-
Notifications
You must be signed in to change notification settings - Fork 181
/
dfs-500-2023-11.yaml
2054 lines (2030 loc) · 103 KB
/
dfs-500-2023-11.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
urn: urn:intuitem:risk:library:dfs-500-2023-11
locale: en
ref_id: DFS-500-2023-11
name: NY DFS 500 with 2023-11 amendments
description: 'NEW YORK STATE
DEPARTMENT OF FINANCIAL SERVICES
SECOND AMENDMENT TO 23 NYCRR 500
CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES
On November 1, 2023, DFS announced amendments to Cybersecurity Regulation, 23 NYCRR
Part 500.'
copyright: "\nGeneral Disclaimer\n\nThe New York State Department of Financial Services\
\ takes reasonable measures to ensure that the data and information on this website\
\ is accurate and current. However, the Department makes no express or implied warranty\
\ regarding such information or data, and hereby expressly disclaims all legal liability\
\ and responsibility based on reliance on any information or data that is available\
\ through this website. While every effort is made to provide useful information,\
\ the Department does not warrant this information to be authoritative, complete,\
\ factual, timely or accurate. The Department shall not be liable for any damages,\
\ including the loss of data resulting from delays, non-deliveries or service interruptions\
\ caused by negligence, errors or omissions.\n\nThe information available on this\
\ website is not intended to constitute and should not be considered legal advice,\
\ nor is it intended as a substitute for obtaining legal advice from competent,\
\ independent legal counsel in the relevant jurisdiction. Transmission and receipt\
\ of this information is not intended to create and does not create an attorney-client\
\ relationship. Any information or inquiries that the Department receives from a\
\ user over our information systems is not considered to be, nor will be treated\
\ as, confidential.\n\nThis website provides links to other websites for convenience\
\ and informational purposes only. The Department is not responsible for the content\
\ of external websites linked to or referenced on this website, and makes no endorsement\
\ of, nor makes any warranty, express or implied, regarding the content of these\
\ external websites. The Department does not endorse or warranty, and is not responsible\
\ for, the privacy and security practices of any other website, including those\
\ of any third party service providers to these sites. Users should be aware that\
\ when they select a link on this website, they may be leaving the Department\u2019\
s website.\n\nThe Department provides access to resources and other information\
\ on this website as a public service, on an \"as is\" and \"as available\" basis.\
\ The information is subject to change on a regular basis, without notice. Unless\
\ otherwise noted on an individual document, file, webpage or other website item,\
\ the Department grants users permission to reproduce and distribute all information\
\ available on this website for non-commercial purposes, as long as the contents\
\ remain unaltered and as long as it is noted that the contents have been made available\
\ by the Department.\n\nThe user\u2019s access to and use of this website shall\
\ be governed by the laws of the State of New York.\n\nThe Department reserves the\
\ right to change its policies and rules at any time."
version: 1
provider: NEW YORK STATE
packager: intuitem
objects:
framework:
urn: urn:intuitem:risk:framework:dfs-500-2023-11
ref_id: DFS-500-2023-11
name: NY DFS 500 with 2023-11 amendments
description: 'NEW YORK STATE
DEPARTMENT OF FINANCIAL SERVICES
SECOND AMENDMENT TO 23 NYCRR 500
CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES
On November 1, 2023, DFS announced amendments to Cybersecurity Regulation, 23
NYCRR Part 500.'
requirement_nodes:
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.0
assessable: false
depth: 1
ref_id: '500.0'
name: Introduction
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node3
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.0
description: The New York State Department of Financial Services (DFS) has been
closely monitoring the ever-growing threat posed to information and financial
systems by nation-states, terrorist organizations and independent criminal
actors. Recently, cybercriminals have sought to exploit technological vulnerabilities
to gain access to sensitive electronic data. Cybercriminals can cause significant
financial losses for DFS regulated entities as well as for New York consumers
whose private information may be revealed and/or stolen for illicit purposes.
The financial servicesindustry is a significant target of cybersecurity threats.
DFS appreciates that many firms have proactively increased their cybersecurity
programs with great success.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node4
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.0
description: "Given the seriousness of the issue and the risk to all regulated\
\ entities, certain regulatory minimum standards are warranted, while not\
\ being overly prescriptive so that cybersecurity programs can match the relevant\
\ risks and keep pace with technological advances. Accordingly, this regulation\
\ is designed to promote the protection of customer information as well as\
\ the information technology systems of regulated entities. This regulation\
\ requires each company to assess its specific risk profile and design a program\
\ that addresses its risks in a robust fashion. Senior management must take\
\ this issue seriously and be responsible for the organization\u2019s cybersecurity\
\ program and file an annual certification confirming compliance with these\
\ regulations. A regulated entity\u2019s cybersecurity program must ensure\
\ the safety and soundness of the institution and protect its customers."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node5
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.0
description: It is critical for all regulated institutions that have not yet
done so to move swiftly and urgently to adopt a cybersecurity program and
for all regulated entities to be subject to minimum standards with respect
to their programs. The number of cyber events has been steadily increasing
and estimates of potential risk to our financial services industry are stark.
