All Controls
Security Control

Spam & Phishing Filters

NIST DetectDE.CM-1CIS Control 9: Email and Web Browser Protections

What This Control Means

Email filtering is the deployment of automated systems that scan inbound email to identify and block spam, phishing attempts, malware attachments, and business email compromise (BEC) schemes. Email remains the primary attack vector for most organizations, with phishing responsible for the initial foothold in a large percentage of breaches and ransomware incidents.

Modern email filtering goes far beyond simple spam detection. Advanced threat protection features analyze URLs in real time (rewriting and scanning them at the time of click), detonate attachments in sandboxes to detect zero-day malware, and use machine learning to identify impersonation attempts where an attacker spoofs a trusted sender's name or writing style. These capabilities are available in platforms like Microsoft Defender for Office 365, Proofpoint, Mimecast, and Google Workspace's advanced security features.

Configuration matters as much as the choice of platform. Email filters should be tuned to block executable file types (.exe, .scr, .js), password-protected archives (commonly used to bypass scanning), and messages with mismatched display names and sender addresses. Quarantine policies should route suspicious messages for admin review rather than silently dropping them, ensuring that legitimate messages are not lost.

Email filtering should be complemented by internal email security measures. Outbound filtering can detect data exfiltration attempts and compromised accounts sending spam. Transport rules can flag external emails with a visible banner warning recipients that the message originated outside the organization, a simple but effective defense against impersonation attacks.

Why Insurers Care

Email filtering is a baseline expectation on cyber insurance applications. Insurers ask about the specific platform and features deployed because email is the leading entry point for the attacks that generate the most claims, ransomware and business email compromise. Organizations relying on basic, unconfigured email filtering may face higher premiums.

Advanced email protection features such as URL sandboxing, attachment detonation, and impersonation detection directly reduce the likelihood of successful phishing attacks. Insurers view these features favorably and may offer better terms to organizations that can demonstrate comprehensive email security.

Industry-Specific Notes

Healthcare (HIPAA)

Healthcare is one of the most targeted industries for phishing, with attackers seeking access to ePHI and EHR systems. Email filtering must catch both mass phishing campaigns and targeted spear-phishing directed at clinical staff and administrators. HIPAA's security awareness training requirements should be complemented by strong technical email controls.

Legal (ABA Guidelines)

Law firms are frequent targets of spear-phishing aimed at intercepting wire transfer instructions, stealing client data, and compromising privileged communications. Email filtering must be particularly aggressive in detecting BEC attempts that impersonate partners, clients, or opposing counsel.

Financial Services (GLBA/PCI-DSS)

Financial institutions face constant phishing attacks targeting credentials for banking systems and wire transfer authorization. FFIEC guidance requires email security controls, and PCI-DSS Requirement 5 extends anti-malware requirements to include email-borne threats. Financial institutions should deploy the most advanced available email filtering.

Retail / E-commerce (PCI-DSS)

Retail organizations are targeted by phishing campaigns that seek POS credentials, e-commerce admin access, and customer databases. Seasonal spikes in email volume during holiday periods create additional risk. Email filtering must scale to handle increased volume without degrading protection.

Government / Defense (CMMC 2.0)

CISA's Binding Operational Directive 18-01 requires federal agencies to implement DMARC, which works in conjunction with email filtering to prevent spoofed messages. Government contractors must protect their email systems to prevent compromise of CUI. CMMC assessors evaluate email security as part of the Security Protection subcategory.

Implementation Steps

Deploy advanced email filtering with URL rewriting, attachment sandboxing, and impersonation detection

Block high-risk attachment types (executables, scripts, password-protected archives) at the mail gateway

Enable external email banners to visually flag messages originating from outside the organization

Configure quarantine policies for suspicious messages with admin review and user notification

Monitor email filtering dashboards weekly for trends in blocked threats and false positives

Want to know how your organization measures up on this control?

Take the free assessment →