10 Critical Areas to Check for DFS-500 Compliance

by John Allegro | 05, 17, 2021
DFS-500

With cybersecurity threats on the rise, the New York State Department of Financial Services (NYSDFS) enhanced its DFS-500 cybersecurity regulation, which protects financial institutions’ customer information and IT systems.

DFS-500 requires qualifying financial institutions, referred to as “Covered Entities,” to conduct risk assessments and develop security programs and incident response plans based on the results of said assessment.

Jump to:

Who Is required to Comply with DFS-500

Critical Components of DFS-500 Compliance

Cybersecurity Program
Cybersecurity Policies
Penetration and Vulnerability Testing
Audit Trail
Access Privileges
Risk Assessments
Third-Party Service Providers
Multi-Factor Authentication
Encryption of Nonpublic Information
Incident Response Plan

Impacts of Non-Compliance

Next Steps for Financial Institutions

Who Is Required to Comply with DFS-500?

A Covered Entity is “any person operating under or required to operate under a license, registration, charter, certificate, permit, accreditation, or similar authorization under the Banking Law, the Insurance Law, or the Financial Services Law.” 

This includes, but is not limited to, the following institutions: 

  • Service providers.
  • Insurance companies.
  • Mortgage companies.
  • Foreign banks licensed to operate in the state of New York.
  • Licensed lenders.
  • Private banks.
  • State-chartered banks.

Organizations that fit any of the below criteria are considered exempt from certain requirements of the DFS-500 regulation: 

  • Employ less than ten people.
  • Produced less than $5 million in gross annual revenue from New York operations in each of the last three years.
  • Hold less than $10 million in year-end total assets.

Critical Components of DFS-500 Compliance

There are several guidelines Covered Entities must comply with under updated DFS-500 regulations. These are considered the most critical:

Cybersecurity Program

Develop a cybersecurity program that is designed to identify and evaluate risks at regular intervals. This program must clearly outline the steps for detection, response and recovery in the event of a cybersecurity attack. It must also follow all reporting regulations outlined under the NYSDFS SHIELD Act. (Section 500.02)

Cybersecurity Policies

Organizations must establish written cybersecurity policies based on the results of each risk assessment. These policies should define how the organization will maintain and protect personally identifiable information (PII) and the systems that house said data. (Section 500.03)

Penetration and Vulnerability Testing

Annual penetration testing and bi-annual vulnerability assessments must be conducted based on the findings outlined in the risk assessment. (Section 500.05) 

Audit Trail

An audit trail for all cybersecurity events must be maintained for no less than three years. Audit trails for financial transactions must be maintained for no less than five years.
(Section 500.06) 

Access Privileges

Access to PII and the information systems that house PII should be granted on a limited basis. Access to these systems should be reviewed frequently to ensure only those that truly need access are authorized. (Section 500.07)

Risk Assessments

A risk assessment must be conducted to analyze all cybersecurity threats and the controls in place to protect the organization. It should aim to assess the “confidentiality, integrity, security, and availability of the Covered Entity’s Information Systems and Nonpublic Information.” (Section 500.09)

Third Party Service Providers

All third-party service providers employed by a Covered Entity must comply with the same regulations, ensuring the security of their systems and PII. (Section 500.11)

Multi-Factor Authentication

Multi-Factor Authentication, or the use of multiple methods of identity verification, is required for all accounts accessing nonpublic information. (Section 500.12)

Encryption of Nonpublic Information

Nonpublic information must be encrypted when in transit over external networks and while at rest. (Section 500.15) 

Incident Response Plan

A written incident response plan (IRP) must be developed that outlines the internal processes for responding to and recovering from a cybersecurity event. (Section 500.16)

Impacts of Non-Compliance

Penalties for violating the NYSDFS Cybersecurity Regulation are not specifically identified, but would likely fall under the purview of penalties for violating the Banking Law. Those penalties include: 

  • $2,500 per day during which a violation continues,
  • $15,000 per day in the event of any reckless or unsound practice or pattern of misconduct, or
  • $75,000 per day in the event of a knowing and willful violation.

Next Steps for Financial Institutions

Covered Entities must file their Certificate of Compliance for the 2020 calendar year by April 15, 2021.

BBH is a New York City-based managed service provider that specializes in compliance for regional banks in the tri-state area and beyond. We offer compliance support either as a stand-alone service or as a part of our complete managed services offering.

We offer a complimentary gap analysis to financial institutions. Learn more and request one to see how well you comply with DFARS and other security protocols today.

Free Security and Compliance Gap Analysis