The NYDFS Cybersecurity Regulation: A Comprehensive Guide
Back in 2017, the New York State Department of Financial Services (NYDFS) took a significant step to enhance the cybersecurity defenses of financial institutions operating in New York by introducing the NYDFS Cybersecurity Regulation. Through its set of requirements—since amended in 2023—the Regulation aims to better safeguard the sensitive information processed through these organizations which must adhere to its mandates.
As expert cybersecurity assessors, we’re familiar with a diverse multitude of standards and frameworks intended to help protect against digital threats, the NYDFS Cybersecurity being just one. We’re in the business of demystifying complex frameworks like this, and so for those entities under the NYDFS’s purview, we’re going to do just that.
In this comprehensive blog post, we’ll delve into the key requirements of the original version of this regulation, the changes made to it in 2023, and how entities must report their compliance.
To Whom Does the NYDFS Cybersecurity Regulation Apply?
The NYDFS Cybersecurity Regulation requires that covered entities (CE) establish and maintain a cybersecurity program designed to protect consumers and ensure the safety and soundness of your institution.
Already, this begs the question—“who are these referenced ‘covered entities?’”
Per the latest definition within the Regulation, a covered entity is defined as “any person operating under or required to operate under a license, registration, charter, certificate, permit, accreditation or similar authorization under the Banking Law, the Insurance Law or the Financial Services Law, regardless of whether the covered entity is also regulated by other government agencies.”
In other words, you could be subject to comply with these cybersecurity requirements if you’re a:
Commercial bank |
Savings bank |
Savings and Loan Association |
Foreign bank with New York branches |
Insurance company |
Reinsurance company |
Insurance agents |
Insurance broker |
Mortgage broker |
Mortgage banker |
Licensed lender |
Money transmitter |
Service contract provider |
Private banker |
Investment company |
Trust company |
Credit union |
Any other entity required to operate under a license, registration, charter, certificate, permit, accreditation, or similar authorization under the New York Banking Law, the Insurance Law, or the Financial Services Law. |
That being said, as part of the November 2023 amendment, the NYDFS created a new class of covered entities titled “Class A Companies” which are subjected to elevated requirements within the Regulation. Class A Companies are categorized as:
- Having accrued at least $20 million in gross annual revenue in each of the last two fiscal years from all business operations through the state of NY, and
- Either:
- Have over 2,000 employees; or
- Have over $1 billion in gross annual revenue in each of the last two fiscal years from all business operations & all affiliates, regardless of location.
What were the Original NYDFS Cybersecurity Regulation Requirements?
Now that we’ve established who is on the hook for the NYDFS Cybersecurity requirements, here's a breakdown of the key stipulations within the original 2017 regulation:
Section |
Category |
Requirements |
---|---|---|
500.2 |
Cybersecurity Program |
Develop and maintain a cybersecurity program based on a performed risk assessment to protect the confidentiality, integrity, & availability of information systems. |
500.3 |
Cybersecurity Policy |
Implement a written cybersecurity policy or policies addressing specified areas including information security, data governance, and incident response that are reviewed on a routine cadence. |
500.4 |
Chief Information Security Officer (CISO) |
Designate a qualified individual as the CISO responsible for overseeing and implementing the cybersecurity program. |
500.5 |
Penetration Testing and Vulnerability Assessments |
Conduct regular penetration testing and vulnerability assessments to identify and mitigate potential gaps. |
500.6 |
Audit Trail |
|
500.7 |
Access Privileges |
Limit user access privileges to Information Systems that provide access to nonpublic information (NPI) and periodically review such access privileges. |
500.8 |
Application Security |
Maintain & review written procedures, guidelines, and standards on the use of secure development practices as well as procedures for evaluating, assessing, or testing the security of externally developed applications. |
500.9 |
Risk Assessment |
Conduct periodic risk assessments to identify emerging cybersecurity risks and develop additional strategies to mitigate any newly identified risks. |
500.10 |
Cybersecurity Personnel & Intelligence |
Dedicate qualified cybersecurity personnel (internal or external) to manage and oversee cybersecurity risks. Personnel should also establish learning sources to remain up to date on cyber trends. |
500.11 |
Third-Party Service Providers |
Establish policies and procedures to ensure the security of information systems and NPI accessed by third-party service providers. |
500.12 |
Multi-Factor Authentication (MFA) |
Implement multi-factor authentication for accessing internal systems or sensitive information. |
500.13 |
Data Retention |
Ensure the security of NPI through encryption, access controls, and other protective measures. |
500.14 |
Employee Training |
Provide regular cybersecurity awareness training to all employees to enhance their understanding of cybersecurity risks and best practices. |
500.15 |
Encryption of NPI |
|
500.16 |
Incident Response Plan |
Develop an incident response plan to promptly respond to and recover from cybersecurity events. |
500.17 |
Notices to Superintendent |
|
500.18 |
Confidentiality |
Respect that NPI provided by a CE is subject to exemptions from disclosure under the Banking Law, Insurance Law, Financial Services Law, Public Officers Law, or any other applicable state or federal law. |
What are the NYDFS Cybersecurity Regulation Requirements? (2023)
Over five years after these requirements were originally published—on November 1, 2023—the NYDFS announced what had been a long-anticipated amendment to that original cybersecurity regulation. The changes included stricter protocols and related amended guidance to help organizations further improve the safeguarding of their data against evolving cyber threats.
