Skip to main content
Back to Blog
Security

Email Infrastructure for MSPs, Agencies, and Hosting Providers: What Most Are Getting Wrong

Outbound abuse is rising, IPv6 reputation is a blind spot, and compliance now covers email controls. Here's how to build email infrastructure that actually protects your customers — and your business.

Val Paliy
Author
February 1, 2026
14 min read

If you run an MSP, digital agency, or hosting company, you already know that email is the thing nobody thinks about until it breaks. A client gets blacklisted on a Monday morning, deliverability tanks, and suddenly you're on a call explaining why their invoices are landing in spam.

The uncomfortable truth is that most providers are running email infrastructure designed for 2018. The threat landscape has changed. The compliance requirements have changed. And the stuff that used to be edge cases — outbound abuse, IPv6 reputation issues, privacy regulations — is now front and center.

We've worked with dozens of providers over the past few years, and the same patterns keep showing up. This post breaks down what's actually going wrong, and what a modern email infrastructure looks like when you're managing it for hundreds or thousands of customers.


The Problems Nobody Talks About at Conferences

Let's skip the usual "email is important" preamble. You know it's important. Here's what's actually causing fires:

1. Outbound Abuse Is Getting Worse, Not Better

Everyone focuses on inbound filtering. Block the phishing emails, quarantine the malware. That part is relatively well-understood.

But outbound? That's where things are quietly falling apart.

Credential StuffingCompromised Accounts
Leaked password databasesLegitimate accounts sending spam
Automated login attemptsHard to detect — passes auth
Low-and-slow to avoid rate limitsReputation damage before you even notice
Malware-Driven AbuseApplication Abuse
Info-stealers harvest SMTP credentialsVulnerable web forms used as open relays
Botnet-controlled sendingMisconfigured CMS plugins
Encrypted C2 over SMTP"Contact us" forms weaponized

Here's what makes this painful for providers: when one of your customers' accounts gets compromised and starts spraying spam, it's your IP that takes the hit. Your other customers' deliverability suffers. And depending on how your infrastructure is set up, the damage can spread across your entire sending pool before you catch it.

We've seen MSPs lose entire IP ranges to blacklists because they had no outbound rate limiting, no anomaly detection, and no per-customer sending isolation.

2. IPv6 Reputation Is a Blind Spot

Most providers have IPv6 enabled — or at least available — on their mail infrastructure. That's fine. The problem is that almost nobody is actively managing IPv6 reputation.

With IPv4, you've probably got your Spamhaus checks, your Sender Score monitoring, maybe some automated delisting workflows. Solid.

With IPv6? Crickets.

The major mailbox providers (Google, Microsoft, Yahoo) absolutely do score IPv6 sending reputation separately. And because IPv6 address space is so vast, the reputation models work differently:

  • IPv4: Reputation is typically per-IP or per /24 block
  • IPv6: Reputation is often per /48 or even /32 block — meaning one bad actor in your allocation can poison a huge range

If you're assigning IPv6 addresses to customers without monitoring outbound behavior per-prefix, you're accumulating reputation debt that you can't see. It won't show up on traditional blacklist checkers. It'll show up as mysterious deliverability drops that are incredibly hard to diagnose.

3. Compliance Now Cares About Email Abuse Controls

This is the one that catches providers off guard. SOC 2 Type II, ISO 27001, and even cyber insurance questionnaires have started asking about abuse management controls — specifically for email.

It used to be enough to say "we have a spam filter." Now auditors want to see:

  • Outbound abuse monitoring — How do you detect compromised accounts?
  • Rate limiting policies — What stops a single account from sending 50,000 emails?
  • Incident response for abuse — What happens when an IP gets blacklisted?
  • Customer isolation — Can one customer's abuse affect another's deliverability?
  • Logging and audit trails — Can you show what was sent, when, and by whom?

If your answer to any of those is "we'd figure it out," that's a compliance gap. And increasingly, it's a gap that blocks deals. We've seen MSPs lose enterprise contracts because they couldn't demonstrate adequate email abuse controls during vendor security reviews.


What Good Email Infrastructure Actually Looks Like

Alright, enough about problems. Let's talk about what a properly architected email platform looks like when you're serving multiple customers.