Adoption of the program outlined in these regulations is a priority for New
York State.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
assessable: false
depth: 1
ref_id: '500.1'
name: Definitions
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.a
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.a
name: Affiliate
description: Affiliate means any person that controls, is controlled by or is
under common control with another person. For purposes of this subdivision,
control means the possession, direct or indirect, of the power to direct or
cause the direction of the management and policies of a person, whether through
the ownership of stock of such person or otherwise.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.b
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.b
name: Authorized user
description: Authorized user means any employee, contractor, agent or other
person that participates in the business operations of a covered entity and
is authorized to access and use any information systems and data of the covered
entity.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.c
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.c
name: CISO
description: "Chief Information Security Officer or CISO means a qualified individual\
\ responsible for overseeing and implementing a covered entity\u2019s cybersecurity\
\ program and enforcing its cybersecurity policy."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.d
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.d
name: Class A company
description: "Class A company means a covered entity with at least $20,000,000\
\ in gross annual revenue in each of the last two fiscal years from all business\
\ operations of the covered entity and the business operations in this State\
\ of the covered entity\u2019s affiliates and:\n(1) over 2,000 employees averaged\
\ over the last two fiscal years, including employees of both the covered\
\ entity and all of its affiliates no matter where located; or\n(2) over $1,000,000,000\
\ in gross annual revenue in each of the last two fiscal years from all business\
\ operations of the covered entity and all of its affiliates no matter where\
\ located.\nFor purposes of this subdivision, when calculating the number\
\ of employees and gross annual revenue, affiliates shall include only those\
\ that share information systems, cybersecurity resources or all or any part\
\ of a cybersecurity program with the covered entity."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.e
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.e
name: Covered entity
description: Covered entity means any person operating under or required to
operate under a license, registration, charter, certificate, permit, accreditation
or similar authorization under the Banking Law, the Insurance Law or the Financial
Services Law, regardless of whether the covered entity is also regulated by
other government agencies.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.f
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.f
name: Cybersecurity event
description: Cybersecurity event means any act or attempt, successful or unsuccessful,
to gain unauthorized access to, disrupt or misuse an information system or
information stored on such information system.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.g
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.g
name: Cybersecurity incident
description: "Cybersecurity incident means a cybersecurity event that has occurred\
\ at the covered entity, its affiliates, or a third-party service provider\
\ that:\n(1) impacts the covered entity and requires the covered entity to\
\ notify any government body, self-regulatory agency or any other supervisory\
\ body;\n(2) has a reasonable likelihood of materially harming any material\
\ part of the normal operation(s) of the covered entity; or\n(3) results in\
\ the deployment of ransomware within a material part of the covered entity\u2019\
s information systems."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.h
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.h
name: Independent audit
description: Independent audit means an audit conducted by internal or external
auditors free to make decisions not influenced by the covered entity being
audited or by its owners, managers or employees.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.i
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.i
name: Information system
description: Information system means a discrete set of electronic information
resources organized for the collection, processing, maintenance, use, sharing,
dissemination or disposition of electronic information, as well as any specialized
system such as industrial/process controls systems, telephone switching and
private branch exchange systems, and environmental control systems.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.j
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.j
name: Multi-factor authentication
description: 'Multi-factor authentication means authentication through verification
of at least two of the following types of authentication factors:
(1) knowledge factors, such as a password;
(2) possession factors, such as a token; or
(3) inherence factors, such as a biometric characteristic.'
