insight-ingle-left-2
insight-ingle-left-3

June 30, 2023

Are You Prepared for Proposed Changes to NYDFS Part 500 Cyber Regulation?

Cyber events are occurring every day, laid out in our recent article. One that captured headlines, the EyeMed breach, reached up to a $4.5 million dollar fine. 

Nationally, the New York Department of Financial Services (NYDFS) Part 500 Cybersecurity Regulation is a yardstick for cyber regulation across the country. This is evidenced by the NAIC Data Security Model Law (Model Law). The Model Law seeks to establish data security standards for regulators and insurers to mitigate the potential damage of a data breach. The Model Law is a proposed set of guidelines that states can adopt and was created based in part on Part 500. 

As of March 2023, the Model Law has been adopted by 21 states and is pending in 3 additional states since it was first created in 2018. The Model Law has made steady progress being adopted throughout the U.S. over the last five years and is expected to continue to grow. It is likely that updates to Part 500 will ripple through other states’ cyber legislation.

In this article we will cover in depth aspects of the proposed revisions to Part 500 including: the definition of a Class A company, additional requirements for Class A companies, and the updates to governance, technology, and monitoring/notification requirements. 

Adoption Timeline 

An initial draft of the second amendment to Part 500 was published in November 2022. A revised draft incorporating feedback received during the 60-day comment period was published on June 28, 2023 with a shorter 45-day comment period, to allow the revision to become effective by the end of 2023. This article details the latest requirements for the second amendment from the June 28, 2023 draft.

Once the second amendment is effective, covered entities will have 180 days to implement the changes, unless another timeline is specified. 

Below are specific timelines included in the second amendment, which will be calculated based on the effective date of the amendment:

  • 30 days to implement:
    • New notification requirements (500.17)
  • One year to implement:
    • CISO reporting to the Board of Directors (500.4)
    • Data encryption (500.15)
    • Incident response and business continuity (500.16)
    • Network isolated backups (500.19(a))
    • Exemptions 500.19(a)
  • 18 months to implement:
    • Automated vulnerability scans (500.5(a)(2))
    • Access privileges and changes to passwords (500.7)
    • Protections against malicious code (500.14(a)(2))
    • Endpoint and centralized logging solutions (500.14(b))
  • Two years to implement:
    • Multi-factor Authentication (MFA) (500.12)
    • Asset management and data inventory requirements (500.13(a))

New Type of Entity: Class A (500.1)

The second amendment defines a new type of entity, Class A companies. Class A companies are defined as covered entities and their affiliates with $20,000,000 in gross annual revenue in each of the last two fiscal years from business operations in New York and either of the following:

  • Over 2,000 employees averaged over the last two fiscal years, including employees of both the covered entity and all of its affiliates regardless of location, or 
  • Over $1,000,000,000 in gross annual revenue in each of the last two fiscal years from all business operations of the covered entity and all of its affiliates.

Class A companies must adhere to the following additional requirements:

  • Annual independent audit of the cyber program,
  • Privileged access management solution and an automated method of blocking commonly used passwords, and
  • Monitor the network and include centralized logging and security event alerting through endpoint detection.

Governance: NYDFS views strong governance as a central aspect of cybersecurity.

The original Part 500 required cybersecurity reporting to the Board of Directors, written policies approved by a Senior Officer, the need for a Chief Information Security Officer (CISO) or equivalent, among other mandates. The second amendment expands on these requirements. 

Policies (500.3)

The second amendment requires several new policies that are listed specifically in the policy section (500.3), or inferred from language in other sections. 

