Risk

5/16/2017
02:00 PM
Mark Sangster
Mark Sangster
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

The Wide-Ranging Impact of New York's Cybersecurity Regulations

New York's toughest regulations yet are now in effect. Here's what that means for your company.

One of the harshest cybersecurity regulations to hit companies in the US recently went into effect in New York. The state regulator, the New York Department of Financial Services, introduced its Cybersecurity Requirements for Financial Services Companies (23 NYCRR Part 500), a regulation designed to tighten cybersecurity practices across a wide selection of companies, which became effective on March 1, 2017.

Part 500 covers anyone "operating under or required to operate under a license, registration, charter, certificate, permit, accreditation or similar authorization under the Banking Law, the Insurance Law or the Financial Services Law." In practice, this includes banks, investment firms, insurers and licensed lenders, holding companies, charities, and service contractors. They should all be watching this regulation and preparing themselves for compliance.

The rules are highly prescriptive, going into substantial detail about the cybersecurity requirements for covered entities and imposing significant reporting requirements on those companies.

Covered entities must assess internal and external cybersecurity risks, and then use technology and policy to mitigate them. They must also detect and recover from cybersecurity events. All of this must be overseen by a designated senior official (effectively, a chief information security officer or CISO). This official is not only responsible for the cybersecurity program but also for submitting annual reports to the regulator. Under section 17, the CISO must also report a cybersecurity event within 72 hours.

This increase in cybersecurity reporting requirements removes any chance of plausible deniability for companies covered by the rule. It defines a cybersecurity event as any event that another regulator would deem reportable. The blanket coverage means that a company cannot claim ignorance of reporting standards as an excuse for not reporting an event.

These reporting rules are already in place now, with the first section 17 reports due in February 2018. In February 2019, the burden on covered companies will increase further when reporting on several other sections comes due.

These reports include:

  • Penetration testing: Companies must provide annual proof of penetration tests, which use specialists to test weaknesses in company infrastructure.
  • Audit trails: The regulation requires covered entities to prove audit systems showing how they detect cybersecurity events.
  • Secure development: Under section 8, regulated companies will have to prove that they use secure software development processes for in-house applications and that they test the cybersecurity of external software.
  • Periodic risk assessments: Cybersecurity assessment is not a one-shot deal. February 2019 will also see companies submit their first reports under section 9, which demands periodic risk assessments to show that they are still compliant.
  • Multifactor authentication: Under section 12, they will need to use stringent multifactor authentication (for example, the use of hardware tokens or risk-based access controls).
  • Encryption: Section 15 will also need companies to report on the adequate encryption of sensitive data by this date.

Third-Party Assessments
In February 2020, the reporting requirements ramp up again, when companies will have to extend some of these security considerations outside their own walls. They will be forced to file reports about their third-party service providers' cybersecurity, too. This involves assessing the cybersecurity risks at companies processing their data, and explaining how they did it. The regulations require periodic risk assessments, and measures such as encryption, access controls, and cybersecurity event reporting must also be built into service provider contracts.

In practice, this means that should a service provider managing a company's data suffer a security breach, the company itself will come under scrutiny, and must prove that it conducted proper due diligence on the service provider.

While companies must file reports by various dates, Part 500 requires them to be compliant well before those reporting deadlines. The 180-day transition period for NYCRR began on March 1, meaning that they must prove by the end of August that they have a compliance program, effective policies, and a CISO in place, even though the first reports aren't due until the following February.

Other compliance deadlines loom one year after Part 500's effective date, which requires compliance around March 2018, and there are more in September that year. In practice, companies must be able to prove that they are able to scrutinize cybersecurity practices at their third-party providers a full year before they are due to report on them.

What this means is that companies must be working now to assess their sensitive data and how they are protecting it. They must then conduct a gap analysis to see what measures are necessary to meet Part 500's many requirements.

NYCRR is one of the strictest cybersecurity regulations at a federal or state level, and each of the requirements discussed here could take months of work. Take it seriously, and bring in a third-party advisor where necessary, because the regulator will not take kindly to those companies that violate its new rules.

Related Content:

Mark Sangster is a cybersecurity evangelist who has spent significant time researching and speaking to peripheral factors influencing the way that legal firms integrate cybersecurity into their day-to-day operations. In addition to Mark's role as VP and industry security ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12633
PUBLISHED: 2018-06-22
An issue was discovered in the Linux kernel through 4.17.2. vbg_misc_device_ioctl() in drivers/virt/vboxguest/vboxguest_linux.c reads the same user data twice with copy_from_user. The header part of the user data is double-fetched, and a malicious user thread can tamper with the critical variables (...
CVE-2018-12634
PUBLISHED: 2018-06-22
CirCarLife Scada v4.2.4 allows remote attackers to obtain sensitive information via a direct request for the html/log or services/system/info.html URI.
CVE-2018-12635
PUBLISHED: 2018-06-22
CirCarLife Scada v4.2.4 allows unauthorized upgrades via requests to the html/upgrade.html and services/system/firmware.upgrade URIs.
CVE-2018-12630
PUBLISHED: 2018-06-21
NEWMARK (aka New Mark) NMCMS 2.1 allows SQL Injection via the sect_id parameter to the /catalog URI.
CVE-2018-12631
PUBLISHED: 2018-06-21
Redatam7 (formerly Redatam WebServer) allows remote attackers to read arbitrary files via /redbin/rpwebutilities.exe/text?LFN=../ directory traversal.