Inbound Filtering: Beyond the Basics

Yes, you need spam filtering. But a modern inbound stack has more layers than most providers implement:

Layer 1: Connection-Level

IP reputation checks (RBLs, Spamhaus, Barracuda), PTR record validation, HELO/EHLO verification, and connection rate limiting per source IP. This layer alone rejects ~60–70% of spam before content is even transferred.

Layer 2: Authentication

SPF validation, DKIM signature verification, DMARC policy enforcement, and ARC chain validation for forwarded mail. Catches spoofing and impersonation attempts.

Layer 3: Content Analysis

Bayesian filtering, URL reputation scanning (including shortened URLs), attachment analysis (type, hash, sandbox), and header anomaly detection. Catches payload-based threats that pass auth checks.

Layer 4: Post-Delivery

Retrospective URL scanning, message clawback for newly-identified threats, and user-reported phishing workflows. Addresses threats identified after initial delivery.

The key insight: each layer should be independently configurable per customer. A financial services client needs aggressive filtering with strict attachment policies. A marketing agency needs more permissive rules to avoid blocking legitimate campaign emails. One-size-fits-all doesn't work.

Outbound Filtering: The Part Everyone Skips

This is where most providers have the biggest gap. Outbound filtering isn't just "scan for spam before it leaves." It's a full abuse prevention system:

Rate limiting — Not just global limits, but per-account, per-domain, and per-hour limits that adapt to each customer's normal sending patterns. A customer who normally sends 200 emails a day suddenly queuing 15,000? That should trigger an automatic hold, not silently send.

Content scanning — Yes, outbound. You're looking for phishing links, malware attachments, and spam content being sent from your customers' accounts. This catches compromised accounts before they do reputation damage.

Authentication enforcement — Every outbound email should pass SPF, have a valid DKIM signature, and align with the customer's DMARC policy. This isn't optional anymore. It's table stakes since Google and Yahoo's 2024 sender requirements. Proper email deliverability requires comprehensive authentication management.

Feedback loop processing — When ISPs report spam complaints back to you (via ARF reports), those need to be automatically processed, tracked per-customer, and trigger alerts or throttling when thresholds are hit.

Domain Reputation Management at Scale

When you're managing email for many customers, domain reputation becomes a multi-tenant problem. Here's how to approach it:

Separate sending infrastructure by risk tier. Don't put your high-volume marketing senders on the same IPs as your transactional email customers. A sudden spam complaint spike from a marketing campaign shouldn't affect another customer's password reset emails.

TierTypeIP PoolUse CasesControls
1TransactionalDedicatedPassword resets, invoicesStrictest abuse controls
2BusinessShared (grouped by reputation)Day-to-day business emailStandard abuse controls
3MarketingSeparateNewsletters, campaignsVolume-based throttling, bounce management
4New / UnprovenQuarantineNew customers, warming IPsStrictest monitoring, graduated to higher tiers

Monitor reputation per customer, not just per IP. Use Google Postmaster Tools, Microsoft SNDS, and third-party reputation services to track each customer's sending domain reputation independently. When a customer's reputation drops, you want to catch it before it drags down shared resources.

Automated warm-up for new IPs and domains. When you provision a new customer or rotate IPs, don't just flip the switch. Gradually ramp volume over 2-4 weeks, starting with engaged recipients, to build positive reputation signals.

IPv6: Do It Right or Don't Do It

Here's our honest recommendation: if you can't commit to properly managing IPv6 email reputation, don't enable IPv6 for outbound email.

If you do commit, here's what's needed:

  • Assign /64 or /56 blocks per customer — enough address space for their needs, isolated enough to contain reputation issues
  • Monitor per-prefix reputation — standard blacklist checkers don't cover IPv6 well; you need specialized monitoring
  • Implement IPv6-specific rate limiting — the same abuse controls you have for IPv4, replicated for v6
  • Dual-stack fallback — if IPv6 reputation degrades, automatically fall back to IPv4 for critical mail
  • PTR records for every sending address — missing reverse DNS on IPv6 is an instant deliverability killer

Privacy-First Architecture

With GDPR, Canadian anti-spam law (CASL), and a growing patchwork of state privacy laws in the US, email infrastructure needs to be designed with privacy as a core architectural concern — not bolted on later.

