Blog

NYDFS Cybersecurity Risk Assessment: What Businesses Need to Know

NYDFS Cybersecurity Risk Assessment: What Businesses Need to Know

March 17, 20267 min read

If your business operates under a New York financial services license, cybersecurity is not optional. The New York Department of Financial Services made that clear when it enacted 23 NYCRR 500, one of the most detailed cybersecurity regulations in the country. At the center of that regulation is a requirement that most covered businesses overlook until it is too late: the cybersecurity risk assessment.

What is an NYDFS Cybersecurity Risk Assessment?

A NYDFS cybersecurity risk assessment is a formal, documented review of your organization's cybersecurity risks, controls, and gaps as required under 23 NYCRR 500. It is not a one-time checkbox. It is the foundation your entire cybersecurity program is supposed to be built on.

Under the regulation, covered entities must conduct risk assessments periodically and update them whenever a material change happens to the business or IT environment. The findings from the assessment are supposed to directly inform your cybersecurity policies, your security controls, and your annual certification filing with the Superintendent of Financial Services.

In plain terms: if you cannot show a documented risk assessment, your compliance program does not have a foundation.

Who Needs to Do This?

The regulation applies to any individual or entity operating under a license, registration, charter, certificate, permit, or similar authorization under New York's Banking Law, Insurance Law, or Financial Services Law.

That covers a wide range of businesses, including banks, credit unions, mortgage companies, insurance firms, money transmitters, and other licensed financial service providers operating.

There are limited exemptions for smaller organizations. If your company has fewer than ten employees, less than five million dollars in gross annual revenue over the prior three years, or less than ten million dollars in total year-end assets, you may qualify for a limited exemption. However, even exempt entities should understand what the regulation requires, because exemption status can change as a business grows.

What Does the Assessment Actually Cover?

This is where a lot of businesses get vague. A NYDFS cybersecurity risk assessment is not just a scan of your network. It is a structured review of your entire cybersecurity environment, evaluated against the specific requirements of 23 NYCRR 500.

Here is what a proper assessment looks at:

Access controls and authentication. The regulation requires covered entities to implement multi-factor authentication and limit access to systems based on the principle of least privilege. The assessment reviews whether those controls are actually in place and working.

Nonpublic information handling. Any data that qualifies as nonpublic information under the regulation, including customer records, financial data, and personal identifiers, must be identified, tracked, and encrypted both in transit and at rest. The assessment maps where that data lives and whether it is protected.

Cybersecurity program and policy documentation. The regulation requires a written cybersecurity program and policy. The assessment reviews whether your documentation exists, whether it is current, and whether it aligns with what the regulation mandates.

Incident response plan. Covered entities are required to have a written incident response plan. Critically, the regulation also requires that a cybersecurity incident be reported to the Superintendent of Financial Services within 72 hours of detection. The assessment evaluates whether your plan is ready to execute.

Third-party and vendor risk. This is one of the most commonly missed areas. The regulation requires covered entities to assess and manage the cybersecurity risks posed by third-party service providers. If your vendors have access to your systems or data, they are in scope.

Penetration testing and vulnerability assessments. The regulation requires both. A penetration test is an active technical test of your systems. A vulnerability assessment is a broader review of known weaknesses. The risk assessment identifies whether these are being conducted, how often, and whether findings are being addressed.

Audit trail and data retention. Covered entities must retain records for at least three years to support an audit trail. The assessment reviews whether your logging and retention practices meet that requirement.

CISO oversight. Someone in your organization needs to be formally accountable for cybersecurity. The regulation requires a qualified chief information security officer, either in-house or through a virtual CISO arrangement. The assessment verifies that this oversight structure exists and is functioning.

Why Businesses Fall Behind on This

The regulation has been in effect since 2017, but enforcement actions have made it clear that many covered entities are still not meeting the risk assessment requirement the way the regulation intends.

The most common reason is not negligence. It is that financial businesses are busy, and the risk assessment feels like a compliance task rather than a business priority. Assessments get scheduled and delayed. Internal IT teams complete them informally without proper documentation. Or a vendor runs a vulnerability scan, and the business treats that as the full assessment.

None of those approaches holds up under scrutiny. The DFS has shown a willingness to investigate and penalize organizations that cannot produce documented evidence of a proper risk assessment process.

The other issue is that the regulation requires the assessment to be updated when material changes occur. A business that acquires new technology, expands into new services, onboards a major new vendor, or experiences a security incident has a material change. Many businesses do not have a process to trigger a new assessment when that happens.

What the Assessment Feeds Into

Understanding the risk assessment in isolation misses the point. The assessment is meant to drive everything else in your cybersecurity program.

Your written cybersecurity policies are supposed to be based on the findings. Your security controls should address the risks identified. Your penetration testing scope should reflect the assets that the assessment surfaces. Your incident response plan should account for the scenarios the assessment identifies as most likely.

When the risk assessment is done properly, the rest of your 23 NYCRR 500 compliance program has a clear, documented basis. When it is not, the rest of the program tends to be disconnected from your actual risk environment, which is exactly what regulators look for.

The Annual Certification Connection

Every year, covered entities are required to file a certification with the Superintendent of Financial Services confirming that their cybersecurity program complies with 23 NYCRR 500. A board-level review is part of that process.

That certification is only defensible if the underlying program is documented, and the risk assessment is the core document. If the assessment is missing, outdated, or incomplete, the certification becomes difficult to support.

This is why the risk assessment is not a one-time project. It is an ongoing obligation tied directly to the annual compliance cycle.

What to Look for in a Risk Assessment Partner

Not every cybersecurity assessment is built for NYDFS compliance specifically. A generic IT security audit will not map its findings to 23 NYCRR 500. A network vulnerability scan will not cover third-party vendor risk or incident response readiness.

When working with an IT company or cybersecurity provider on your NYDFS risk assessment, look for a few things. The assessment should be mapped directly to the regulation's requirements, not a generic framework. Findings should be documented in a format that supports your annual certification. The scope should include your vendors and third-party service providers, not just your internal systems. And the provider should give you a clear remediation roadmap, not just a list of issues.

A NYDFS cybersecurity risk assessment is not a technicality. It is the structural requirement that your entire compliance program depends on. Financial businesses that treat it as a formality or delay it in favor of other priorities tend to find themselves in difficult positions when the DFS comes looking or when a security incident exposes the gaps.

The regulation is detailed, but the core requirement is straightforward: know your risks, document them properly, and build your cybersecurity program around what you find. Doing that well is what separates organizations that are genuinely prepared from those that are only technically compliant on paper.

Back to Blog