1. Introduction
The NYSDFS Cybersecurity Regulation represents one of the most comprehensive state-level cybersecurity regulations in the United States. Effective from March 2017, this pioneering regulation establishes detailed cybersecurity requirements for financial services companies operating in New York State. It has become a model for other states and influenced federal approaches to financial sector cybersecurity requirements.
The regulation takes a risk-based approach to cybersecurity, requiring covered entities to assess their specific risks and implement comprehensive programs to protect their information systems and nonpublic information. Its requirements are specific and prescriptive, providing clear guidance while allowing flexibility in implementation based on an entity’s risk assessment.
2. Scope and Application
The regulation applies to entities operating under or required to operate under New York banking, insurance, or financial services laws.
Entity Type | Coverage | Examples |
---|---|---|
Covered Entities |
– State-licensed financial institutions – State-registered organizations – DFS-regulated entities |
– Banks – Insurance companies – Money services businesses |
Limited Exemptions |
– Small organizations – Low risk entities – Limited operations |
– Fewer than 10 employees – Less than $5M NY revenue – No NY information systems |
Third Parties |
– Service providers – Vendors – Business partners |
– IT providers – Cloud services – Data processors |
Protected Information
Category | Types of Information | Protection Required |
---|---|---|
Nonpublic Information |
– Business information – Financial records – Individual details – Healthcare data | Comprehensive protection required |
Information Systems |
– Electronic systems – Networks – Hardware – Data storage | Security controls and monitoring |
Access Credentials |
– User credentials – Access keys – Security tokens – System passwords | Strict access controls required |
3. Core Requirements
The regulation mandates specific cybersecurity measures and programs that covered entities must implement.
Requirement | Key Components | Implementation Guidance |
---|---|---|
Cybersecurity Program |
|
|
CISO Function |
|
|
Access Controls |
|
|
4. Technical Requirements
The regulation specifies detailed technical controls that must be implemented to protect information systems and nonpublic information.
Control Area | Requirements | Implementation Examples |
---|---|---|
Encryption |
|
|
Multi-Factor Authentication |
|
|
Penetration Testing |
|
|
5. Incident Response and Reporting
The regulation requires prompt notification of cybersecurity events and maintaining incident response capabilities.
Requirement | Timeframe | Action Items |
---|---|---|
Incident Notification | 72 hours |
|
Annual Certification | February 15 |
|
Record Retention | 5 years |
|