Skip to Content

MAAWG Published Documents

These best practices and white papers represent the cooperative efforts of MAAWG members to provide the industry with recommendations and background information to improve messaging security and protect users. MAAWG best practices are updated as needed and new documents are added as they become available.

Just as speaking a common language allows two people to communicate effectively, standards that define the format of abuse reports and the destination address for them increase the effectiveness of network owners in fighting abusive traffic.
Submitted to the U.S. State Department in January 2014, responding to its request for Stakeholder Input on the Role of Governments, International Telecommunication Union Council Working Group on Internetprelated Public Policy Issues.
To minimize the risk of active DKIM keys being compromised, they should be changed frequently. This document discusses why keys should be rotated, how frequently they should be rotated, and suggests the best common practices for doing so.
Submitted to ICANN in response to their misuse survey report.
This document is for spamtrap operators who generally use data generated from spamtraps for purposes such as research, evidence collection, infected machine mitigation or mail list leakage and list quality control
Submitted in August as a response to ICANN's Experts Working Group report.
Submitted in July 2013 to the ITU Council Working Group on International Internet–Related Public Policy Issues (CWG–Internet) in response to a request for comments on effectively countering and combatting spam.
Brief comments submitted to ICANN on the Thick Whois Initial Report
Response to two questions in the National Institute of Standards and Technology.
Results by Georgia Tech researchers of a study based on the industry’s response to the DNS Changer Trojan with shared recommendations to help curb future malware outbreaks that was presented at the M3AAWG 27th General Meeting in San Francisco.