Follow

What are the Certification security requirements?

Take adequate, industry-standard steps to keep your systems and databases secure so you can protect your infrastructure and your subscribers.

Secure systems

A secure system prevents malware (such as viruses, worms, spyware, adware, trojans, recursive Domain Name System [DNS], and more) from infiltrating your infrastructure, and it prevents open proxies or open relays that would allow unauthorized content to be sent from your certified IP addresses.

To comply with system security requirements, certified senders must:

  • Not have open relays or open proxies
  • Have a valid reverse DNS record
  • Have a fully qualified DNS record (FQDN)
  • Have consistent HELO server names
  • Have a fully qualified DNS record with an FQDN
  • Maintain IP groups with no more than three discreet netblocks
  • Have a Sender Policy Framework (SPF) record

Secure databases

Secure data systems protect your mail program and the subscriber information you keep by preventing others from tampering with recipient email addresses and related personal information. Data breaches appear in the headlines every day; protecting subscriber information should be a priority.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request