Series Mike Adkins, Paul Midgen DMARC.org October 22, 2012
  • 2. Segment 1 What is DMARC? (about 20 minutes) Segment 2 DMARC Identifier Alignment (about 20 minutes) Segment 3 DMARC Policy Records (about 30 minutes) Segment 4 DMARC Reporting (about 15 minutes) Segment 5 DMARC Information for Mailbox Providers (about 20 minutes) Segment 6 DMARC Information for Domain Owners and 3rd Parties (about 40 minutes) M3AAWG DMARC Training Videos (2.5 hours of training) This is Segment 6 of 6 The complete series of DMARC training videos is available at: https://www.m3aawg.org/activities/maawg-training-series-videos M3AAWG 26th General Meeting | Baltimore, October 2012
  • 3. M3AAWG 26th General Meeting | Baltimore, October 2012 DMARC Information for Doman Owners and 3rd Parties DMARC Segment 6 – about 40 minutes Michael Adkins, DMARC.org and M3AAWG Co-Vice Chairman October 22, 2012
  • 4. Information for Domain Owners M3AAWG 26th General Meeting | Baltimore, October 2012 • The Reporting and Compliance Process • Initial Record Publishing • 3rd Party Deployment Profiles • Report Processing and Analysis • Rolling out Policies • Long Term Monitoring
  • 5. The Reporting and Compliance Process For Domain Owners M3AAWG 26th General Meeting | Baltimore, October 2012 Publish Initial Record Process Reports Fix Infrastructure Issues Assess Initial Threat Level Process Reports Make Policy Changes Assess Current Threat Level Process Reports Fix Infrastructure Issues Phase 1: Initial Auditing Phase 2: Initial Policy Ramp-up Phase 3: Ongoing Monitoring Make Policy Changes / Other Response Abuse Detected No Abuse Detected
  • 6. Initial Record Publishing M3AAWG 26th General Meeting | Baltimore, October 2012 Everyone’s first DMARC record v=DMARC1; p=none; rua=mailto:aggregate@example.com;!
  • 7. 3rd Party Deployment Profiles M3AAWG 26th General Meeting | Baltimore, October 2012 Controlled – The Domain Owner fully controls their own DNS, and wants as much control over their email as possible. Authorized – The Domain Owner lets the 3rd party dictate the content of some DNS records, while still retaining some operational control. Delegated – The Domain Owner delegates control of their DNS to the 3rd party, and wants to be mostly hands-off with their email. Hosted – The Domain Owner allows the 3rd party to handle everything, and has little control Control / Visibility Technical Responsibility Delegated Hosted Controlled Authorized
  • 8. 3rd Party Deployment Profiles M3AAWG 26th General Meeting | Baltimore, October 2012 Controlled The Domain Owner retains control of the domain or subdomain, provides a DKIM signing key to 3rd party and publishes the public key, and includes the appropriate information in their SPF record. Pro • This scenario allows 3rd parties to send as the organizational domain if desired. • The Domain Owner retains operational control. Cons • Coordination between the domain owner and the 3rd party mailer is required to ensure proper DKIM key rotation, accurate SPF records, etc. • Risk of coordination overhead/issues increases as the number of bilateral relationships increase for domain owners and vendors.
  • 9. 3rd Party Deployment Profiles M3AAWG 26th General Meeting | Baltimore, October 2012 Controlled Contractual points • Process for DKIM key rotation. Obligations of each party, including testing. • SPF record requirements and process for adding new hosts.
  • 10. 3rd Party Deployment Profiles M3AAWG 26th General Meeting | Baltimore, October 2012 Authorized Similar to Controlled Profile, except the 3rd party creates the DKIM key pair and generally takes a more active role in dictating record content. This approach is useful for Domain Owners where a different 3rd party is providing DNS and other services for the domain. Pros • Can streamline provisioning for the 3rd party. • One less task for the Domain Owner. Cons • Can create additional management issues for Domain Owners who use multiple 3rd parties. • Possible additional contractual point for key strength requirements.
