N2CON TECHNOLOGY

Email Encryption: What Actually Gets Protected

Email encryption protects message content from unauthorized access, but it's not a silver bullet. The right approach depends on your recipients, your workflows, and what you're actually trying to protect.

Note: This is general information and not legal advice.

Last reviewed: April 2026
On this page

Executive Summary

What it is
Technical controls that protect email content confidentiality: S/MIME (certificate-based), OpenPGP/GPG (decentralized keys), and portal delivery (secure web links). These protect the message payload itself, not just the transport between servers.
Why it matters
Content protection matters when email contains regulated data (PHI, financial information, CUI), sensitive business information (M&A discussions, strategic plans), or personal data that triggers privacy obligations. Transport encryption (TLS) is not enough for these use cases because it doesn't protect stored or forwarded messages.
When you need it
Regulated industries with data protection requirements (HIPAA, GLBA, CJIS, FINRA). Organizations handling sensitive business information that would cause harm if disclosed. Vendor or customer contracts that specify encryption requirements. Legal or compliance teams that need to demonstrate confidentiality controls.
What good looks like
A clear decision framework for when to use message encryption vs. secure links vs. encrypted attachments. Operational processes for key/certificate lifecycle (distribution, rotation, revocation, backup). Recipient communication that sets expectations and provides support. Integration with archiving and legal hold workflows so encrypted content is discoverable.
How N2CON helps
We help you evaluate encryption options based on your recipient ecosystem and compliance requirements. We implement S/MIME or OpenPGP/GPG where it makes sense, configure portal delivery where appropriate, and design workflows that balance security with usability. We also ensure encryption integrates with archiving and retention systems.

Transport encryption vs. message encryption

Most email is already protected by transport encryption (TLS) as it moves between mail servers. TLS encrypts the connection between servers, so someone tapping the network can't read the email in transit. But TLS has limitations: it doesn't protect the message once it's stored on a server, and it doesn't protect the message if it's forwarded to another system that doesn't use TLS.

Message encryption is different. It protects the email content itself so only the intended recipient can read it, regardless of how many servers the message passes through or how long it's stored. S/MIME and OpenPGP/GPG encrypt the message body and attachments using the recipient's public key. The recipient uses their private key to decrypt. This protection persists through storage, forwarding, and archiving.

The distinction matters because TLS is already widely deployed and mostly invisible to users. Message encryption requires explicit setup, key management, and recipient coordination. TLS protects the pipe; message encryption protects the payload. You need both for comprehensive protection, but they solve different problems.

S/MIME, OpenPGP/GPG, and portal delivery: how they compare

The three main approaches to email encryption each have different strengths and failure modes. The right choice depends on your ecosystem, your technical capacity, and who you're communicating with.

S/MIME

Certificate-based encryption

Uses X.509 certificates from a certificate authority to encrypt and sign messages. Integrated with Microsoft 365 and Outlook. Requires PKI infrastructure or managed certificate service.

  • Enterprise-friendly with certificate management
  • Good integration with Outlook and Microsoft 365
  • Requires certificate authority or managed service
  • Key distribution and revocation need governance
S/MIME works well in organizations that already have PKI or are willing to use a managed certificate service. The certificate authority provides trust anchors, but you still need operational processes for key lifecycle.
OpenPGP/GPG

Decentralized encryption

Uses public/private key pairs without requiring certificate authorities. Users manage their own keys and trust relationships. More flexible but requires more technical awareness.

  • No certificate authority required
  • Works across different email platforms
  • Users manage their own keys and trust
  • Key distribution is manual and error-prone
OpenPGP/GPG is popular among technical users and organizations that want to avoid centralized certificate authorities. The web of trust model works at small scale but becomes complex as organizations grow.
Portal delivery

Secure web portal

Email contains a link to a secure web portal where the recipient logs in to view the message. Reduces crypto setup but adds identity friction and portal dependency.

  • No recipient key or certificate required
  • Reduces crypto setup complexity
  • Adds login friction and tenant confusion
  • Complicates archiving and legal hold workflows
Portals solve the key distribution problem by shifting the burden to identity providers. But this creates new problems: recipient login confusion, portal vendor dependency, and archiving gaps.

The interoperability mess

Email encryption suffers from fragmentation. S/MIME works well in Microsoft 365 and Outlook environments but may not integrate smoothly with other platforms. OpenPGP/GPG is more flexible but requires plugins or separate clients. Portal delivery works everywhere but creates dependency on the portal vendor. There's no universal standard that "just works" across all email systems, which is why many organizations fall back to secure links or encrypted attachments for external communication.

