New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Similar documents
NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

NYS DFS Cybersecurity Requirements. Stephen Head Senior Manager Risk Advisory Services

NYDFS Cybersecurity Regulations

NY DFS Cybersecurity Regulations August 8, 2017

Cybersecurity requirements for financial services companies

Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect

New York DFS Cybersecurity Regulation:

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

NY State s Cybersecurity Legislation Requirements for Risk Management, Security of Applications, and the Appointed CISO

Financial Regulations, Enforcement & Cybersecurity

Checklist: Credit Union Information Security and Privacy Policies

Cybersecurity and Data Protection Developments

SECURITY & PRIVACY DOCUMENTATION

New York s Cybersecurity Regulations for Financial Institutions & Health Care

Information Technology General Control Review

Google Cloud & the General Data Protection Regulation (GDPR)

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

The Common Controls Framework BY ADOBE

ADIENT VENDOR SECURITY STANDARD

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Oracle Data Cloud ( ODC ) Inbound Security Policies

Integrating HIPAA into Your Managed Care Compliance Program

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

EU GDPR & ISO Integrated Documentation Toolkit integrated-documentation-toolkit

NE HIMSS Vendor Risk. October 9, 2015 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS

DFARS Cyber Rule Considerations For Contractors In 2018

01.0 Policy Responsibilities and Oversight

Information Security for Mail Processing/Mail Handling Equipment

COMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards

Regulation P & GLBA Training

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

Standard CIP Cyber Security Systems Security Management

existing customer base (commercial and guidance and directives and all Federal regulations as federal)

Critical Cyber Asset Identification Security Management Controls

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Canada Life Cyber Security Statement 2018

EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1,

Virginia Commonwealth University School of Medicine Information Security Standard

TEL2813/IS2820 Security Management

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Security Policies and Procedures Principles and Practices

Cyber Security Program

External Supplier Control Obligations. Cyber Security

Putting It All Together:

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Ohio Supercomputer Center

Standard CIP Cyber Security Systems Security Management

Implementation Plan for the UW-Madison Cybersecurity Risk Management Policy. August 10, 2017 version

Standard CIP Cyber Security Electronic Security Perimeter(s)

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more.

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Information Security Policy

Baseline Information Security and Privacy Requirements for Suppliers

EU General Data Protection Regulation (GDPR) Achieving compliance

Security Management Models And Practices Feb 5, 2008

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

Standard CIP 007 3a Cyber Security Systems Security Management

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

HP Standard for Information Protection and Security for Suppliers/Partners

FRAMEWORKING COMPLIANCE. NYDFS Cyber Regs: BIG I. Longtime Moniker Becomes Official Name for N.Y. & N.J...PAGE 34 GUIDE TO PAID FAMILY LEAVE INSIDE!

Guidelines. on the security measures for operational and security risks of payment services under Directive (EU) 2015/2366 (PSD2) EBA/GL/2017/17

Trust Services Principles and Criteria

EXHIBIT A. - HIPAA Security Assessment Template -

Standard CIP Cyber Security Electronic Security Perimeter(s)

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

Table of Contents. PCI Information Security Policy

Apex Information Security Policy

PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.

Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR )

Standard CIP 005 2a Cyber Security Electronic Security Perimeter(s)

Development Authority of the North Country Governance Policies

Privacy Breach Policy

DEFINITIONS AND REFERENCES

University of Sunderland Business Assurance PCI Security Policy

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

Security and Privacy Breach Notification

CYBER SECURITY POLICY REVISION: 12

Cyber Security Standards Drafting Team Update

PREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice

Courses. X E - Verify that system acquisitions policies and procedures include assessment of risk management policies X X

HIPAA Privacy, Security and Breach Notification

Information for entity management. April 2018

Data Protection Policy

Red Flags/Identity Theft Prevention Policy: Purpose

1 Privacy Statement INDEX

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014

AUDIT REPORT. Network Assessment Audit Audit Opinion: Needs Improvement. Date: December 15, Report Number: 2014-IT-03

FINMA Circular 2008/21 (Excerpt) IT risk management concept Deal with cyber risk Handling of electronic client data

