When it comes to keeping sensitive information safe, email security is a top priority for both individuals and organisations.
As a researcher of digital identity protection, I've spent years studying the best practices for safeguarding personal and professional data, so I understand the critical importance of getting email security right.
One effective way to boost email security is through encryption, and S/MIME is one of the main types of encryption used for email.
Let's explore what S/MIME encrypted email is, how it works, why it matters, and how you can put it to use in your organisation.
S/MIME, short for Secure/Multipurpose Internet Mail Extensions, is a widely used protocol that enables email encryption and digital signatures.
Originally developed in 1995 by RSA Data Security, S/MIME has since become a standard for securing email communications, ensuring confidentiality and authenticity for both senders and recipients.
With S/MIME, you get two core layers of security:
S/MIME is built on a cryptographic foundation known as Public Key Infrastructure (PKI).
This framework is what makes it possible for S/MIME to provide encryption and digital signatures that keep emails secure and authentic.
S/MIME relies on asymmetric encryption, a system that uses two keys—a public key and a private key—to lock and unlock email content:
S/MIME also secures emails by adding a digital signature, which verifies the authenticity of the sender and the integrity of the message:
By signing the email with their private key, it also removes the risk of the sender later claiming that they didn’t send the message, adding a layer of accountability (otherwise known as non-repudiation) to the exchange.
"Implementing S/MIME is like adding a secure seal to every email—this helps to make sure only the right eyes see your message."
— Mike Wakefield, CTO, Beyond Encryption
A key part of S/MIME's security comes from trusted third-party Certificate Authorities (CAs).
CAs are the bodies that issue digital certificates to verify the authenticity of users, playing a crucial role in building trust.
Becoming a CA involves rigorous processes, as they must comply with strict standards and audits to maintain trustworthiness.
Impersonating a CA is exceptionally difficult due to the numerous security protocols and regulatory oversight involved, making it nearly impossible for malicious actors to forge trusted certificates.
S/MIME encryption addresses several common email security challenges, including phishing, man-in-the-middle attacks, and email spoofing:
96% of organisations have experienced at least one phishing attack in the past year.
S/MIME helps to reduce the risk of phishing by verifying that an email is genuinely from the claimed sender, providing an added layer of reassurance to email recipients.
This type of attack involves intercepting communications between two parties.
According to IBM’s X-Force Threat Intelligence Index, 35% of exploitation activity involves man-in-the-middle attacks.
S/MIME’s encryption makes it extremely difficult for attackers to access or alter emails while they are in transit, reducing this threat.
A common tactic in spam and phishing campaigns, email spoofing is combated by S/MIME’s digital signature, which confirms the email’s authenticity and ensures it hasn’t been tampered with during transmission.
This verification establishes a foundation of trust between the communicating parties.
Using S/MIME encryption in email communications comes with a range of benefits that go beyond just security (although that’s a key aspect):
S/MIME provides a high level of security for emails containing sensitive information by encrypting the email content and attachments, making it challenging for unauthorised parties to intercept or tamper with the message during transit.
Digital signatures are used to confirm the sender’s identity, minimising the risk of email spoofing.
This helps the recipient verify that the email genuinely came from the sender and wasn't altered during transmission, fostering secure communication.
S/MIME guarantees that the email content and attachments remain unchanged during transmission.
The digital signature makes sure that any tampering is detectable, preserving the integrity of the message and boosting trustworthiness.
For organisations, S/MIME can help meet regulatory requirements by securing email communications and protecting sensitive data.
This compliance is crucial for avoiding legal repercussions tied to data breaches or compromised information.
"In an age of relentless cyber threats, email encryption has evolved from a security measure to a legal obligation."
— Paul Holland, Founder, Beyond Encryption.
S/MIME encryption is used across numerous industries and applications, including government, healthcare, legal, and financial sectors.
Government bodies, including local councils and central agencies, can use S/MIME to secure internal and inter-departmental communications.
This ensures compliance with data protection legislation such as The UK GDPR and the Data Protection Act 2018, as well as cybersecurity standards like the UK Government’s Cyber Essentials scheme.
Healthcare providers, including the NHS and private medical organisations, utilise S/MIME to safeguard the transmission of patients' sensitive medical records and personal data.
This ensures compliance with healthcare regulations such as the Data Security and Protection Toolkit (DSPT) and NHS Digital standards.
Law firms handle vast amounts of confidential client data, including sensitive legal documents and intellectual property.
S/MIME is used to protect solicitor-client communications, ensuring that these exchanges remain secure and confidential in line with Solicitors Regulation Authority (SRA) guidelines.
UK banks, investment firms, and other financial institutions use S/MIME to secure sensitive financial information sent via email, ensuring compliance with industry regulations.
These regulations can include those set by the Financial Conduct Authority (FCA) and the Payment Services Directive 2 (PSD2), which mandate robust protection of customer data during electronic communications.
Rolling out S/MIME in your organisation requires careful planning, the right configuration, and ongoing management to keep things running smoothly and securely.
It’s essential to clearly communicate the reasons for adopting S/MIME to all stakeholders, emphasising the security and compliance benefits in straightforward terms.
Here’s a quick guide to incorporating S/MIME encrypted email in your organisation:
To use S/MIME for encrypted or signed emails, each user will need a digital certificate.
These certificates can be obtained from trusted Certificate Authorities (CAs), such as GlobalSign, Sectigo, or Digicert.