Key distribution is the hardest problem

All message encryption approaches face the same fundamental challenge: how do you get the recipient's public key in a way you can trust? S/MIME uses certificate authorities to provide trust anchors, but you still need to verify the certificate belongs to the right person. OpenPGP/GPG uses a web of trust model that works at small scale but becomes complex as organizations grow. Portal delivery sidesteps the key problem by shifting the burden to identity providers, but this creates new friction points.

Portal delivery: the identity friction problem

Portal-based secure email delivery seems like an elegant solution: send an email with a link, recipient logs in to a secure portal to view the message. No keys, no certificates, no crypto setup. But portals introduce a different kind of complexity: identity friction.

Tenant-to-tenant login confusion

Recipients often face login confusion when the portal uses Microsoft/Entra identity. If the recipient is already logged into their own Microsoft 365 tenant, the portal may prompt them to log in again with a different account. This creates confusion about which account to use, especially when the portal URL doesn't clearly indicate the tenant context. The recipient may end up creating a new account or abandoning the message entirely.

Portals create archiving gaps. When the sensitive content lives in a portal rather than in your mail system, your email archive may only contain the link notification, not the actual content. This complicates legal hold workflows, e-discovery requests, and compliance audits. You need separate processes to capture portal content, verify retention, and produce it when requested. Some organizations address this by having the portal send a copy to an archiving system, but this adds complexity and may not capture all portal interactions.

Portal vendor dependency

Portal delivery creates dependency on the portal vendor's availability, security posture, and business continuity. If the portal goes down, recipients can't access messages. If the vendor has a security incident, your sensitive content may be exposed. If the vendor changes pricing or terms, you may face migration costs. These risks are manageable but require vendor due diligence and contingency planning.

Message encryption is powerful but impractical for many real-world scenarios. When you're sending sensitive information to external parties who don't have encryption keys or certificates, secure links or encrypted attachments are often the more pragmatic choice.

Message encryption

Encrypt the email itself

The entire message (body and attachments) is encrypted so only the intended recipient can read it. Requires both sender and recipient to have compatible encryption setup.

  • Strongest protection for content confidentiality
  • Works for ongoing communication with the same recipients
  • Requires key/certificate distribution and management
  • Fails if recipient lacks compatible setup
Message encryption is the right choice for regular communication with recipients who have the technical capacity and governance to manage keys or certificates. It's not practical for ad-hoc exchanges.
Secure links

The email contains a link to a secure web portal or file sharing service where the sensitive content lives. The recipient authenticates to access the content.

  • Works for recipients without encryption setup
  • Good for one-time exchanges and large files
  • Creates dependency on the link service
  • Link expiration and access management needed
Secure links are practical when you need to send sensitive information to external parties who don't have encryption keys. The tradeoff is dependency on the link service and the need to manage access and expiration.
Encrypted attachments

Password-protected files

Sensitive content is placed in an encrypted file (PDF, ZIP) with a password. The password is sent through a separate channel (phone, SMS, different email).

  • No special recipient software required
  • Works for any recipient with email access
  • Password transmission creates a weak link
  • No audit trail of who accessed the content
Encrypted attachments are a last-resort option when recipients lack any other secure channel. The password transmission problem makes this weaker than proper encryption, but it's better than sending sensitive content in plaintext.

Decision framework

Use message encryption (S/MIME or OpenPGP/GPG) for ongoing communication with recipients who have the technical capacity and governance to manage keys or certificates. This includes internal teams, long-term business partners, and regulated counterparties where encryption is a contractual requirement.

Use secure links for one-time exchanges with external parties, large file transfers, or when the recipient's technical capacity is unknown. Secure links work well for sending sensitive documents to vendors, customers, or partners where you don't have an ongoing encryption relationship.

Use encrypted attachments as a last resort when recipients lack any other secure channel. This is better than sending sensitive content in plaintext, but the password transmission problem makes it weaker than proper encryption or secure links. If you use encrypted attachments, send the password through a different channel (phone call, SMS, separate email) and avoid reusing passwords.

Domain strategy: main domain, subdomains, and portal URLs

Where you host secure email portals and what domain they use affects trust, operational complexity, and risk containment. The email authentication guide covers domain strategy in depth for SPF/DKIM/DMARC, but similar considerations apply to encryption portals.

Main domain vs. branded subdomain vs. vendor-owned domain

Hosting a secure portal on your main domain (secure.example.com) creates the most trust with recipients because they recognize your brand. But it also means any portal security issue affects your primary domain reputation. Using a branded subdomain (portal.example.com or secure-mail.example.com) provides containment: if the portal has a problem, the impact is limited to that subdomain. Vendor-owned domains (securemail.vendor.com) are fastest to set up but create trust issues because recipients may not recognize the domain.