Transcription:

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities regulated by the DFS comply 1 with the following requirements by certain deadlines, and that a senior officer or the board chairperson certify 2 compliance with the regulations by certain deadlines. Comply by August 28, 2017 / Certify by February 15, 2018 Summary By August 28, 2017, your company must be in compliance with the measures listed below and by February 15, 2018, a senior officer or the board of directors of your company must certify that your company is in compliance with those measures. Specifically, this signed certification would require that your company: Be able to notify the Superintendent of Financial Services ( Superintendent ) within 72 hours of a Cybersecurity Event 3, which also requires your company to be able to assess its regulatory notification obligations within 72 hours of a Cybersecurity Event 1 Under 500.19(a), covered entities with fewer than ten employees, less than $5,000,000 in gross annual revenue, or less than $10,000,000 in year-end total assets are exempt from the following DFS regulations: 500.04, 500.05, 500.06, 500.10, 500.12, 500.14, 500.15, and 500.16. Under 500.19(b), employees, agents, representatives, or designees of covered entities who are themselves covered entities are exempt. Under 500.19(c)-(d), covered entities that do not operate, maintain, utilize or control any Information Systems and are not required to work with Nonpublic Information and covered entities under Article 70 of the Insurance Law that are not required to work with Nonpublic Information are exempt from the following DFS regulations: 500.02, 500.03, 500.04, 500.05, 500.06, 500.07, 500.08, 500.10, 500.12, 500.14, 500.15, and 500.16. Those covered entities qualifying for the above exemptions must file a Notice of Exemption within thirty days of determining covered entity is exempt. Under 500.19(f), persons subject to Insurance Law section 1110 or 5904, or any accredited reinsurer are exempt. If, at the end of a covered entity s fiscal year, it no longer qualifies for exemption, the covered entity must comply by 180 days after the end of its fiscal year. 2 This certification should be based on the form in Appendix A. 3 This and other defined terms are addressed in Appendix B.

Designate a Chief Information Security Officer ( CISO ) Implement an overall cybersecurity program Implement appropriate cybersecurity policies Develop an incident response plan Regulate access privileges for Information Systems Utilize and integrate qualified cybersecurity personnel Descriptions of Relevant Measures 1. Notices to Superintendent of Financial Services ( Superintendent ) [500.17]: Your company is prepared to: Notify the Superintendent of any Cybersecurity Event that: Requires notice to be provided to any of the following: Government body Self-regulatory agency Other supervisory body; or Created a reasonable likelihood of materially harming any part of the normal operation of your company Submit such notice to the superintendent as promptly as possible, but in all cases within 72 hours of a determination that a relevant Cybersecurity Event has occurred 2. Chief Information Security Officer ( CISO ) [500.04(a)]: A CISO Has been designated by your company Is qualified to oversee, implement, and enforce your company s cybersecurity program If the CISO is a third party service provider or an affiliate: Your company is still able to certify compliance, as it retains responsibility for compliance Your company has designated a senior personnel member to direct and oversee the third party service provider 2

Your company requires the third party service provider to maintain a cybersecurity program 3. Cybersecurity Program [500.02]: Your company has implemented and maintains a cybersecurity program that is: Designed to protect your company s Information Systems Based on your company s Risk Assessment 4 Designed to perform the following core cybersecurity functions: Identify and assess internal cybersecurity risks Identify and assess external cybersecurity risks Use defensive infrastructure to protect stored Nonpublic Information Detect Cybersecurity Events Respond to detected Cybersecurity Events to mitigate any negative effects Recover from Cybersecurity Events and restore normal operations and services Fulfill applicable regulatory reporting obligations 4 There is an ambiguity in the DFS regulation: A covered company is required to have a cybersecurity program in place pursuant to 500.02 by August 28, 2017, and certain elements of the program must be based on the covered company s Risk Assessment. However, the Risk Assessments themselves are not actually required until March 1, 2018, i.e., after the program should already be in place. The best practice is likely for covered companies to conduct Risk Assessments by August 28, 2017. 3

