{"id":30252,"date":"2023-05-23T23:40:21","date_gmt":"2023-05-23T23:40:21","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=30252"},"modified":"2023-06-27T16:57:53","modified_gmt":"2023-06-27T16:57:53","slug":"sender-policy-framework","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/","title":{"rendered":"What Is Sender Policy Framework? SPF Email Explained"},"content":{"rendered":"\n<p>The Sender Policy Framework (SPF) authentication method identifies the authorized mail servers permitted to send email on behalf of a given domain. The SPF standard helps to solve the problem of how to identify official sources of email from an organization. When an organization sets up SPF, it helps Internet Service Providers (ISPs), email security vendors, and other email providers to validate an organization\u2019s email communication and distinguish authorized communications from spoofed emails or phishing attacks attempting to impersonate that domain.<\/p>\n\n\n\n<p>This article helps to understand:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#mechanics\">How does Sender Policy Framework Work?<\/a><\/li>\n\n\n\n<li><a href=\"#implementation\">How to Set Up SPF<\/a><\/li>\n\n\n\n<li><a href=\"#pros\">Sender Policy Framework Advantages<\/a><\/li>\n\n\n\n<li><a href=\"#cons\">Sender Policy Framework Limitations<\/a><\/li>\n\n\n\n<li><a href=\"#faqs\">Sender Policy Framework FAQs<\/a><\/li>\n\n\n\n<li><a href=\"#bottom-line\">Bottom Line: SPF &#8211; A Critical First Step to Eliminate Phishing<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mechanics\">How Does Sender Policy Framework (SPF) Work?<\/h2>\n\n\n\n<p>SPF enables a form of email authentication that defines the domains and internet protocol (IP) addresses authorized by an organization to send emails. SPF deploys within the Domain Name Service (DNS) records with the organization\u2019s domain hosting provider.<\/p>\n\n\n\n<p>Email-receiving servers check the email header for the sending domain and then perform a DNS lookup to see if an SPF file exists that matches the sending domain. When the SPF Record\u2019s sending domain matches the Email Header\u2019s sending domain, the email passes the SPF check and may be delivered to the recipient. When an SPF record does not exist or the email\u2019s sending domain does not match the published DNS records, the email may be rejected or sent to a spam folder.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"793\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2023\/06\/eSP-SPF-1024x793.png\" alt=\"eSP: How SPF Lookup Works\" class=\"wp-image-30851\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-SPF-1024x793.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-SPF-300x232.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-SPF-768x595.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-SPF-1536x1190.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-SPF-2048x1586.png 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-SPF-150x116.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-SPF-696x539.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-SPF-1068x827.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/eSP-SPF-1920x1487.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">How SPF Lookup Works<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">SPF Fundamentals<\/h3>\n\n\n\n<p>To understand how SPF works, it is important to understand the SPF file structure and file options.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Basic SPF File Structure<\/h4>\n\n\n\n<p>The <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc7208\" target=\"_blank\" rel=\"noreferrer noopener\">Internet Engineering Task Force (IETF)<\/a> publishes the full information on the SPF and its standards which were last updated in 2014. At its core, the SPF file consists of a simple .txt file uploaded to the DNS record on an organization\u2019s domain hosting provider. It is also important to note that SPF records cannot exceed 10 tags or 255 characters, which can cause significant limitations for larger organizations.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">SPF File Options<\/h4>\n\n\n\n<p>The basic file structure uses the syntax:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">&lt;version&gt; &lt;IP4 and\/or IP6 address&gt; &lt;include: domain&gt; &lt;all tag&gt;<\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Version<\/strong> will always be \u201cv=spf1\u201d as all other SPF versions have been discontinued<\/li>\n\n\n\n<li><strong>IP Address<\/strong>\n<ul class=\"wp-block-list\">\n<li>Can be either the IP4 or IP6 address for IP addresses authorized to send email on behalf of the domain<\/li>\n\n\n\n<li>Will be in the format ip4:&lt;ip4-address&gt;, ip4:&lt;ip4-network&gt;\/&lt;prefix-length&gt;, ip6:&lt;ip6-address&gt;, ip6:&lt;ip6-network&gt;\/&lt;prefix-length&gt;<\/li>\n\n\n\n<li>The prefix-length will be assumed to be \/32 for IP4 and \/128 assumed for IP6; IP4 prefix-lengths less than \/16 should not be used to avoid impact to smaller receivers<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Include<\/strong> syntax will be \u201cinclude:senderdomain.net\u201d where senderdomain.net is the domain of a third-party authorized to send emails on behalf of the organization; preceding the command with a \u201c?