What this means in practice:

Data minimization in logs. You need enough logging for abuse detection and compliance, but you shouldn't be storing full message bodies indefinitely. Define retention policies per data type: connection logs (90 days), message metadata (30 days), full content (7 days or on-demand for investigations).

Geographic data residency. Some customers need their email data to stay in specific regions. Your infrastructure should support this without requiring a completely separate deployment. This means region-aware message routing and storage, not just "everything goes to us-east-1."

Encryption everywhere. TLS for transport (with MTA-STS enforcement where supported), encryption at rest for stored messages and logs, and proper key management. This sounds basic, but we still see providers running opportunistic TLS with no enforcement and plaintext log storage.

Customer data isolation. Multi-tenant email infrastructure should have hard boundaries between customer data. Shared databases with customer_id columns aren't adequate when you're handling regulated industries. Dedicated per-customer encryption keys, separate storage namespaces, and access controls that prevent cross-tenant data exposure.


The Compliance Angle: Making Auditors Happy

Let's get practical about what compliance frameworks actually require for email infrastructure.

SOC 2 Trust Service Criteria

For email-related controls, SOC 2 cares about:

  • CC6.1 — Logical access controls for email systems (who can send as whom, admin access)
  • CC7.2 — Monitoring for anomalous activity (abuse detection, unusual sending patterns)
  • CC7.3 — Incident response procedures (what happens when abuse is detected)
  • CC8.1 — Change management for email infrastructure (configuration changes documented)

ISO 27001 Annex A

Relevant controls include:

  • A.13.2 — Information transfer policies (email encryption, acceptable use)
  • A.12.2 — Protection from malware (inbound/outbound filtering)
  • A.12.4 — Logging and monitoring (email audit trails)

The key takeaway: these aren't just about having the technology. Auditors want to see documented policies, evidence of monitoring, and proof that controls are actually working. That means dashboards, alert histories, incident reports, and regular reviews.


How We Help Providers Get This Right

At PlatOps, we work with MSPs, agencies, and hosting providers to build email infrastructure that handles all of this — without requiring you to become email security specialists yourself.

Here's what that typically looks like:

Assessment first. We audit your current email infrastructure: architecture, filtering, abuse controls, reputation status, compliance gaps. No sales pitch — just an honest picture of where you stand.

Architecture design. Based on your customer base and compliance requirements, we design a multi-tenant email architecture with proper isolation, tiered sending infrastructure, and privacy-first data handling.

Implementation and migration. We build it out, migrate your customers with zero downtime, and set up monitoring and alerting. This includes inbound filtering, outbound abuse prevention, reputation management, and compliance reporting.

Ongoing management. Email infrastructure isn't set-and-forget. We handle reputation monitoring, blacklist remediation, abuse response, filter tuning, and compliance reporting on an ongoing basis through our email infrastructure services.

The goal is simple: your customers get reliable, secure email. You get to focus on growing your business instead of fighting deliverability fires.


Getting Started

If any of this hit close to home — the outbound abuse worries, the IPv6 blind spots, the compliance questions you're not sure how to answer — we should talk.

We offer a free email infrastructure assessment for MSPs, agencies, and hosting providers. It covers your current architecture, reputation health, abuse controls, and compliance readiness. No commitment, and the report is yours to keep regardless.

Request a free assessment →

Or if you just want to check your domain's current email security posture, try our free email audit tool — it takes 30 seconds and covers SPF, DKIM, DMARC, and DNS security.

Put this into practice

Get a free assessment of your current security and infrastructure posture, or check your email security in 30 seconds.

Tags:email-securitymsphostingspam-filteringipv6domain-reputationcomplianceemail-infrastructure

Get articles like this in your inbox

Practical security, infrastructure, and DevOps insights for teams in regulated industries. Published weekly.

Weekly digestUnsubscribe anytimeNo spam, ever

By subscribing, you agree to our Privacy Policy. Unsubscribe anytime.

Want to Discuss This Topic?

Schedule a call with our team to discuss how these concepts apply to your organization.

30 Minutes

Quick, focused conversation

Video or Phone

Your preferred format

No Sales Pitch

Honest, practical advice

Schedule Strategy Call
Get Free Assessment