Additional policies:

  • (h) Security awareness and training
  • (o) Vulnerability management 

Revised policies(updated portion bolded):

  • (b) data governance, classification and retention
  • (c) asset inventory, device management and end of life management
  • (d) access controls, including remote access and identity management
  • (i) systems and application security and development and quality assurance)
  • (n) incident response and notification 

Other policies: 

  • Encryption (500.15)

Oversight & Independence (500.01, 500.4, 500.17(2))

The second amendment ultimately requires the business to take more ownership in the security program. Senior leadership must understand and attest to cyber risks and controls. Additionally:

  • The CISO must have adequate authority to ensure that cyber risks are appropriately managed
  • Annual reporting on plans to remediate inadequacies to the Board of Directors
  • Timely reporting on material cybersecurity issues or significant cybersecurity events 
  • Annual certification of compliance must now be signed by both the CEO (or highest ranking executive) and the CISO (or senior officer responsible for the cybersecurity program)

Technology: The second amendment requires updates to asset tracking, access requirements, and brings in a new section related to operational resilience.

Technology Assets (500.13) + Access (500.7, 500.12)

New control requirements expect Companies to have a detailed understanding of all their assets and privileged accounts. The additional security requirements around access highlight the breach trends we reviewed in the example headlines. Security requirements include:

  • Updates to asset inventory requirements including items and key information that must be tracked and maintained
  • Updates to the definition of privileged access 
  • Limiting access based on job function
  • Periodic review of all user access privileges with additional controls for privileged accounts 
  • Prompt access termination following departures 
  • Multi-factor Authentication (MFA) requirements for remote access, third party applications that access nonpublic information (NPI), and privileged accounts other than service accounts that prohibit interactive login

Incident Response and Business Continuity Management (500.16)

Event response requires thorough planning, testing, knowledgeable personnel, and ownership from leadership, to respond and recover timely from a cybersecurity event. Changes in this section include:

  • Additional requirements for the Incident Response (IR) and Business Continuity Disaster Recovery (BCDR) plans
  • The plans must be updated, tested, and available to all applicable employees

Monitoring and Notification: The changes to monitoring and notification require a deeper understanding of the Company’s environment and risk assessments.

Monitoring (500.9 + 500.11)

Risks are constantly changing and require monitoring through various assessments to keep Companies up to date. These risks cannot be identified when IT works in a silo and rely on open communication with the business. Changes to monitoring include:

  • Expands the definition of risk assessment
  • Expands requirements for risk assessment and requires IT and the business to work together for a holistic risk program 

Training (500.14) and Testing (500.5)

The changes in this section close the circle of the testing and remediation lifecycle: 

  • Additional risk-based controls to protect against malicious code
  • Minimum annual cybersecurity awareness training with social engineering
  • Annual penetration tests by a qualified internal or external party, periodic vulnerability testing, and ongoing monitoring
  • Updates to the scope of penetration and vulnerability scans 

Notification (500.17 a-b)

The second amendment enhances notification requirements to the superintendent and includes additional notification benchmarks for unauthorized access, ransomware, and extortion. 

Next Steps

What should you and your organization do to prepare for this extensive list of enhanced cybersecurity requirements? 

While many of these requirements will likely not be effective during 2023, some of them will take time to implement and document. Identify those areas now and determine if the organization has the resources internally for the task. Johnson Lambert’s advisory and consulting practice can supplement your team and co-develop a plan. We can help you:

  • Perform a gap analysis to assess your current cyber program. Johnson Lambert can help engage in conversations with key personnel and stakeholders, review reports and policies, perform a walkthrough of critical cybersecurity processes to assess potential cybersecurity program gaps and meet with management to co-develop risk assessment and recommendations for improvements. 
  • Create a compliance roadmap. Johnson Lambert can assist with developing a roadmap for next steps to improve the cybersecurity processes and sharing those results with your team. 
  • Perform testing to validate your cybersecurity program. Johnson Lambert can perform an independent assessment to determine the effectiveness of your program.

To discuss Johnson Lambert’s advisory services and how we can further assist your organization, contact our team.

Carly Kanwisher

Carly Kanwisher

Senior Manager

Kim Mobley

Kim Mobley

Partner

Disclaimer

  1. The content contained herein is provided solely for educational purposes to Johnson Lambert LLP’s intended audience, and should not be relied upon as accounting, tax, or business advice because it does not take into account any specific organization’s facts and circumstances.