\u201d flags emails as neutral instead of pass if they match the sending domain<\/li>\n\n\n\n<li><strong>All<\/strong> tags provide other servers with recommendations for how to handle emails that fail an SPF check:\n<ul class=\"wp-block-list\">\n<li>-all = reject emails that fail SPF check<\/li>\n\n\n\n<li>~all = mark emails that fail SPF check as suspicious<\/li>\n\n\n\n<li>?all = recipient server can determine what to do with emails that fail the SPF check<\/li>\n\n\n\n<li>+all = allow any domain to send emails on behalf of the organization (not recommended)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>The Sender Policy Framework allows for many other options, but their use can be dangerous. Organizations seeking to use these options should work carefully with their vendors and IT staff to ensure correct syntax and usage. Examples of the more advanced options include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201ca\u201d mechanism provides a domain or network address within which all records are checked for matches<\/li>\n\n\n\n<li>\u201cmx\u201d mechanism provides a list of mail exchange ip addresses<\/li>\n\n\n\n<li>\u201cptr\u201d will be used by an organization that allows all of its servers to send mail; not typically used<\/li>\n\n\n\n<li>\u201cexists\u201d performs a query on the domain looking for a match to the SPF record<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Related Email Standards<\/h3>\n\n\n\n<p>SPF provides authentication with a narrow scope. A more robust solution will also implement the DKIM and DMARC authorization frameworks as well.<\/p>\n\n\n\n<p><strong>DKIM:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dkim\/\">DomainKeys Identified Mail<\/a> (DKIM) enables an organization to digitally sign emails from their domain using public key cryptography.<\/p>\n\n\n\n<p><strong>DMARC:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-dmarc\/\">Domain-based Message Authentication Reporting and Conformance<\/a> (DMARC) enables more direct control over emails that fail SPF and DKIM and enables reporting on legitimate and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\">spoofed emails<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"implementation\">How to Set Up SPF<\/h2>\n\n\n\n<p>Sender Policy Framework (SPF) can be simple to set up and configure. At its most basic level, SPF just requires a simple one line change to a domain record in order to work. For example, with many hosting companies, you\u2019d complete the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Log into the domain registrar and click on the option to manage or configure DNS settings<\/li>\n\n\n\n<li>Find and click the \u201cAdd a New Record\u201d option and choose a \u201cTXT\u201d record<\/li>\n\n\n\n<li>In the host name dialogue, enter either @ or the name of your domain.<\/li>\n\n\n\n<li>Copy-paste the SPF information into \u201cvalue,\u201d which defines SPF options<\/li>\n<\/ol>\n\n\n\n<p>While simple in theory, many organizations will have specialized requirements that require additional options or modifications. For example, both <a href=\"https:\/\/support.google.com\/a\/answer\/33786?hl=en#zippy=%2Chelps-prevent-spoofing%2Chelps-deliver-messages-to-recipients-inboxes\" target=\"_blank\" rel=\"noreferrer noopener\">Google<\/a> and <a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/email-authentication-anti-spoofing?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft<\/a> publish specific instructions for including Gmail and Microsoft 365 mail servers into SPF files. After drafting an initial SPF, the organization should also check with their domain hosting provider and their various mail services (EX: HubSpot, Mailchimp) to ensure that the SPF has been properly drafted and configured.<\/p>\n\n\n\n<p>For organizations that need additional assistance there are many services that can operate on the organization\u2019s behalf to draft and enable SPF. These services are available either as a standalone service or in a package with DKIM and <a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-set-up-and-implement-dmarc-email-security\/\">DMARC deployment<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Verifying and Troubleshooting SPF<\/h3>\n\n\n\n<p>After implementing SPF, it may take several days for the DNS record to propagate across the internet. However, after that takes place, the company can send emails and inspect the header of the email for \u201cspf=pass.\u201d<\/p>\n\n\n\n<p>Of course, it can be easy to incorrectly deploy the SPF, so if any issues are encountered, the organization should check for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Incorrect syntax<\/strong> such as extra spaces, typographical errors, etc.<\/li>\n\n\n\n<li><strong>More than 10 email senders<\/strong>, since this will cause errors. If an organization has more than 10 authorized sending domains, they may need to establish multiple SPF records using sub-domains.<\/li>\n\n\n\n<li><strong>More than 255 characters<\/strong> between sending domains and optional flags \u2014 these will be invalid, so the SPF will need to be shortened, corrected, and refiled.<\/li>\n\n\n\n<li><strong>Incorrect vendor information<\/strong>, which can create SPF fail conditions. Work with the vendor to make sure the information in the SPF reflects the specific IP address or domain used to send the emails instead of bounceback domains, website URLs, etc.<\/li>\n\n\n\n<li><strong>Unnecessary \u201ca\u201d and \u201cmx\u201d entries<\/strong>, as these can cause confusion and errors since instead of reflecting the outbound email server IP address, the \u201ca\u201d address will typically be the domain\u2019s web host IP address and the \u201cmx\u201d hosts are typically used for inbound emails.<\/li>\n<\/ul>\n\n\n\n<p>Email authentication vendors <a href=\"https:\/\/dmarcian.com\/spf-survey\/\" target=\"_blank\" rel=\"noreferrer noopener\">such as dmarcian<\/a> will offer free tools that can provide a quick analysis of the SPF record and help an organization to troubleshoot issues.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"pros\">SPF Advantages<\/h2>\n\n\n\n<p>A properly configured SPF provides two key tangible benefits: impersonation mitigation and improved domain reputation. For most organizations, these benefits should outweigh the more numerous but minor disadvantages.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Impersonation Mitigation<\/h3>\n\n\n\n<p>The subset of email phishing attacks known as email spoofing attempt to impersonate legitimate organizations to improve the likelihood of tricking a reader. When deploying a properly configured SPF, it becomes more difficult to impersonate the organization.