Home Email Authentication

Email Authentication

OTA recognizes the critical role email plays in today's online ecosystem, and publishes the following Recommendations:

  1. Deploy email authentication across all outbound email. This allows email receivers to easily identify legitimate email, which is the necessary first step towards proecting consumers from fraudulent email.
  2. Check email authentication on all inbound email. Inbound checking allows companies to reduce the risk of spear-phishing and resulting data-loss by rejecting email from the outside world that is pretending to be from the company.
  3. Require partners to adopt email authentication — deploy outbound and check inbound. When ready, apply controls to reject partner email that fails authentication. Ask business partners to do the same. Doing this allows companies to reduce the risk of being spear-phished and to begin attaching trust to partner communications.

OTA supports the implementation of the above Recommendations by providing the following resources:

  • Training Workshops
  • Deployment Guide — Outbound Email Authentication
  • Deployment Guide — Inbound Email Authentication
  • Deployment Guide — Partner Adoption
  • Off-the-shelf Product Requirements Document (PRD) to help adopters explain their requirements to vendors