Are You Prepared for Proposed Changes to NYDFS Part 500 Cyber Regulation?

Cyber events are occurring every day, laid out in our recent article. One that captured headlines, the EyeMed breach, reached up to a $4.5 million dollar fine. 

Nationally, the New York Department of Financial Services (NYDFS) Part 500 Cybersecurity Regulation is a yardstick for cyber regulation across the country. This is evidenced by the NAIC Data Security Model Law (Model Law). The Model Law seeks to establish data security standards for regulators and insurers to mitigate the potential damage of a data breach. The Model Law is a proposed set of guidelines that states can adopt and was created based in part on Part 500. 

As of March 2023, the Model Law has been adopted by 21 states and is pending in 3 additional states since it was first created in 2018. The Model Law has made steady progress being adopted throughout the U.S. over the last five years and is expected to continue to grow. It is likely that updates to Part 500 will ripple through other states’ cyber legislation.

In this article we will cover in depth aspects of the proposed revisions to Part 500 including: the definition of a Class A company, additional requirements for Class A companies, and the updates to governance, technology, and monitoring/notification requirements. 

Adoption Timeline 

An initial draft of the second amendment to Part 500 was published in November 2022. A revised draft incorporating feedback received during the 60-day comment period was published on June 28, 2023 with a shorter 45-day comment period, to allow the revision to become effective by the end of 2023. This article details the latest requirements for the second amendment from the June 28, 2023 draft.

Once the second amendment is effective, covered entities will have 180 days to implement the changes, unless another timeline is specified. 

Below are specific timelines included in the second amendment, which will be calculated based on the effective date of the amendment:

  • 30 days to implement:
    • New notification requirements (500.17)
  • One year to implement:
    • CISO reporting to the Board of Directors (500.4)
    • Data encryption (500.15)
    • Incident response and business continuity (500.16)
    • Network isolated backups (500.19(a))
    • Exemptions 500.19(a)
  • 18 months to implement:
    • Automated vulnerability scans (500.5(a)(2))
    • Access privileges and changes to passwords (500.7)
    • Protections against malicious code (500.14(a)(2))
    • Endpoint and centralized logging solutions (500.14(b))
  • Two years to implement:
    • Multi-factor Authentication (MFA) (500.12)
    • Asset management and data inventory requirements (500.13(a))

New Type of Entity: Class A (500.1)

The second amendment defines a new type of entity, Class A companies. Class A companies are defined as covered entities and their affiliates with $20,000,000 in gross annual revenue in each of the last two fiscal years from business operations in New York and either of the following:

  • Over 2,000 employees averaged over the last two fiscal years, including employees of both the covered entity and all of its affiliates regardless of location, or 
  • Over $1,000,000,000 in gross annual revenue in each of the last two fiscal years from all business operations of the covered entity and all of its affiliates.

Class A companies must adhere to the following additional requirements:

  • Annual independent audit of the cyber program,
  • Privileged access management solution and an automated method of blocking commonly used passwords, and
  • Monitor the network and include centralized logging and security event alerting through endpoint detection.

Governance: NYDFS views strong governance as a central aspect of cybersecurity.

The original Part 500 required cybersecurity reporting to the Board of Directors, written policies approved by a Senior Officer, the need for a Chief Information Security Officer (CISO) or equivalent, among other mandates. The second amendment expands on these requirements. 

Policies (500.3)

The second amendment requires several new policies that are listed specifically in the policy section (500.3), or inferred from language in other sections. 