<\/p>\n\n\n\n<p>When any mail server receives a spoofed email, it will compare the sending IP address against the SPF file and reject the spoofed email that does not originate from the organization\u2019s mail server. This will help to protect the reputation of the company by blocking spam emails trying to use the organization\u2019s brand. Additionally, it can block phishing attacks attempting to spoof the organization\u2019s own employees \u2014 such as when a phishing attack attempts to impersonate the CEO.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Improved Domain Reputation<\/h3>\n\n\n\n<p>When an organization does not establish an SPF, email servers that receive the organization\u2019s emails may flag or reject them because authenticity of the organization\u2019s domain cannot be verified. Establishing an SPF improves the reputation of the organization\u2019s domain and improves the deliverability rate of legitimate emails.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cons\">Limitations of Sender Policy Framework<\/h2>\n\n\n\n<p>SPF provides protection against spam, spoofing, and phishing email and bolsters <a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-security\/\">email security<\/a> worldwide. However, it also suffers from numerous, although more minor, limitations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Challenging to Maintain<\/h3>\n\n\n\n<p>Organizations must keep their SPF records constantly updated even as their vendors change email servers, the organization changes ISP providers, or marketing adds new email newsletter services. Changes can be time-consuming and cumbersome to verify with all parties, which makes DNS updates difficult to do regularly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Breakable via Improper Email Forwarding<\/h3>\n\n\n\n<p>Forwarded emails often change the sending IP address, which causes the SPF check to fail. Organizations should correct server settings so that forwarded emails retain the correct information, but many do not.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Incomplete Solution<\/h3>\n\n\n\n<p>SPF only verifies the sending domain in the email header and does not compare against the \u201cfrom\u201d email address presented to the user. If a phishing attacker applies their own SPF file with their own sending domain, the SPF will pass as valid. To be more robust, SPF, DKIM, and DMARC should be used in combination to protect an organization\u2019s reputation and validated emails.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Large Organization Issues<\/h3>\n\n\n\n<p>The larger an organization, the more likely it is to have a large number of servers and services sending email for the organization. With a 255 character limit and a 10 address DNS lookup limit, larger organizations cannot publish all of their sending IP addresses in a single SPF record. Instead, they must use sub-domains to work around SPF limitations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Poor ROI Measurements<\/h3>\n\n\n\n<p>Although the organization can recognize reputation improvements and more reliably deliverable emails, these benefits will be difficult to quantify for return on investment measurements. Additionally, the primary benefit generally applies to others: the email servers and email security tools that receive the emails and perform the check on the SPF record to block spam and phishing email. While the investment is low to implement SPF, the intangible ROI and benefits explain why adoption isn\u2019t higher than <a href=\"https:\/\/dl.acm.org\/doi\/fullHtml\/10.1145\/3471621.3471842\" target=\"_blank\" rel=\"noreferrer noopener\">50%<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Potentially Spoofable<\/h3>\n\n\n\n<p>SPF can be adopted by any organization \u2014 even malicious actors and spammers. Since a SPF check does not include the \u201cFrom\u201d information in the body of the email, malicious actors can publish their own SPF file to authenticate their spoofed emails or spam using their own domain information and then present the email recipient with completely different information in the \u201cFrom\u201d field visible through the email program.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Requires Proper Email Server Settings<\/h3>\n\n\n\n<p>SPF only works on email servers set up to check for SPF or using email security tools performing the same task. Servers can easily skip SPF checks and allow spam and spoofing emails to proliferate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"faqs\">SPF FAQS:<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">What is a Sender Policy Framework (SPF) record?<\/h3>\n\n\n\n<p>Until 2014, some SPF files could use their own file format, called an SPF record. Since 2014, an SPF record is a line of text that is stored in the DNS of a domain and contains all necessary SPF information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is an SPF record check?<\/h3>\n\n\n\n<p>An SPF record check, sometimes called an SPF validator, determines if an SPF record is valid by looking up the DNS record for a domain. SPF record check tools display any records found and test the record to flag potential issues that could affect mail delivery.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"bottom-line\">Bottom Line: SPF &#8211; A Critical First Step to Eliminate Phishing<\/h2>\n\n\n\n<p>Phishing remains the primary vector for cybersecurity and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network attacks<\/a> because too many spoofing emails remain unflagged. SPF is the first step in the SPF-DKIM-DMARC email authentication process that could block the vast majority of phishing emails if enough organizations adopt SPF along with DKIM and DMARC. While tedious to maintain, the low cost to deploy SPF should encourage all organizations to adopt SPF as a first step toward fighting email phishing world-wide \u2014 or at the very least protecting themselves against phishing impersonating their own domain.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f3100d672-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f3100d672\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f3100d672\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f3100d672\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f3100d672\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f3100d672\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f3100d672\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn about SPF email security technology definitions, implementation, related technology, advantages, and more.<\/p>\n","protected":false},"author":271,"featured_media":30253,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[2369,3790,31991,31946,839,3414,730,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[398,394,383,378,31789,380,392],"class_list":["post-30252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-cloud-security","tag-cybersecurity","tag-email-encryption","tag-email-gateway","tag-email-security","tag-network-security","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-anti-spam","b2b_product-email-security","b2b_product-encryption-data-loss-prevention","b2b_product-endpoint-security","b2b_product-phishing-and-spear-phishing","b2b_product-policy-compliance","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Sender Policy Framework? SPF Email Explained<\/title>\n<meta name=\"description\" content=\"Learn about SPF email security technology definitions, implementation, related technology, advantages, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Sender Policy Framework? SPF Email Explained\" \/>\n<meta property=\"og:description\" content=\"Learn about SPF email security technology definitions, implementation, related technology, advantages, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-23T23:40:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-27T16:57:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-sender-policy\u2013framework.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"788\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"What Is Sender Policy Framework? SPF Email Explained\",\"datePublished\":\"2023-05-23T23:40:21+00:00\",\"dateModified\":\"2023-06-27T16:57:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/\"},\"wordCount\":2018,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-sender-policy\u2013framework.png\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"email encryption\",\"email gateway\",\"email security\",\"network security\",\"security\",\"Web security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/\",\"name\":\"What Is Sender Policy Framework? SPF Email Explained\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-sender-policy\u2013framework.png\",\"datePublished\":\"2023-05-23T23:40:21+00:00\",\"dateModified\":\"2023-06-27T16:57:53+00:00\",\"description\":\"Learn about SPF email security technology definitions, implementation, related technology, advantages, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-sender-policy\u2013framework.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-sender-policy\u2013framework.png\",\"width\":1400,\"height\":788,\"caption\":\"Blue shield with envelope emblem on a blue digital background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Sender Policy Framework? SPF Email Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Sender Policy Framework? SPF Email Explained","description":"Learn about SPF email security technology definitions, implementation, related technology, advantages, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/","og_locale":"en_US","og_type":"article","og_title":"What Is Sender Policy Framework? SPF Email Explained","og_description":"Learn about SPF email security technology definitions, implementation, related technology, advantages, and more.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/","og_site_name":"eSecurity Planet","article_published_time":"2023-05-23T23:40:21+00:00","article_modified_time":"2023-06-27T16:57:53+00:00","og_image":[{"width":1400,"height":788,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-sender-policy\u2013framework.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"What Is Sender Policy Framework? SPF Email Explained","datePublished":"2023-05-23T23:40:21+00:00","dateModified":"2023-06-27T16:57:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/"},"wordCount":2018,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-sender-policy\u2013framework.png","keywords":["cloud security","cybersecurity","email encryption","email gateway","email security","network security","security","Web security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/","url":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/","name":"What Is Sender Policy Framework? SPF Email Explained","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-sender-policy\u2013framework.png","datePublished":"2023-05-23T23:40:21+00:00","dateModified":"2023-06-27T16:57:53+00:00","description":"Learn about SPF email security technology definitions, implementation, related technology, advantages, and more.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-sender-policy\u2013framework.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-sender-policy\u2013framework.png","width":1400,"height":788,"caption":"Blue shield with envelope emblem on a blue digital background."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"What Is Sender Policy Framework? SPF Email Explained"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30252"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=30252"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30252\/revisions"}],"predecessor-version":[{"id":30853,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30252\/revisions\/30853"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/30253"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=30252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=30252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=30252"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=30252"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=30252"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=30252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}