NY Regulator Puts Financial Firms on Notice: You Are Accountable for Your Vendors' Security

New York DFS Issues Formal Guidance on Managing Third-Party Cybersecurity Risk

MEDIUM
October 23, 2025
5m read
RegulatoryPolicy and ComplianceSupply Chain Attack

Related Entities

Full Report

Executive Summary

On October 21, 2025, the New York State Department of Financial Services (DFS), one of the most influential financial regulators in the United States, issued formal guidance to all its regulated entities, including banks and insurance companies. The guidance reinforces the principle that financial firms are ultimately responsible for managing cybersecurity risks, even when those risks originate from third-party service providers (TPSPs). Citing the growing reliance on external vendors for critical technologies like cloud, AI, and fintech, the DFS warned that risk exposure is increasing. The regulator has placed the onus squarely on the senior leadership and boards of directors of these institutions, mandating their active engagement and sufficient expertise in overseeing third-party cyber risk. This move signals a heightened regulatory focus on supply chain security within the financial sector.


Regulatory Details

The guidance serves as a clarification and reinforcement of the existing NYDFS Cybersecurity Regulation (23 NYCRR 500), specifically focusing on Section 500.11, which pertains to Third-Party Service Provider Security Policy. The key tenets of the new guidance are:

  • Accountability Cannot Be Outsourced: The central message from the DFS is that while functions can be outsourced, the risk and accountability remain with the regulated entity. Firms cannot use a TPSP as a shield against regulatory action or liability in the event of a breach.
  • Board and Senior Officer Oversight: The guidance explicitly calls for the 'senior governing body' (e.g., board of directors) and senior officers to be actively involved in TPSP risk management. They are expected to have a level of cybersecurity understanding that allows them to effectively challenge the executive management's decisions and strategies regarding vendor risk.
  • Proactive and Adaptive Governance: The DFS expects firms to move beyond static, point-in-time assessments of their vendors. They must establish and maintain a continuous, adaptive governance framework that can manage the complex and evolving risks associated with modern TPSPs, especially those providing cloud and AI services.
  • Protection of Nonpublic Information (NPI): A primary focus is the protection of consumer data. The guidance reiterates that firms must ensure their TPSPs have appropriate controls to safeguard any NPI they handle, in line with the firm's own security standards.

Affected Organizations

This guidance applies to all entities regulated by the NYDFS, which includes a vast array of organizations operating in or serving New York State. This scope covers:

  • Banks and trust companies
  • Insurance companies, agents, and brokers
  • Mortgage lenders and servicers
  • Virtual currency businesses (cryptocurrency exchanges)
  • Other licensed financial services organizations

Essentially, any financial institution under the jurisdiction of the NYDFS must review and likely enhance its third-party risk management program in light of this guidance.


Compliance Requirements

To comply, affected organizations must ensure their Third-Party Risk Management (TPRM) program includes, at a minimum:

  1. Due Diligence and Vetting: A formal process for assessing the security posture of potential TPSPs before engaging them. This includes reviewing their security policies, procedures, and independent audit reports (e.g., SOC 2).
  2. Contractual Obligations: Ensuring contracts with TPSPs include strong cybersecurity provisions, such as requirements to maintain specific security controls, notify the firm of any security incidents, and grant the firm the right to audit their security.
  3. Continuous Monitoring: Implementing a program to continuously monitor the security of critical TPSPs. This can include periodic reassessments, reviewing security ratings, and monitoring for publicly disclosed breaches involving the vendor.
  4. Risk-Based Approach: Classifying vendors based on the level of risk they pose (e.g., the sensitivity of data they access). High-risk vendors should be subject to more stringent due diligence and ongoing monitoring.
  5. Board-Level Reporting: Establishing clear reporting lines to ensure that senior management and the board are regularly informed about the state of third-party cyber risk.

Impact Assessment

The issuance of this guidance will have significant operational and strategic impacts on financial institutions:

  • Increased Scrutiny: Firms can expect DFS examiners to pay much closer attention to their TPRM programs during audits.
  • Higher Compliance Costs: Organizations may need to invest in new tools (e.g., security rating platforms, GRC software) and personnel to meet the heightened expectations for vendor oversight.
  • Pressure on Vendors: The guidance will have a trickle-down effect, as financial firms will impose stricter security requirements on their entire supply chain. Vendors who cannot meet these standards may lose business.
  • Elevated Board Responsibility: Board members can no longer be passive recipients of cybersecurity reports. They are now on the hook to be active participants in risk governance, which may require them to seek additional training or expertise.

Compliance Guidance

Firms should take the following tactical steps:

  1. Conduct a Gap Analysis: Immediately review your current TPRM program against the new guidance and the underlying 23 NYCRR 500 regulation to identify any deficiencies.
  2. Brief the Board: Present this guidance to your board of directors and senior leadership, explaining the explicit expectation of their involvement and accountability.
  3. Review Critical Vendor Contracts: Prioritize a review of contracts with your most critical TPSPs (e.g., cloud providers, core banking software vendors) to ensure they contain adequate security clauses.
  4. Automate Monitoring: Where possible, move away from manual, questionnaire-based annual assessments and towards automated, continuous monitoring of your vendors' security posture.
  5. Update Incident Response Plans: Ensure your IR plans include specific playbooks for incidents originating from a third party, including communication protocols and contractual notification requirements.

Timeline of Events

1
October 21, 2025
The New York State Department of Financial Services (DFS) issues guidance on third-party cybersecurity risks.
2
October 23, 2025
This article was published

MITRE ATT&CK Mitigations

Specifically, training for board members and senior officers to ensure they have sufficient cybersecurity knowledge to perform their oversight duties as required by the DFS.

Conducting regular, formal audits of third-party service providers' security controls, as well as internal TPRM processes.

Mapped D3FEND Techniques:

Enforcing the principle of least privilege for all third-party connections to limit the potential impact of a vendor compromise.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

In the context of the NY DFS guidance, financial institutions must rigorously apply the principle of least privilege to all third-party service provider accounts. This D3FEND technique involves a meticulous review and hardening of permissions. Instead of granting broad administrative rights, firms should create highly restricted, purpose-built roles for each vendor. For example, a vendor providing support for a specific application should have an account that can only access that application's servers and logs, and nothing else. Permissions should be reviewed on a quarterly basis and automatically revoked when a contract ends. This should be implemented through a centralized Identity and Access Management (IAM) solution. This directly addresses the regulator's concern about protecting nonpublic information by ensuring a compromised vendor account has a minimal blast radius and cannot be used to access data or systems beyond its explicit function.

To meet the DFS's expectation of proactive governance, firms should implement Authorization Event Thresholding to monitor vendor activity. This goes beyond simple login alerts. It involves setting up rules in a SIEM or CASB to detect anomalous patterns of authorization and access. For instance, an alert could be triggered if a vendor account generates more than 100 'access denied' events in a 10-minute window, which could indicate a compromised account being used for reconnaissance. Another rule could alert if a TPSP account, which normally only accesses data during US business hours, suddenly starts accessing large volumes of data at 3 AM. This technique provides concrete, data-driven insights into vendor behavior, allowing the security team to detect potential incidents in near real-time and demonstrate to regulators that they are actively monitoring their third-party connections, not just relying on static, annual assessments.

Sources & References

NY Insurance Regulator Warns of Cyber Threats From Third-Party Service Providers
Insurance Journal (insurancejournal.com) October 23, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

NYDFSRegulationComplianceThird-Party Risk ManagementFinancial ServicesSupply Chain

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading