{"id":9331,"date":"2021-12-06T08:00:47","date_gmt":"2021-12-06T05:00:47","guid":{"rendered":"https:\/\/www.anm.ro\/en\/?page_id=9331"},"modified":"2023-03-02T09:57:18","modified_gmt":"2023-03-02T06:57:18","slug":"the-itc-security-policy","status":"publish","type":"page","link":"https:\/\/www.anm.ro\/en\/the-itc-security-policy\/","title":{"rendered":"The IT&#038;C Security policy"},"content":{"rendered":"<p><strong>Submission and receipt of messages by e-mail (e-mail@anm.ro) <\/strong><br \/>\nIn line with the NAMMDR IT&#038;C security procedures and the European Commission&#8217;s recommendations to counter phishing attacks, message authentication, reporting and compliance will be domain-based (Domain-based Message Authentication, Reporting and Conformance &#8211; DMARC).<br \/>\nSecurity issues recommended for e-mail delivery to the anm.ro domain:<br \/>\n<span style=\"color: green;\"><strong>\u2713<\/strong><\/span> DMARC (Domain-based Message Authentication, Reporting and Conformance)<br \/>\n<span style=\"color: green;\"><strong>\u2713<\/strong><\/span> SPF (Sender Policy Framework)<br \/>\n<span style=\"color: green;\"><strong>\u2713<\/strong><\/span> Reverse DNS<br \/>\n<span style=\"color: green;\"><strong>\u2713<\/strong><\/span> No Open Relay<\/p>\n<p><strong>Recommendations for network administrators<\/strong> according to the National Cyber Security Directorate &#8211; <a href=\"https:\/\/dnsc.ro\/\" target=\"_blank\" rel=\"noopener\">https:\/\/dnsc.ro\/<\/a><\/p>\n<p>\u2022 <strong>Configuration of the server you manage (DNS, SPF &#8211; Sender Policy Framework and DKIM &#8211; Domain Key Identified Mail records), depending on your company&#8217;s\/institution&#8217;s security policy<\/strong><\/p>\n<p>SPF<br \/>\nThe SPF controls IP addresses, which are allowed to send e-mails on behalf of the domain. All e-mails are usually sent from the IP address assigned to the server. If the domain has a dedicated IP address, it must be authorised to send e-mails.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14330\" src=\"https:\/\/www.anm.ro\/wp-content\/uploads\/2021\/12\/SPF1.jpg\" alt=\"\" width=\"602\" height=\"116\" \/><br \/>\nDKIM<br \/>\nTo generate the key, go to opendkim.org<br \/>\nIt is vital to make sure that everything is fine in terms of SPF and DKIM settings! Otherwise, you may end up with legitimate e-mails being rejected by the destination server.<\/p>\n<p>\u2022 <strong>We recommend using the &#8216;QUARANTINE&#8217; policy for DMARC<\/strong><\/p>\n<p>DMARC is the e-mail protocol for authentication and reporting which protects your online digital identity from being used in illegal activities (e.g. unauthorised financial transactions).<\/p>\n<p><strong>DMARC<\/strong> &#8211; acronym for Domain Based Message Authentication, Reporting and Conformance.<br \/>\n<strong>Authentication<\/strong> &#8211; is based on two authentication methods, the SPF (Sender Policy Framework) and the DKIM (DomainKeys Identified Mail)<br \/>\n<strong>Reporting<\/strong> &#8211; ensures visibility of rejected e-mails<br \/>\n<strong>Conformance<\/strong> &#8211; standardizes the manner in which rejected e-mails are handled, by applying flexible policies, namely none, quarantine or reject.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14331\" src=\"https:\/\/www.anm.ro\/wp-content\/uploads\/2021\/12\/SPF2.jpg\" alt=\"\" width=\"602\" height=\"207\" \/><br \/>\nThere are three types of DMARC policies:<\/p>\n<p>\u2013 <strong>NONE<\/strong>: All e-mails shall be sent. DMARC reports can be analysed to detect the sender of the e-mail on your behalf. Afterwards, you can move on to the next policy, Quarantine;<br \/>\n\u2013 <strong>QUARANTINE<\/strong>: All e-mails which do not comply with DMARC validation will be marked as spam and automatically filtered by the destination server (they will enter the SPAM \/ JUNK directory);<br \/>\n\u2013 <strong>REJECT<\/strong>: If this restrictive policy is employed, in the event that DMARC fails, the order to reject the e-mail will be sent to the destination server without being filtered. If this method is employed, no one will be able to send e-mails on your behalf.<\/p>\n<p><strong>Report an IT&#038;C technical incident or problem<\/strong><br \/>\n<iframe loading=\"lazy\" id=\"contact-form\" src=\"\/scripts\/technical-form-en.php\" width=\"100%\" height=\"500px\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" data-mce-fragment=\"1\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Submission and receipt of messages by e-mail (e-mail@anm.ro) In line with the NAMMDR IT&#038;C security procedures and the European Commission&#8217;s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-9331","page","type-page","status-publish","hentry"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.anm.ro\/en\/wp-json\/wp\/v2\/pages\/9331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.anm.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.anm.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.anm.ro\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.anm.ro\/en\/wp-json\/wp\/v2\/comments?post=9331"}],"version-history":[{"count":3,"href":"https:\/\/www.anm.ro\/en\/wp-json\/wp\/v2\/pages\/9331\/revisions"}],"predecessor-version":[{"id":9749,"href":"https:\/\/www.anm.ro\/en\/wp-json\/wp\/v2\/pages\/9331\/revisions\/9749"}],"wp:attachment":[{"href":"https:\/\/www.anm.ro\/en\/wp-json\/wp\/v2\/media?parent=9331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}