Cyber Defense

View Original

DFS 500 Second Amendment Implementation Dates

Today I attended a presentation by the superintendant and deputy superintendent of New York State Department of Financial Services. A lot of infomration was provided and we intend on making multiple posts based on the infromation we learned.

As a first step, here are the implementation dates provided by DFS. In general this is for “standard” non-exempt organizations. Where possible we will outline requirements for covered entitites with limited exemptions.

December 1, 2023

  • New reporting requirements, particularly around ransomware payments

    • Payments must be reported within 24 hours

    • Covered entities have 30 days to explain the reason for the payment, the decision making process, and impacts on other regulations such as the Office of Foreign Asset Controls

    • Third-party breaches must be reported

    • If a covered entity reports an incident to any governmental agency, even outside New York, DFS must also be notified

April 15, 2024

  • The CISO must sign any complaince attestaions. If the CISO is outsourced, the senior officer responsible for supervising the CISO must attest instead

April 29, 2024

  • Internal and External Penetration Testing must be completed annually or after major systems changes

  • Covered Entitites must have a “monitoring process in place to promptly inform of new security vulnerabilities”

  • Covered Entities must place a priority on remediation of vulnerabilities and do so in a timely manner

  • Risk Assessment requires expand and must be updated annually

  • Policies must be expanded and updated annually

  • Cybersecurity training must be provided to all employees at least annually to also include social engineering training (i.e. phishing training)

November 1, 2024

  • Limited exemption covered entities must:

    • Implement Multi-Factor Authentication (MFA) on:

      • All remote access

      • All external third-party systems

      • privileged accounts

    • Provide security awareness training to all employees at least annually (it should be noted there is no requirement for social engineering training)

  • Increased encryption requirements

    • Encryption policies

    • Must consider all forms of encryption, not just encryption across an external network

    • CISO can approve reasonable compensating controls

  • CISO must

    • Report to the board on any material inadequecies of the cybersecurity program

    • Report any material cybersecurity issues to the board

  • The board must:

    • “excercise oversight of the risk management program”

    • Must have sufficient understanding of cybersecurity or be advised by professionals that do

  • Incident Response Plans must be updated, reviewed and tested

  • Business Continuity and Disaster Recovery (BCDR) plans must be updated and reviewed annually

    • Employees must be trained on BCDR procedures

  • The covered entity must maintain backups and test the restoration of critical data and systems

May 1, 2025

  • Limit access privileges using “Role Based Access Controls” and the “Principle of Least Privileges”

  • Prompty deactive inactive accounts, including those of employees who seperate from the company

  • Disable unneccesary services and protocols

  • Implement a password policy based on “industry best practices”

  • Conduct automated vulnerability scans “at the frequency determined by the risk assessment”

  • Protect again malicious code, including anti-malware on all systems, web filtering, and email filtering

November 1, 2025

  • For “standard” non-exempt organizations implement MFA for all individuals on all systems

    • It should be noted this requirement does not mention anything about whether or not the system can access Non-Public Information (NPI)

    • The CISO can approve compensating controls that provide equievelant or superior protection

  • Implement an Assess Managament/Inventory system