PowerDMARC

New Zealand Government Mandates DMARC Under New Secure Email Framework

Secure Government Email

The New Zealand Government has introduced the Secure Government Email (SGE) Framework to guide agencies on securing external email using industry best practices. To implement SGE, DMARC at p=reject is now mandatory for all email-enabled domains, along with SPF, DKIM, and MTA-STS. 

While SEEMail worked for years, it had limits in scaling, working with external partners, and keeping up with modern email security standards. The new SGE framework aims to improve email security, minimize spoofing, and enable the retirement of the SEEMail (Secure Encrypted Email) service. You can view the official document for more information on this.

Deployment Timeline: By October 2025, all government agencies must upgrade their email security to meet the standards of this framework.

Key Takeaways

  • New Zealand mandates DMARC for government agencies under the SGE framework.
  • Agencies must retire SEEMail and fully adopt SGE by October 2025
  • SPF, DKIM, MTA-STS, and TLS 1.2 are also required.
  • Early adoption reduces spoofing risks and ensures smooth compliance.
  • PowerDMARC offers automated tools and managed services to simplify New Zealand DMARC adoption and enforcement.

 

What Is the Secure Government Email (SGE) Framework?

Secure Government Email (SGE) is a New Zealand Government framework that protects email communication between government agencies and external partners. It follows the security guidelines set by the New Zealand Information Security Manual (NZISM) and is designed to protect information classified as sensitive. 

In simple terms, the SGE framework: 

Key Technical Requirements for Implementing SGE

The SGE implementation guide outlines the following critical requirements and deployment timelines for agencies: 

For All Email-Enabled Domains:

DMARC implementation is now mandatory with policy set to p=reject, and DMARC reporting enabled. Strict SPF & DKIM alignment mode is recommended. 

SPF must be implemented with SPF record ending with -all (hardfail).

DKIM signing must be applied at the last MX server in the sending flow.

MTA-STS must be implemented at “Enforce” policy, and TLS-RPT must be enabled for monitoring on encryption failures. 

TLS must be implemented with a minimum version requirement of 1.2 or higher. 

DLP implementation must follow agency requirements, aligned with NZISM. 

For Non-Sending Domains/Subdomains:

  1. Publish the SPF record: “v=spf1 -all”
  2. Publish the DKIM record: “v=DKIM1; p=”
  3. Publish the DMARC record: “V=DMARC1; p=reject; adkim=s; aspf=s; rua=mailto:<your email address>;”

Compliance Monitoring

For the SGE framework, the AoGSD oversees the implementation and compliance monitoring. The AoGSD team will monitor how well agencies follow the new email security framework. This includes checking settings like SPF, DMARC, and MTA-STS, with DKIM to be added later.

How It Impacts Government Agencies 

Here’s how the transition to the SGE framework will affect government agencies:

  1. SEEMail replacement: SEEMail must be retired; agencies must adopt the new SGE Framework model
  2. Modernization: Transition to open-standard, and scalable email security solutions
  3. Enhanced domain security: Early adoption can reduce spoofing and phishing attacks
  4. Secure external communications: Ensures sensitive information is protected when communicating with external partners
  5. Improved Compliance: Aligns agency practices with NZISM controls and national security standards
  6. Operational Efficiency: Proactive implementation minimizes disruption and supports broader digital transformation initiatives

SEEMail vs. SGE

FeatureSEEMailSGE
PurposeSecure encrypted email within NZ government agenciesStandards-based secure email for internal and external communication
Authentication ProtocolsNot consistently implementedDMARC (p=reject), SPF, DKIM with strict alignment enforced
Encryption in TransitProprietary encryption via SEEMail infrastructureMTA-STS with TLS 1.2+ encryption required
InteroperabilityLimited to SEEMail-participating agenciesCompatible with external partners and modern email systems
Email VisibilityLimited visibility and reportingFull visibility via DMARC reports and TLS-RPT
Compliance MonitoringCentralized but narrow in scopeAoGSD monitors for compliance across all email security settings
Deployment ModelCentralized encrypted email platformDecentralized, open-standard, domain-level policy enforcement
StatusLegacy system, being phased outMandatory implementation by October 2025

How PowerDMARC Supports This Transition 

The SGE framework requires rigorous policy enforcement, which, while beneficial, can result in deliverability issues if done incorrectly. 

PowerDMARC supports and simplifies this transition for the New Zealand public sector agencies through managed DMARC deployment services. 

1. Automated SPF, DKIM, DMARC Implementation

We can help New Zealand government agencies swiftly implement complex protocols without the technical know-how, through intelligent and automated DNS record generation tools. The platform also supports one-click automatic DNS record publishing to fast-track the implementation process and reduce manual work.

2. Guided DMARC & MTA-STS Policy Enforcement 

Enforcing your policies can be daunting and can lead to unwanted deliverability issues if done incorrectly. We provide a guided environment for New Zealand public sector agencies to enforce DMARC and MTA-STS policies, with expert support at every stage! 

3. SPF Error Handling

SPF records are prone to errors due to limitations enforced by the IETF. When using third-party services, it becomes difficult to keep under these DNS lookup and character length limits. We offer agencies a zero-touch, automatic SPF optimization service through Hosted SPF. Integrating Macros allows you to minimize SPF errors significantly. 

4. Simplified DMARC & TLS Reporting

Organizations and agencies often find it difficult to read and understand complex DMARC XML reports and JSON reports for TLS-RPT. We simplify this as well! Visual dashboards, human-readable data, and advanced filtering options allow agencies to monitor with confidence. 

5. Continuous Alignment Monitoring

DMARC alignment failures are major red flags. It typically signals a spoofing or impersonation attempt! Our dashboard clearly displays alignment failures for DMARC, SPF, and DKIM, highlighting underlying issues. This helps agencies stay on top of suspicious activities! 

6. ESP Compliance Management

As Google, Yahoo, and Microsoft have cracked down on their email security requirements, DMARC is no longer optional for bulk senders. We help agencies meet and manage compliance, ensuring sensitive government correspondence lands safely in inboxes.  

Get Started Today

PowerDMARC works with government agencies around the world to meet local and international security standards. Contact us today to begin your SGE compliance journey with confidence!

Exit mobile version