  • 11. 3rd Party Deployment Profiles M3AAWG 26th General Meeting | Baltimore, October 2012 Delegated The Domain Owner delegates a subdomain to 3rd party mailer and relies on contractual relationship to ensure appropriate SPF records, DKIM signing, and DMARC records. Pros • Reduces Domain Owner implementation issues to mostly contractual. • The 3rd party is responsible for SPF records, DKIM signing and publishing, etc. • Domain owner may still be responsible for ensuring Identifier Alignment. Con • The Domain Owner potentially gives up day to day control and visibility into operations and conformance.
  • 12. 3rd Party Deployment Profiles M3AAWG 26th General Meeting | Baltimore, October 2012 Delegated Contractual points • Creation and maintenance of SPF, DKIM and DMARC records • (Quarterly) Rotation of DKIM keys and minimum length of key (1024 recommended) • Investigation of DMARC rejections • Handling of DMARC Reports • Requirements for reporting back to the Domain Owner • Indemnification (if any) for mail lost due to improper records or signatures.
  • 13. 3rd Party Deployment Profiles M3AAWG 26th General Meeting | Baltimore, October 2012 Hosted The 3rd party is also providing DNS, webhosting, etc for the Domain Owner and makes the process mostly transparent to the domain owner. Pro • Very easy for less sophisticated Domain Owners. • Can be mostly automated by the 3rd party. Con • The domain owner is significantly more dependent on the 3rd party.
  • 14. 3rd Party Deployment Profiles M3AAWG 26th General Meeting | Baltimore, October 2012 3rd Party responsibilities Controlled Authorized Delegated Hosted Provide SPF record content Y Y Y Y Maintain SPF records N N Y Y Maintain DKIM records N N Y Y Create DKIM Keys N Y Y Y Rotate DKIM Keys Y Y Y Y Maintain DMARC Records N N Y Y Process DMARC reports N ? ? Y
  • 15. Report Processing and Analysis M3AAWG 26th General Meeting | Baltimore, October 2012 Publish Initial Record Process Reports Fix Infrastructure Issues Assess Initial Threat Level Process Reports Make Policy Changes Assess Current Threat Level Process Reports Fix Infrastructure Issues Phase 1: Initial Auditing Phase 2: Initial Policy Ramp-up Phase 3: Ongoing Monitoring Make Policy Changes / Other Response Abuse Detected No Abuse Detected
  • 16. Report Processing and Analysis M3AAWG 26th General Meeting | Baltimore, October 2012 Report Parsing Tools http://dmarc.org/resources.html If you develop report parsing tools you are willing to share, please send a note to the dmarc-discuss list and let us know.
  • 17. Report Processing and Analysis M3AAWG 26th General Meeting | Baltimore, October 2012 Step 1: Categorize the IPs in the Aggregate Report • Your Infrastructure • Authorized 3rd Parties • Unauthorized 3rd Parties * * - You should consider everything an Unauthorized 3rd Party by default.
  • 18. Report Processing and Analysis – Infrastructure Auditing M3AAWG 26th General Meeting | Baltimore, October 2012 Step 2: Infrastructure Auditing For both your Infrastructure and Authorized 3rd Parties • Identify owners • LOE for Deploying Domain Authentication • LOE for Identifier Alignment • Business case / Justification
  • 19. Report Processing and Analysis M3AAWG 26th General Meeting | Baltimore, October 2012 Step 3: Identify Malicious Email Research Unauthorized 3rd Parties and label the Abusers • Use public data sources • Vendor services • Look for known failure cases • Forensic reports
  • 20. Report Processing and Analysis M3AAWG 26th General Meeting | Baltimore, October 2012 Step 4: Perform Threat Assessment Categories • Your Infrastructure • Authorized 3rd parties • Unauthorized 3rd parties • Abusers Calculate the Sum of Unaligned Email from each Category
  • 21. Report Processing and Analysis M3AAWG 26th General Meeting | Baltimore, October 2012 Step 4: Perform Threat Assessment Phish = Unaligned Email From Abusers Definite False Positives = Unaligned Email from Your Infrastructure + Unaligned Email from Authorized 3rd parties Potential False Positives = Unaligned Email from Unauthorized 3rd parties Consider: • Phish vs. False Positives • Phish vs. Total Aligned Email If there is no Phish, you don’t have a Domain Spoofing problem and don’t need to move forward with DMARC policies.