4. Cybersecurity policy [500.03]: Your company has implemented and continues to maintain written policies that: Are approved by a Senior Officer or board of directors Are based on your company s Risk Assessment Addresses the following areas, as applicable to your company: Information security Data governance and classification Asset inventory and device management Access controls and identity management Business continuity and disaster recovery planning and resources Systems operations and availability concerns Systems and network security Systems and network monitoring Systems and application development and quality assurance Physical security and environmental controls Customer data privacy Vendor and Third Party Service Provider management Risk assessment Incident response 4

5. Incident Response Plan [500.16]: Your company has a written incident response plan that: Is designed to ensure prompt response to, and recovery from, any Cybersecurity Event that materially affects the confidentiality, integrity or availability of your Information Systems or business operations Addresses the internal process for responding to a Cybersecurity Event Identifies the goals of the plan Addresses external and internal communications and information sharing Identifies requirements for the remediation of any identified weaknesses Provides for documentation and reporting on Cybersecurity Events Allows for the evaluation and revision of the incident response plan after a Cybersecurity Event Clearly defines: Roles Responsibilities Levels of decision-making authority 6. Access Privileges [500.07]: Your company limits user access to Information Systems as part of the cybersecurity program Your company periodically reviews access privileges 5

7. Cybersecurity Personnel and Intelligence [500.10]: Your Company utilizes in-house cybersecurity personnel or third party service provider(s) that: Manage cybersecurity risks Perform or oversee performance of the company s cybersecurity program Are qualified to manage your company s cybersecurity risks Receive cybersecurity updates and training from your company Maintain current knowledge of cybersecurity issues 6

Comply by March 1, 2018 / Certify by February 15, 2019 Summary In addition to the measures listed above, by March 1, 2018, your company must be in compliance with the measures listed below and by February 15, 2019, the board of directors or a senior officer of your company must certify that your company is in compliance with those measures. Specifically, this signed certification would require that your company: Require the CISO to prepare a report to your board of directors Implement cybersecurity awareness training for personnel Implement cybersecurity monitoring and testing Conduct a Risk Assessment Maintain effective controls to protect Information Systems Descriptions of Relevant Measures 8. CISO Report [500.04(b)]: Your company s CISO has prepared: A written report to the board of directors on the cybersecurity program and material risks The Report considers, as applicable: The confidentiality of Nonpublic Information and security of your company s Information Systems Your company s cybersecurity policies and procedures Material cybersecurity risks The overall effectiveness of your company s cybersecurity program Material Cybersecurity Events involving your company 9. Training [500.14(b)]: Your company provides regular cybersecurity awareness training for all personnel The training is updated to reflect risks identified in the risk assessment 7

10. Penetration Testing and Vulnerability Assessments [500.05]: Your company has incorporated into its cybersecurity program: Monitoring and periodic testing Annual penetration testing Bi-annual vulnerability assessments 11. Risk Assessment [500.09]: Your company has conducted a Risk Assessment for all Information Systems that: Is updated as necessary to address changes in systems, data, and/or business operations Allows for revision of controls in response to evolving threats Is tailored to your company s particular cybersecurity risks and safeguards Is documented Is carried out in accordance with written policies that include Criteria for evaluating and categorizing identified cybersecurity risks or threats facing the company Criteria for assessing the confidentiality, integrity, security and availability of your company s Information Systems and Nonpublic Information, including the adequacy of existing controls in the context of identified risks Requirements describing how identified risks will be mitigated or accepted based on the Risk Assessment and how the cybersecurity program will address the risks 8

12. Multi-Factor Authentication [500.12]: Your company has implemented: Effective controls, which may include multi-factor authentication or risk-based authentication Multi-factor authentication or a reasonably equivalent or more secure control approved in writing by the CISO for individuals accessing your company s system from an external network 9

