Nydfs Proposes Significant Changes To Its Cybersecurity Rules Financial Services United States Mondaq 3834

NYDFS Proposes Significant Changes To Its Cybersecurity Rules – Financial Services – United States – Mondaq

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.
On July 29, 2022, the New York Department of Financial Services (“NYDFS”) released Draft Amendments to its Part 500 Cybersecurity Rules, which include a mandatory 24-hour notification for cyber ransom payments, annual independent cybersecurity audits for larger entities, increased expectations for board expertise, and tough new restrictions on privileged accounts. There will be a very short 10-day pre-proposal comments period (ending August 8, 2022), followed by the publishing of the official proposed amendments in the coming weeks, which will start a 60-day comment period.
The NYDFS's Part 500 Cybersecurity Rules first became effective in March 2017. Many other state and federal regulators in the United States quickly embraced these rules as the gold standard for cybersecurity regulation, and subsequently adopted similar requirements. International regulators have also looked to Part 500 for guidance in designing their cyber regulations. The Draft Amendments (some of which were previewed last year as part of the NYDFS's Ransomware Guidance) can be roughly divided into six categories: Obligations for Larger Companies, Governance, Risk Assessments, Technical Requirements, Notification Obligations, and Penalties.
The Draft Amendments create a category of “Class A” companies, which are covered entities with over 2,000 employees or over $1 billion in gross annual revenues averaged over the last three years from all business operations of the company and its affiliates. Class A companies are subject to several additional cybersecurity obligations, including:
Audits. An independent audit of the company's cybersecurity program must be conducted at least annually.
Vulnerability assessments. Systematic scans or reviews of information systems must be conducted at least weekly, and any material gaps found during testing must be documented and reported to the board and senior management.
Password controls. A password vaulting solution must be implemented for privileged accounts, along with an automated method of blocking commonly used passwords.
Monitoring. An endpoint detection and response solution must be implemented to monitor anomalous activity, including lateral movement, as well as centralized logging and security event alerting.
The NYDFS views strong governance as a central aspect of good cybersecurity. The original Part 500 required cybersecurity reporting to the board, written policies approved by a Senior Officer, the need for a CISO or equivalent, among other mandates. The Draft Amendments provide several enhancements to the Part 500 governance requirements, including:
CISO independence. The Draft Amendments require that the CISO have adequate independence and authority to ensure that cyber risks are appropriately managed.
Additional board reporting. The CISO is currently required to report to the board annually on the company's cybersecurity program and material cybersecurity risks. The Draft Amendments provide for additional annual reporting to the board on plans for remediating inadequacies, as well as timely reporting to the board on material cybersecurity issues or major cybersecurity events (which are not defined).
Board expertise. Consistent with the SEC's focus on the cybersecurity expertise of board members, under the Draft Amendments, the board of covered entities will be required to have sufficient expertise and knowledge (or be advised by persons with sufficient knowledge and expertise) to exercise effective oversight of cyber risk.
Policy approvals. The board, not senior management, is required to approve the company's cybersecurity policies.
CEO certification. The annual certification of compliance must be signed by the CEO and the CISO (rather than by a Senior Officer). Under the Draft Amendments, the certification would allow for an acknowledgement of less-than-full compliance, with an identification of the specific deficiencies, but companies must be prepared to provide the NYDFS with their documentation of remedial efforts planned and underway, along with a timeline for implementation of those efforts.
BCDR plans. The Draft Amendments add significant details on the requirements for business continuity and disaster recovery plans, including designating of essential data and personnel, communication preparations, back-up facilities, and identifying necessary third parties.
Tabletop exercises and IRPs. Covered entities must periodically test (1) their incident response plans with all staff who are critical to the response, including senior officers and the CEO; (2) their business continuity and disaster recovery plans with all staff who are critical to the continuity and response effort, including senior officers; and (3) their ability to restore their systems from backups. Incident response plans must address ransomware incidents and include recovery from backups.
The Draft Amendments make several important changes to Risk Assessment requirements in Part 500, including:
Tailored assessment. The Draft Amendments expand the current definition of Risk Assessment to make clear that these assessments should be tailored to the specific organization: “Risk assessment means . . . the process of identifying cybersecurity risks to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, customers, consumers, other organizations, and critical infrastructure resulting from the operation of an information system. Risk assessments shall take into account the specific circumstances of the covered entity, including but not limited to its size, staffing, governance, businesses, services, products, operations, customers, counterparties, service providers, vendors, other relations and their locations, as well as the geographies and locations of its operations and business relations . . . .”
Updates. The risk assessments must be updated annually, an impact assessment must be conducted whenever a change in the business or technology causes a material change to the company's cyber risk, and Class A companies must use external experts to conduct the risk assessment at least once every three years.
The Draft Amendments also add several significant new technology requirements, including:
Asset inventory. Each covered entity, regardless of size, will be required to implement policies and procedures to ensure a complete asset inventory that tracks information (e.g., owner, location, classification or sensitivity, support expiration date, and recovery time requirements) for all hardware, operating systems, applications, infrastructure devices, APIs, and cloud services.
Access controls. The Draft Amendments expand requirements relating to privileged accounts, including requiring that (1) the access functions of privileged accounts be limited to only those necessary to perform the user's job function; (2) multifactor authentication for all privileged accounts, except for certain service accounts; and (3) all protocols that permit remote control of devices be disabled or securely configured.
Several new notification obligations are also created by the Draft Amendments, including:
Finally, the Draft Amendments clarify two aspects of the enforcement aspects of Part 500. First, they provide that the commission of a single act prohibited by Part 500, or the failure to satisfy an obligation, constitutes a violation, including the failure to comply for any 24-hour period with any section or subsection of Part 500. Second, the Draft Amendments provide a list of several mitigating factors that the NYDFS may take into account when assessing penalties (e.g., cooperation, good faith, intentionality, history of prior violations, harm to customers, gravity of violation, number of violations, involvement of senior management, etc.). These mitigation factors are currently provided for in the Banking Law and therefore already apply to some regulated entities. The Draft Amendments would extend these factors to other DFS- regulated entities covered by the Insurance Law and the Financial Services Law.
If adopted, most of the Draft Amendments would take effect 180 days from the date of adoption. The expanded notification requirements and the changes to the annual notice of certification would, however, take effect 30 days after adoption. Also, many of the technology-related amendments (e.g., new requirements for passwords, access controls and endpoint detection solutions) would take effect one year after adoption.
To subscribe to the Data Blog, please click here.
The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.
  © Mondaq® Ltd 1994 – 2022. All Rights Reserved.

Passwords are Case Sensitive

Forgot your password?
Free, unlimited access to more than half a million articles (one-article limit removed) from the diverse perspectives of 5,000 leading law, accountancy and advisory firms
Articles tailored to your interests and optional alerts about important changes
Receive priority invitations to relevant webinars and events
You’ll only need to do it once, and readership information is just for authors and is never sold to third parties.
We need this to enable us to match you with other users from the same organisation. It is also part of the information that we share to our content providers (“Contributors”) who contribute Content for free for your use.

source

Leave a Comment

Leave a Reply

Your email address will not be published.

NYDFS Proposed Amendments to Its Cybersecurity Rules – JD Supra

MSP software landscape shifts amid consolidation, new tools – TechTarget

Identity Management and Information Security News for the Week of August 12; Updates from Logpoint, Whistic, Cisco, and More – Solutions Review

How does Privileged Access Management work? – Cybersecurity Dive