  • 22. Initial Policy Ramp-up M3AAWG 26th General Meeting | Baltimore, October 2012 Publish Initial Record Process Reports Fix Infrastructure Issues Assess Initial Threat Level Process Reports Make Policy Changes Assess Current Threat Level Process Reports Fix Infrastructure Issues Phase 1: Initial Auditing Phase 2: Initial Policy Ramp-up Phase 3: Ongoing Monitoring Make Policy Changes / Other Response Abuse Detected No Abuse Detected
  • 23. Initial Policy Ramp-up M3AAWG 26th General Meeting | Baltimore, October 2012 Step 1: Verify Authentication and Alignment for all of your Infrastructure and all Authorized 3rd Parties. Step 2: Update your record to: p=quarantine; pct=10;! ! Do not: • Skip ‘quarantine’ and go straight to ‘reject’ • Change the policy action from ‘none’ without setting a ‘pct’
  • 24. Initial Policy Ramp-up M3AAWG 26th General Meeting | Baltimore, October 2012 Step 3: Monitor your reports for issues and address them. Make a ‘go forward / go back’ decision. Step 4: Update your record to increase the ‘pct’. Rinse and repeat until you get to ‘pct=100’.
  • 25. Initial Policy Ramp-up M3AAWG 26th General Meeting | Baltimore, October 2012 Step 5: If needed, update your record to: p=reject!
  • 26. Ongoing Monitoring M3AAWG 26th General Meeting | Baltimore, October 2012 Publish Initial Record Process Reports Fix Infrastructure Issues Assess Initial Threat Level Process Reports Make Policy Changes Assess Current Threat Level Process Reports Fix Infrastructure Issues Phase 1: Initial Auditing Phase 2: Initial Policy Ramp-up Phase 3: Ongoing Monitoring Make Policy Changes / Other Response Abuse Detected No Abuse Detected
  • 27. Ongoing Monitoring M3AAWG 26th General Meeting | Baltimore, October 2012 • Categorize new IPs in Aggregate reports • Your Infrastructure • Authorized 3rd Parties • Unauthorized 3rd Parties • Abusers • Reassess the Threat Level • Increases in phish • Changes in unaligned email volume • Make changes accordingly • Takedowns or other phish responses
  • 28. Ongoing Monitoring M3AAWG 26th General Meeting | Baltimore, October 2012 Be on the look out for: • Infrastructure changes • New products / new subdomains • New authorized 3rd parties • Mergers and acquisitions
  • 29. Resources M3AAWG 26th General Meeting | Baltimore, October 2012 Dmarc.org Resources page for tools Participate page for list sign up
  • 30. M3AAWG 26th General Meeting | Baltimore, October 2012 This has been the sixth of six DMARC video segments View the entire M3AAWG DMARC Training Series from the public training video pages on the M3AAWG website at: https://www.m3aawg.org/activities/maawg-training-series-videos Our thanks to Michael Adkins, Paul Midgen and DMARC.org for developing the material in this series and allowing M3AAWG to videotape it for professionals worldwide. Thanks to Message Bus for additional videotaping and to videographer Ilana Rothman. This video is presented by the Messaging, Malware and Mobile Anti-Abuse Working Group © slide PDF files and video copyrighted by the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG
  • 31. M3AAWG 26th General Meeting | Baltimore, October 2012 For information about M3AAWG: www.m3aawg.org www.facebook.com/maawg www.twitter.com/maawg www.youtube.com/maawg Contact us at: https://www.m3aawg.org/contact_form