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.k
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.k
name: Nonpublic information
description: "Nonpublic information means all electronic information that is\
\ not publicly available information and is:\n(1) business related information\
\ of a covered entity the tampering with which, or unauthorized disclosure,\
\ access or use of which, would cause a material adverse impact to the business,\
\ operations or security of the covered entity;\n(2) any information concerning\
\ an individual which because of name, number, personal mark, or other identifier\
\ can be used to identify such individual, in combination with any one or\
\ more of the following data elements:\n(i) social security number;\n(ii)\
\ drivers\u2019 license number or non-driver identification card number;\n\
(iii) account number, credit or debit card number;\n(iv) any security code,\
\ access code or password that would permit access to an\nindividual\u2019\
s financial account; or\n(v) biometric records;\n(3) any information or data,\
\ except age or gender, in any form or medium created by or derived from a\
\ health care provider or an individual and that relates to:\n(i) the past,\
\ present or future physical, mental or behavioral health or condition of\
\ any individual or a member of the individual's family;\n(ii) the provision\
\ of health care to any individual; or\n(iii) payment for the provision of\
\ health care to any individual."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.l
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.l
name: Penetration testing
description: "Penetration testing means testing the security of information\
\ systems by attempting to circumvent or defeat the security features of an\
\ information system by authorizing attempted penetration of databases or\
\ controls from outside or inside the covered entity\u2019s information systems."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.m
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.m
name: Person
description: Person means any individual or entity, including but not limited
to any partnership, corporation, branch, agency or association.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.n
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.n
name: Privileged account
description: Privileged account means any authorized user account or service
account that can be used to perform security-relevant functions that ordinary
users are not authorized to perform, including but not limited to the ability
to add, change or remove other accounts, or make configuration changes to
information systems.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.o
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.o
name: Publicly available information
description: 'Publicly available information means any information that a covered
entity has a reasonable basis to believe is lawfully made available to the
general public from: Federal, State or local government records; widely distributed
media; or disclosures to the general public that are required to be made by
Federal, State or local law. A covered entity has a reasonable basis to believe
that information is lawfully made available to the general public if the covered
entity has taken steps to determine:
(1) that the information is of the type that is available to the general public;
and
(2) whether an individual can direct that the information not be made available
to the general public and, if so, that such individual has not done so.'
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.p
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.p
name: Risk assessment
description: Risk assessment means the process of identifying, estimating and
prioritizing cybersecurity risks to organizational operations (including mission,
functions, image and reputation), organizational assets, individuals, customers,
consumers, other organizations and critical infrastructure resulting from
the operation of an information system. Risk assessments incorporate threat
and vulnerability analyses and consider mitigations provided by security controls
planned or in place.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.q
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.q
name: Senior governing body
description: "Senior governing body means the board of directors (or an appropriate\
\ committee thereof) or equivalent governing body or, if neither of those\
\ exist, the senior officer or officers of a covered entity responsible for\
\ the covered entity\u2019s cybersecurity program. For any cybersecurity program\
\ or part of a cybersecurity program adopted from an affiliate under section\
\ 500.2(d) of this Part, the senior governing body may be that of the affiliate."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.r
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.r
name: Senior officer(s)
description: Senior officer(s) means the senior individual or individuals (acting
collectively or as a committee) responsible for the management, operations,
security, information systems, compliance and/or risk of a covered entity,
including a branch or agency of a foreign banking organization subject to
this Part.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1.s
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.1
ref_id: 500.1.s
name: Third-party service provider(s)
description: 'Third-party service provider(s) means a person that:
(1) is not an affiliate of the covered entity;
(2) is not a governmental entity;
(3) provides services to the covered entity; and
(4) maintains, processes or otherwise is permitted access to nonpublic information
through its provision of services to the covered entity.'
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2
assessable: false
depth: 1
ref_id: '500.2'
name: Cybersecurity program
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.a
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2
ref_id: 500.2.a
description: "Each covered entity shall maintain a cybersecurity program designed\
\ to protect the confidentiality, integrity and availability of the covered\
\ entity\u2019s information systems and nonpublic information stored on those\
\ information systems."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2
ref_id: 500.2.b
description: "The cybersecurity program shall be based on the covered entity\u2019\
s risk assessment and designed to perform the following core cybersecurity\
\ functions:"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b
ref_id: 500.2.b.1
description: "identify and assess internal and external cybersecurity risks\
\ that may threaten the security or integrity of nonpublic information stored\
\ on the covered entity\u2019s information systems;"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b
ref_id: 500.2.b.2
description: "use defensive infrastructure and the implementation of policies\
\ and procedures to protect the covered entity\u2019s information systems,\
\ and the nonpublic information stored on those information systems, from\
\ unauthorized access, use or other malicious acts;"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b
ref_id: 500.2.b.3
description: detect cybersecurity events;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b.4
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b
ref_id: 500.2.b.4
description: respond to identified or detected cybersecurity events to mitigate
any negative effects;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b.5
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b
ref_id: 500.2.b.5
description: recover from cybersecurity events and restore normal operations
and services; and
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b.6
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.b
ref_id: 500.2.b.6
description: fulfill applicable regulatory reporting obligations.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.c
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2
ref_id: 500.2.c
description: Each class A company shall design and conduct independent audits
of its cybersecurity program based on its risk assessment.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.d
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2
ref_id: 500.2.d
description: A covered entity may meet the requirement(s) of this Part by adopting
the relevant and applicable provisions of a cybersecurity program maintained
by an affiliate, provided that such provisions satisfy the requirements of
this Part, as applicable to the covered entity.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2.e
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.2
ref_id: 500.2.e
description: "All documentation and information relevant to the covered entity\u2019\
