SI-8: Spam Protection
|SI-8a.||Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and|
|SI-8b.||Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.|
Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, mobile devices, and notebook/laptop computers. Spam can be transported by different means including, for example, electronic mail, electronic mail attachments, and web accesses. Spam protection mechanisms include, for example, signature definitions.