New Zealand moves to mandate DMARC enforcement

Executive summary: New Zealand’s Secure Government Email Framework mandates DMARC at p=reject—plus hard-fail SPF, universal DKIM, enforced MTA-STS, and TLS-RPT—by October 2025. The rules replace SEEMail, curb soaring phishing losses, and affect every organization that emails the public sector.

Key takeaways:

  • Hard deadline: All government domains must reach DMARC p=reject and supporting controls by Oct 2025.
  • Full stack: SPF “-all,” DKIM signing, MTA-STS enforcement, and TLS reporting now sit alongside DMARC.
  • Wider impact: Suppliers and partners must align or risk bounced mail and a reputational hit.

The New Zealand Government has recently published the Secure Government Email (SGE) Common Implementation Framework, a blueprint that includes Domain-based Message Authentication, Reporting & Conformance (DMARC) as a new mandatory step across the public sector. The move replaces the legacy SEEMail gateway (being decommissioned in 2026) with open standards that stop spoofing at the source and align New Zealand with global leaders such as the UK and the US.

Why DMARC and why now?

Email remains the number one attack vector for phishing and Business Email Compromise (BEC). New Zealand CERT figures show year-on-year growth in domain-spoofing incidents, costing citizens and agencies $1.6 billion in 2024. By mandating DMARC enforcement at p=reject, the SGE framework shuts the door on fraudulent messages before they ever reach an inbox, protecting public trust and safeguarding critical services.

Check your record now!

Check your current DMARC, SPF and DKIM record for free with Red Sift Investigate.

MTA-STS gets its own requirement

MTA-STS lets a receiving mail server insist on keeping each SMTP connection encrypted, blocking any attempt to fall back to plaintext. That stance stops STARTTLS-stripping man-in-the-middle attacks designed to force messages into the open for interception. It also verifies the remote server’s MX records and TLS certificate, confirming that mail is handed to the legitimate domain instead of being quietly diverted elsewhere.

Moving forward, MTA records must be defined and set to enforce from October 2025. 

What the Secure Email Framework requires

Control
Minimum setting
Deadline*
SPF
Must end with a hard-fail -all 
October 2025
DKIM
All outbound email from all sending services must be DKIM signed
October 2025
DMARC
DMARC needs to be set to p=reject on all email-enabled domains.
Inbound emails must be checked for DMARC compliance and acted on based on the sending domains DMARC policy.
October 2025
MTA-STS
An MTA-STS record must be defined and set to enforce.
October 2025
TLS Reporting
All email sending domains must have TLS Reporting enabled.
October 2025

*All agencies should have lifted their email security standards to be in line with this framework.

The ripple effect for every inbox

Although the mandate targets government domains, its impact extends far beyond. Vendors, councils, tertiary institutes, and NGOs that email the public sector will see stricter filtering in Outlook, Gmail, and NZ-hosted mail systems. Adopting DMARC early ensures deliverability and brand integrity when communicating with citizens and partners.

Five-step action plan to reach p=reject fast

  1. Discover every domain – Partnering with a dedicated DMARC provider like Red Sift gives you full visibility into every primary, secondary, and legacy domain including parked or redirect records.
  2. Align SPF & DKIM – With Red Sift OnDMARC, you can ensure all legitimate senders are authorized and signing correctly; remove redundancies.
  3. Start with p=none, then quarantine, then reject – Graduate through DMARC policies with ease, reaching DMARC enforcement p=reject in just 6-8 weeks.
  4. Monitor to stay ahead – Ensure you stay protected with Red Sift OnDMARC’s dashboard that highlights unknown sources, forwarding failures, and shadow IT.
  5. Optimized AI for faster resolution – Our built-in capability LLM Red Sift Radar finds and fixes issues 10x faster, reducing time, costs and headcount.

How Red Sift OnDMARC accelerates compliance

Red Sift has helped thousands of organizations and many government departments (including in New Zealand) deploy DMARC quickly and safely. 

Whether you’re a government domain owner or a supplier who can’t risk lost emails, Red Sift OnDMARC gets you to full compliance, with ongoing support from our award-winning Customer Success team. Schedule a quick demo today and see how we turn New Zealand’s Secure Email Framework into a competitive advantage for your organization. 

PUBLISHED BY

Jack Lilley

27 May. 2025

SHARE ARTICLE:

Recent Posts

VIEW ALL
News

Red Sift now offered through GuidePoint Security in new partnership

Rahul Powar

Organizations seeking to elevate their cybersecurity posture can now benefit from Red Sift’s advanced innovations, supported by GuidePoint Security’s expertise in aligning the right solutions to each customer’s needs. BOSTON & LONDON, 08:00 ET/ 13:00 BST, 10 September 2025 – Red Sift today announced a strategic reseller partnership with GuidePoint Security, the leading U.S.…

Read more
Awards

From Europe to Asia Pacific: OnDMARC earns global recognition in G2’s Fall…

Francesca Rünger-Field

G2’s Fall 2025 Report is out, and Red Sift OnDMARC continues to earn recognition across the globe. This quarter, we were featured in 19 reports, including a new appearance in the Asia Pacific Regional Grid® Report for DMARC, reinforcing our position as a trusted solution for securing email and protecting brands worldwide. We also…

Read more
AI

AI supercharges airline phishing: Why email security must catch up

Rahul Powar

Executive summary: Only 1 in 5 airlines enforces DMARC at the highest level, leaving customers exposed to phishing attacks that are now supercharged by AI. With billions at stake and national security on the line, airlines must move fast by adopting strong email authentication, deploying AI to counter AI, and leading by example across…

Read more
DMARC

74% of US credit unions vulnerable to email spoofing: Is your organization…

Stuart Rogers

Email remains a heavy lifter for credit unions, whether it’s member notices, statements, loan workflows, or vendor coordination. That’s exactly why impersonation keeps paying, with the National Credit Union Association (NCUA) warning that all credit unions and vendors are active targets for phishing and social engineering, and urges rapid incident reporting when attacks hit.…

Read more