The CA will typically verify each user’s identity, ensuring that the certificates are securely linked to legitimate individuals or organisations.
Tips:
Once the digital certificates are issued, they need to be installed on each user’s device.
The installation steps may vary depending on the email client and operating system, but they typically involve importing the certificate into the system’s keychain or certificate store.
Tips:
After installing the certificates, the next step is configuring email clients to use them for encryption and digital signatures.
This configuration defines the default actions for signing and encrypting emails, as well as how certificate validation is handled, ensuring strong security without compromising usability.
Steps:
While encrypting all emails is ideal, it may sometimes create compatibility issues if recipients aren’t set up with S/MIME.
Ensure your system allows flexibility to send unencrypted emails when necessary while still adhering to security policies.
"Proper configuration of email clients is the linchpin in S/MIME deployment—it bridges the gap between security and usability."
— Carole Howard, Head of Networks, Beyond Encryption
User training is essential for successfully implementing S/MIME encryption. It’s not just about showing them how to use the system but also helping them understand why it matters.
Training should cover:
Tips:
Setting up clear, formal policies for S/MIME use is crucial for maintaining consistent security practices across the organisation.
These policies should cover:
Example policies:
Effective certificate management is essential to keeping S/MIME secure and reliable.
Certificates have expiry dates, and it’s critical to stay on top of renewals to avoid disruptions or lapses in secure communication.
Key tasks:
"Managing certificate lifecycles proactively prevents security gaps that could be exploited—it's a vital part of any encryption strategy."
— Mike Wakefield, CTO, Beyond Encryption
While S/MIME is a powerful option for email security, other encryption methods might better fit specific organisational needs.
Here’s a look at some common alternatives, along with their benefits and limitations:
PGP is another popular encryption method that, like S/MIME, offers both encryption and digital signature capabilities, similar to S/MIME.
However, instead of relying on certificates from central authorities, PGP uses a web-of-trust model, which provides a more decentralised approach to managing trust and keys.
Pros:
Cons:
TLS is a protocol that focuses on securing the connection between mail servers, ensuring that emails remain protected while they’re being transmitted across the internet.
Pros:
Cons:
"TLS offers a good baseline of security, but for sensitive data, end-to-end encryption methods like S/MIME are indispensable."
— Emily Plummer, Marketing Director, Beyond Encryption
End-to-end encryption (E2EE) ensures that only the intended sender and recipient can access the content of the email.
Unlike other encryption methods like TLS, E2EE secures the data from the moment it leaves the sender’s device until it is decrypted by the recipient, leaving no point during transmission or storage where intermediaries (like email servers) can access or read the email.
Pros:
S/MIME encrypted email is a powerful solution for enhancing email security, offering strong encryption, reliable authentication, and message integrity.
It strikes a solid balance between usability and robust protection, making it an ideal choice for organisations that need to safeguard sensitive information.
However, it’s essential to explore and consider other encryption options based on your organisation’s specific needs.
By evaluating the strengths and limitations of each method, businesses can select the approach that best aligns with their security requirements, ensuring that sensitive communications are well-protected against evolving cyber threats.
S/MIME stands for Secure/Multipurpose Internet Mail Extensions. It is a widely used protocol that secures email communications through encryption and digital signatures, ensuring both confidentiality and authenticity of messages.
Enabling S/MIME is highly recommended if you handle sensitive or confidential information. It enhances email security by encrypting content and authenticating the sender, significantly reducing risks such as phishing, email spoofing, and man-in-the-middle attacks.
S/MIME tackles email security challenges by encrypting messages so that only intended recipients can access them, adding digital signatures to verify the sender’s identity, and ensuring message integrity to detect tampering during transmission.
While S/MIME provides robust security, it does come with drawbacks. Digital certificates must be obtained from trusted Certificate Authorities, which can be costly and administratively burdensome. Both the sender and recipient need compatible email clients and certificates, which can limit usability.
Gmail does offer support for S/MIME, but only for enterprise users with Google Workspace accounts. Configuring S/MIME on Gmail involves using digital certificates to enable encrypted and signed email communication, providing an extra layer of security.
To use S/MIME in Outlook, you will need to acquire a digital certificate from a trusted Certificate Authority, such as GlobalSign or Digicert. Once obtained, the certificate must be installed on your device and configured in Outlook to enable secure email encryption and digital signatures.
Introduction to S/MIME, Microsoft Support, 2023
Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification, IETF RFC 3851
Email Security and Anti-Spoofing Guidance, NCSC, 2023
The Latest Phishing Statistics, AAG IT Services, 2023
Man-in-the-Middle Attacks Explained, SecureW2, 2024
The UK GDPR, ICO, 2024
Data Protection Act 2018, Gov.uk, 2024
UK Government’s Cyber Essentials, NCSC, 2024
Data Security and Protection Toolkit (DSPT), NHS, 2024
Solicitors Regulation Authority (SRA), 2024
Financial Conduct Authority (FCA), 2024
Payment Services Directive 2 (PSD2), 2024
GlobalSign (Digital Certificate Provider), 2024
Sectigo (Digital Certificate Provider), 2024
DigiCert (Digital Certificate Provider), 2024
Phishing Statistics, IT Governance, 2023
Sam Kendall, 15.11.2024
Sabrina McClune, 06.12.2024