When subdomains make sense for portals

Branded subdomains are often a good choice for secure email portals. Use portal.example.com or secure.example.com to clearly signal the purpose while maintaining brand recognition. This provides operational clarity and makes it easier to apply specific security policies to the portal without affecting your primary domain. The caveat is that subdomains still need governance: moving the problem to a subdomain without managing it just relocates the failure mode.

Key management and operational reality

Key management is the operational backbone of any message encryption system. Without processes for distribution, rotation, revocation, and backup, encryption becomes a liability rather than a protection.

Distribution and verification

Getting public keys to recipients in a trustworthy way is harder than it sounds. For S/MIME, you need a process to distribute certificates and verify they belong to the right person. For OpenPGP/GPG, you need a process to exchange keys and establish trust. Many organizations solve this with a directory service or internal key server, but this adds infrastructure and requires ongoing maintenance.

Rotation and revocation

Keys and certificates don't last forever. They need rotation on a schedule (typically every 1-3 years) and immediate revocation if they're compromised or an employee leaves. Revocation is particularly tricky: you need a way to notify all parties who might have the old key that it's no longer valid. Certificate authorities handle this for S/MIME through CRLs (Certificate Revocation Lists) and OCSP (Online Certificate Status Protocol), but these mechanisms have their own reliability and performance challenges.

Backup and recovery

Lost keys mean lost data. If an employee loses their private key and you don't have a backup, any encrypted messages sent to them become permanently unreadable. This is a serious problem for organizations with regulatory retention requirements. You need a secure backup process for private keys, with strict access controls and clear documentation of who can recover keys and under what circumstances.

How this connects to other controls

Email encryption is one layer of a broader email security strategy. It works alongside several related controls to provide comprehensive protection.

Email authentication (DMARC, DKIM, SPF) protects against spoofing and impersonation, but it doesn't protect content confidentiality. Encryption and authentication are complementary: encryption protects the message content, authentication proves who sent it. You need both for complete protection.

Secure email archiving (SEAS) preserves email history for disaster recovery, compliance, and investigation. Encrypted messages create archiving challenges: you need to ensure encrypted content is captured in a way that remains searchable and discoverable. Some archiving systems can decrypt messages using a master key, but this introduces its own security considerations.

Business email compromise (BEC) prevention relies on process controls and identity safeguards. Encryption doesn't stop BEC, but it does reduce the damage if an account is compromised: the attacker can read encrypted messages only if they also obtain the recipient's private key.

Data retention policies define how long encrypted messages must be preserved and when they can be deleted. Encryption adds complexity to retention because you need to ensure keys remain available for the entire retention period. If a key is lost before the retention period expires, you may not be able to produce required messages for legal holds or audits.

Common Questions

What is the difference between transport encryption and message encryption?

Transport encryption (TLS) protects email while it moves between servers. Message encryption (S/MIME, OpenPGP/GPG) protects the content itself so only the intended recipient can read it, even if the message is stored or forwarded. TLS protects the pipe; message encryption protects the payload.

When should we use S/MIME vs. OpenPGP/GPG?

S/MIME fits enterprise environments with certificate management and PKI infrastructure. It integrates well with Microsoft 365 and Outlook. OpenPGP/GPG is more decentralized and works well for technical users or organizations that want to avoid certificate authorities. The choice depends on your ecosystem and key management capacity.

What are the drawbacks of portal-based secure email delivery?

Portals reduce crypto setup but add identity friction. Recipients must log in, which creates confusion across Microsoft/Entra tenants and other identity providers. Portals can complicate archiving and legal hold workflows because the message content lives outside your mail system. They also create dependency on the portal vendor.

When are secure links or encrypted attachments better than message encryption?

Use secure links or encrypted attachments when you need to send sensitive files to recipients who don't have encryption keys or certificates. This is common for one-time exchanges with external parties, large file transfers, or when the recipient's technical capacity is unknown. It's a practical alternative when full message encryption would create too much friction.

Does email encryption protect against spoofing or phishing?

No. Email encryption protects content confidentiality, not sender authenticity. For spoofing protection, you need email authentication (DMARC, DKIM, SPF). Encryption and authentication are complementary controls: encryption protects the message content, authentication proves who sent it.

What are the key management challenges with S/MIME and OpenPGP/GPG?

Key distribution is the hardest problem. You need a way to exchange public keys securely and verify they belong to the right person. Key rotation, revocation, and backup add operational complexity. Lost keys mean lost data. Certificate authorities (for S/MIME) or web of trust (for OpenPGP/GPG) help, but both require ongoing governance.

Need help choosing the right email encryption approach?

We can help you evaluate S/MIME, OpenPGP/GPG, portal delivery, and secure link options based on your workflows, recipient ecosystem, and compliance requirements.

Contact N2CON