Comply by September 1, 2018 / Certify by February 15, 2019 Summary In addition to the measures listed above, by September 1, 2018, your company must be in compliance with the measures listed below and by February 15, 2019, the board of directors or a senior officer of your company must certify that your company is in compliance with those measures. Specifically, this signed certification would require that your company: Implement audit trails designed to detect and respond to Cybersecurity Events Maintain policies and procedures to secure its applications Implement controls, including encryption where feasible, to protect nonpublic information Monitor authorized users Implement limits on data retention Descriptions of Relevant Measures 13. Audit Trail [500.06]: Your company maintains systems that: Are able to reconstruct material financial transactions Maintains records necessary for this purpose for at least five years Include audit trails designed to detect and respond to Cybersecurity Events that have a reasonable likelihood of materially harming any material part of the normal operations of your company Maintains records necessary for this purpose for at least three years 10

14. Application Security [500.08]: Your company s cybersecurity program incorporates: Written procedures, guidelines, and standards to ensure the use of secure development practices for in-house applications AND Procedures to evaluate the security of externally developed applications used by your company These procedures are periodically reviewed and updated as necessary by the CISO 15. Encryption of Nonpublic Information [500.15]: To protect Nonpublic Information (at rest or in transit), your company has: Implemented appropriate controls, including encryption to the extent feasible If encryption of information in transit over external networks or at rest is not feasible: Your company secures Nonpublic Information using effective alternative controls The alternative controls are reviewed and improved by the CISO If your company is using alternative controls: The CISO reviews the feasibility of encryption and the effectiveness of the alternative controls at least annually. 16. Monitoring [500.14(a)]: Your company has: Implemented risk-based policies and procedures to monitor the activity of authorized users and detect unauthorized access 17. Limitations on Data Retention [500.13]: For the secure disposal of data, your company has: Developed policies and procedures for the secure disposal of Nonpublic Information that is no longer necessary for business or legal purposes in the cybersecurity program 11

Comply by March 1, 2019 / Certify by February 15, 2020 Summary In addition to the measures listed above, by March 1, 2019, your company must be in compliance with the measures listed below and by February 15, 2020, the board of directors or a senior officer of your company must certify that your company is in compliance with those measures. Specifically, this signed certification would require that your company: Maintain a third party service provider policy Description of Relevant Measure 18. Third Party Service Provider Security Policy [500.11]: Your company implemented a third party service provider policy: In writing Based on your company s Risk Assessment Addressing the following, to the extent applicable: Identification and risk assessment of third party service providers Minimum cybersecurity practices third party service providers must meet to work with your company Due diligence processes to evaluate third party service providers cybersecurity Periodic assessment of the adequacy of third party service providers cybersecurity Including guidelines for due diligence and/or contractual protections relating to third party service providers addressing the following, to the extent applicable: Third party service providers policies and procedures for access controls Third party service providers policies and procedures for the use of encryption Notice to your company if there is a cybersecurity event impacting the third party service provider Representations and warranties about third party service providers policies and procedures 12

Appendix A [Covered Entity Name] February 15, 20[ ] Certification of Compliance with New York State Department of Financial Services Cybersecurity Regulations The Board of Directors or a Senior Officer(s) of the Covered Entity certifies: (1) The Board of Directors [or name of Senior Officer(s)] has reviewed documents, reports, certifications and opinions of such officers, employees, representatives, outside vendors and other individuals or entities as necessary; (2) To the best of the [Board of Directors] or [name of Senior Officer(s)] knowledge, the Cybersecurity Program of [name of Covered Entity as of date of the Board Resolution or Senior Officer(s) Compliance Finding] for the year ended [year for which Board Resolution or Compliance Finding is provided] complies with Part [ ]. Signed by the Chairperson of the Board of Directors or Senior Officer(s) Name: Date: [DFS Portal Filing Instructions] 13

Appendix B Relevant Defined Terms [500.01] Covered Entity: Anyone operating under or required to operate under an authorization under the Banking Law, the Insurance Law, or the Financial Services Law. Cybersecurity Event: Any act or attempt to gain unauthorized access to, disrupt, or misuse an Information System or information stored in those systems. Information System: Discrete set of electronic information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of electronic information, and any specialized system. Nonpublic Information: All electronic information that is not publically available and is business related, concerns an individual and possible to use to identify that individual, or is data (except age or gender) from a healthcare provider. 14