38
Fail

jurong-port.com.sg

Security posture assessment · Scanned February 15, 2026

Findings
2 · 2 · 1
Checks
8 passive

jurong-port.com.sg scored 38/100 and does not meet the minimum security posture threshold. The most critical issue is: Set up email authentication (DMARC, SPF, DKIM). This must be addressed before the vendor can be approved for procurement or data processing activities.

Critical gaps in: DMARC / Email Security. Positive signals: Known Breaches, CVE Exposure all passed.

3 action items identified, including 1 critical. The issues are configuration gaps, not architectural problems. A focused remediation effort of 2–5 days could address all findings.

Ordered by priority · 3 items
1
Set up email authentication (DMARC, SPF, DKIM)
Effort: 1–2 days   Owner: IT / DNS administrator
critical
Without email authentication, anyone can send emails that appear to come from jurong-port.com.sg. This is the most common vector for phishing attacks targeting employees and customers. DMARC, SPF, DKIM are not configured.
Compliance Impact
NIST CSFPR.AC-7
Email authentication is a required access control
ISO 27001A.13.2.1
Information transfer policies require email security controls
HIPAA§164.312(e)
Transmission security for electronic PHI
Remediation Steps
1
Add SPF record to DNS: v=spf1 include:_spf.google.com ~all (adjust for your email provider)
2
Configure DKIM signing with your email provider and publish the public key in DNS
3
Add DMARC record: v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@jurong-port.com.sg
4
Monitor DMARC reports for 2–4 weeks, then upgrade policy to p=reject
2
Enable DNSSEC on your domain
Effort: 1–3 days (depends on registrar)   Owner: DNS administrator / domain registrar
medium
Without DNSSEC, DNS responses for jurong-port.com.sg can be spoofed, potentially redirecting users to malicious sites. This requires coordination with your domain registrar to publish DS records.
Compliance Impact
NIST 800-53SC-20
Secure name/address resolution service
Remediation Steps
1
Check if your DNS provider supports DNSSEC (Cloudflare, Route53, etc.)
2
Enable DNSSEC signing in your DNS provider dashboard
3
Add the DS record to your registrar for .sg TLD
4
Verify: dig +dnssec jurong-port.com.sg
3
Review certificate configuration
Effort: 1–2 hours   Owner: Infrastructure / DevOps
low
Certificate issues found for jurong-port.com.sg: . These are operational hygiene items, not immediate security risks.
Remediation Steps
1
Consolidate certificate issuance to 1–2 trusted CAs
DMARC / Email Security
Critical
DNS Configuration
Warning
Certificate Hygiene
Warning
TLS Configuration
Error
HSTS Header
Error
Security Headers
Error
Known Breaches
Healthy
CVE Exposure
Healthy