While we recommend reviewing the amendment in its entirety, the following table highlights key changes contained in the latest requirement language of the Regulation:
Section |
Category |
Amended or New Requirement Language (2023) |
---|---|---|
500.2 |
Cybersecurity Program |
|
500.3 |
Cybersecurity Policy |
|
500.4 |
Cybersecurity Governance |
|
500.5 |
Vulnerability Management |
|
500.6 |
Audit Trail |
NO CHANGES |
500.7 |
Access Privileges and Management |
Decrees that you must:
* Class A companies must also block common passwords for all accounts |
500.8 |
Application Security |
|
500.9 |
Risk Assessment |
|
500.10 |
Cybersecurity Personnel & Intelligence |
|
500.11 |
Third-Party Service Providers |
|
500.12 |
Multi-Factor Authentication (MFA) |
|
500.13 |
Asset Management and Data Retention |
You must:
|
500.14 |
Monitoring and Training |
You must:
* Class A CEs must also implement an EDR solution equipped with event alerting |
500.15 |
Encryption of NPI |
You must:
|
500.16 |
Incident Response & Business Continuity |
|
500.17 |
Notices to Superintendent |
|
500.18 |
Confidentiality |
NO CHANGES |
500.19 |
Exemptions |
While there are many ways to qualify for certain exemptions, key modifications in the amendment included exemptions from sections 500.4-500.6; 500.8; 500.10; 500.14a1-2; 500.14b; & 500.15-16. for CEs with:
|
500.20 |
Enforcement |
Specifies that CEs could be subject to penalty if the CE:
|
500.21 |
Effective Date |
The second amendment became effective November 1, 2023. |
500.22 |
Transitional Period |
The timeline for adoption with each amendment ranges from 30 days from the November 1 notice to two years—refer to the Timeline of Adherence below leveraged from NYDFS’ timeline to comply roadmap. |
500.23 |
Severability |
NO CHANGES |
500.24 |
Exemptions from electronic filing and submission requirements |
|
NOTE: Together with the technical revisions to the requirements, there were also numerous updates to definitions throughout the regulation (Section 500.1).
What are the NYDFS Cybersecurity Regulation Reporting Requirements?
NYDFS Cybersecurity Regulation Annual Reporting
In addition to implementation of the specified cybersecurity measures required by the NYDFS Cybersecurity Regulation, covered entities are also required to submit an annual certification to the Superintendent. As this document will certify your commitment to maintaining strong cybersecurity practices, it should include:
- Form of Submission: Your statement must be submitted in the form set forth as Appendix A of the NYDFS Cybersecurity Regulation.
- Certification of Compliance: Your statement must certify that your organization complies with all the requirements outlined in the regulation.
- Maintenance of Records: Covered entities must maintain all records, schedules, and data supporting the certification for five years, and these documents must be available for examination by the Department.
- Identification of Areas for Improvement: If a covered entity identifies areas, systems, or processes that require material improvement, updating, or redesign, you must document these identifications, as well as the remedial efforts you have planned and that are underway to address these areas, systems, or processes.
- Availability for Inspection: All documentation related to areas for improvement and remedial efforts must be available for inspection by the Superintendent.
NYDFS Cybersecurity Regulation Event Reporting
Aside from your annual certification, CEs are also required to report any cybersecurity events to the NYDFS within 72 hours if the event has a reasonable likelihood of materially harming normal operations, and your reporting should include:
- A description of the cybersecurity event;
- The remedial measures taken or planned to address the event; and
- The status of the investigation into the event.
You must also maintain records of all cybersecurity events and provide these records to the NYDFS upon request.
Should you fail to adhere to these annual certification, documentation, and event reporting requirements, you may be subject to regulatory scrutiny, significant potential penalties, and reputational damage.
Next Steps for Compliance with the NYDFS Cybersecurity Regulation
Though we’ve just provided a comprehensive summary of the changes to the Regulation and its requirements, we do still advise organizations to read through both the announcement and the amendment to familiarize themselves even more with the nature of this critical regulation.
And should you still have questions or concerns about the NYDFS Cybersecurity Regulation, feel free to contact us, as any of our experts at Schellman would be more than happy to discuss your concerns and the different cybersecurity assessment solutions that could help reduce your compliance friction.
About COLLIN VARNER
Collin is a Senior Manager with Schellman Compliance, LLC based in Denver, Colorado. Collin is focused primarily on specializing in IT attestation, audit, and compliance activities as they relate to numerous standards including SOC, HIPAA, CMMC, and a suite of ISO standards. Prior to joining Schellman, Collin held roles tasked with planning, organizing, and managing multiple facets of information technology and security reviews including cybersecurity assessments, risk management, internal and external audit, system implementations, and customized attestation reporting.