Additional policies:

  • (h) Security awareness and training
  • (o) Vulnerability management 

Revised policies(updated portion bolded):

  • (b) data governance, classification and retention
  • (c) asset inventory, device management and end of life management
  • (d) access controls, including remote access and identity management
  • (i) systems and application security and development and quality assurance)
  • (n) incident response and notification 

Other policies: 

  • Encryption (500.15)

Oversight & Independence (500.01, 500.4, 500.17(2))

The second amendment ultimately requires the business to take more ownership in the security program. Senior leadership must understand and attest to cyber risks and controls. Additionally:

  • The CISO must have adequate authority to ensure that cyber risks are appropriately managed
  • Annual reporting on plans to remediate inadequacies to the Board of Directors
  • Timely reporting on material cybersecurity issues or significant cybersecurity events 
  • Annual certification of compliance must now be signed by both the CEO (or highest ranking executive) and the CISO (or senior officer responsible for the cybersecurity program)

Technology: The second amendment requires updates to asset tracking, access requirements, and brings in a new section related to operational resilience.

Technology Assets (500.13) + Access (500.7, 500.12)

New control requirements expect Companies to have a detailed understanding of all their assets and privileged accounts. The additional security requirements around access highlight the breach trends we reviewed in the example headlines. Security requirements include:

  • Updates to asset inventory requirements including items and key information that must be tracked and maintained
  • Updates to the definition of privileged access 
  • Limiting access based on job function
  • Periodic review of all user access privileges with additional controls for privileged accounts 
  • Prompt access termination following departures 
  • Multi-factor Authentication (MFA) requirements for remote access, third party applications that access nonpublic information (NPI), and privileged accounts other than service accounts that prohibit interactive login

Incident Response and Business Continuity Management (500.16)

Event response requires thorough planning, testing, knowledgeable personnel, and ownership from leadership, to respond and recover timely from a cybersecurity event. Changes in this section include:

  • Additional requirements for the Incident Response (IR) and Business Continuity Disaster Recovery (BCDR) plans
  • The plans must be updated, tested, and available to all applicable employees

Monitoring and Notification: The changes to monitoring and notification require a deeper understanding of the Company’s environment and risk assessments.

Monitoring (500.9 + 500.11)

Risks are constantly changing and require monitoring through various assessments to keep Companies up to date. These risks cannot be identified when IT works in a silo and rely on open communication with the business. Changes to monitoring include:

  • Expands the definition of risk assessment
  • Expands requirements for risk assessment and requires IT and the business to work together for a holistic risk program 

Training (500.14) and Testing (500.5)

The changes in this section close the circle of the testing and remediation lifecycle: 

  • Additional risk-based controls to protect against malicious code
  • Minimum annual cybersecurity awareness training with social engineering
  • Annual penetration tests by a qualified internal or external party, periodic vulnerability testing, and ongoing monitoring
  • Updates to the scope of penetration and vulnerability scans 

Notification (500.17 a-b)

The second amendment enhances notification requirements to the superintendent and includes additional notification benchmarks for unauthorized access, ransomware, and extortion. 

Next Steps

What should you and your organization do to prepare for this extensive list of enhanced cybersecurity requirements? 

While many of these requirements will likely not be effective during 2023, some of them will take time to implement and document. Identify those areas now and determine if the organization has the resources internally for the task. Johnson Lambert’s advisory and consulting practice can supplement your team and co-develop a plan. We can help you:

  • Perform a gap analysis to assess your current cyber program. Johnson Lambert can help engage in conversations with key personnel and stakeholders, review reports and policies, perform a walkthrough of critical cybersecurity processes to assess potential cybersecurity program gaps and meet with management to co-develop risk assessment and recommendations for improvements. 
  • Create a compliance roadmap. Johnson Lambert can assist with developing a roadmap for next steps to improve the cybersecurity processes and sharing those results with your team. 
  • Perform testing to validate your cybersecurity program. Johnson Lambert can perform an independent assessment to determine the effectiveness of your program.

To discuss Johnson Lambert’s advisory services and how we can further assist your organization, contact our team.

Carly Kanwisher

Carly Kanwisher

Senior Manager

Kim Mobley

Kim Mobley

Partner

Disclaimer

  1. The content contained herein is provided solely for educational purposes to Johnson Lambert LLP’s intended audience, and should not be relied upon as accounting, tax, or business advice because it does not take into account any specific organization’s facts and circumstances.