s cybersecurity program, including the relevant and applicable provisions\
\ of a cybersecurity program maintained by an affiliate and adopted by the\
\ covered entity, shall be made available to the superintendent upon request."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3
assessable: false
depth: 1
ref_id: '500.3'
name: Cybersecurity policy
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node39
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3
name: Policies
description: "Each covered entity shall implement and maintain a written policy\
\ or policies, approved at least annually by a senior officer or the covered\
\ entity\u2019s senior governing body for the protection of its information\
\ systems and nonpublic information stored on those information systems."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3
name: Procedures
description: "Procedures shall be developed, documented and implemented in accordance\
\ with the written policy or policies. The cybersecurity policy or policies\
\ and procedures shall be based on the covered entity\u2019s risk assessment\
\ and address, at a minimum, the following areas to the extent applicable\
\ to the covered entity\u2019s operations:"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.a
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.a
description: information security;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.b
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.b
description: data governance, classification and retention;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.c
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.c
description: asset inventory, device management and end of life management;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.d
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.d
description: access controls, including remote access and identity management;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.e
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.e
description: business continuity and disaster recovery planning and resources;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.f
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.f
description: systems operations and availability concerns;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.g
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.g
description: systems and network security and monitoring;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.h
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.h
description: security awareness and training;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.i
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.i
description: systems and application security and development and quality assurance;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.j
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.j
description: physical security and environmental controls;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.k
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.k
description: customer data privacy;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.l
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.l
description: vendor and third-party service provider management;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.m
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.m
description: risk assessment;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.n
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.n
description: incident response and notification; and
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.3.o
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node40
ref_id: 500.3.o
description: vulnerability management.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4
assessable: false
depth: 1
ref_id: '500.4'
name: Cybersecurity governance
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.a
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4
ref_id: 500.4.a
name: Chief information security officer
description: 'Each covered entity shall designate a CISO. The CISO may be employed
by the covered entity, one of its affiliates or a third-party service provider.
If the CISO is employed by a third-party service provider or an affiliate,
the covered entity shall:'
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.a.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.a
ref_id: 500.4.a.1
description: retain responsibility for compliance with this Part;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.a.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.a
ref_id: 500.4.a.2
description: "designate a senior member of the covered entity\u2019s personnel\
\ responsible for direction and oversight of the third-party service provider;\
\ and"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.a.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.a
ref_id: 500.4.a.3
description: require the third-party service provider or affiliate to maintain
a cybersecurity program that protects the covered entity in accordance with
the requirements of this Part.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4
ref_id: 500.4.b
name: Report
description: "The CISO of each covered entity shall report in writing at least\
\ annually to the senior governing body on the covered entity\u2019s cybersecurity\
\ program, including to the extent applicable:"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b
ref_id: 500.4.b.1
description: "the confidentiality of nonpublic information and the integrity\
\ and security of the covered entity\u2019s information systems;"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b
ref_id: 500.4.b.2
description: "the covered entity\u2019s cybersecurity policies and procedures;"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b
ref_id: 500.4.b.3
description: material cybersecurity risks to the covered entity;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b.4
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b
ref_id: 500.4.b.4
description: "overall effectiveness of the covered entity\u2019s cybersecurity\
\ program;"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b.5
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b
ref_id: 500.4.b.5
description: material cybersecurity events involving the covered entity during
the time period addressed by the report; and
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b.6
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.b
ref_id: 500.4.b.6
description: plans for remediating material inadequacies.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.c
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4
ref_id: 500.4.c
description: "The CISO shall timely report to the senior governing body or senior\
\ officer(s) on material cybersecurity issues, such as significant cybersecurity\
\ events and significant changes to the covered entity\u2019s cybersecurity\
\ program."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.d
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4
ref_id: 500.4.d
description: "The senior governing body of the covered entity shall exercise\
\ oversight of the covered entity\u2019s cybersecurity risk management, including\
\ by:"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.d.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.d
ref_id: 500.4.d.1
description: having sufficient understanding of cybersecurity-related matters
to exercise such oversight, which may include the use of advisors;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.d.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.d
ref_id: 500.4.d.2
description: "requiring the covered entity\u2019s executive management or its\
\ designees to develop, implement and maintain the covered entity\u2019s cybersecurity\
\ program;"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.d.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.d
ref_id: 500.4.d.3
description: regularly receiving and reviewing management reports about cybersecurity
matters; and
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.d.4
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.4.d
ref_id: 500.4.d.4
description: "confirming that the covered entity\u2019s management has allocated\
\ sufficient resources to implement and maintain an effective cybersecurity\
\ program."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.5
assessable: false
depth: 1
ref_id: '500.5'
name: Vulnerability management
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node75
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.5
description: 'Each covered entity shall, in accordance with its risk assessment,
develop and implement written policies and procedures for vulnerability management
that are designed to assess and maintain the effectiveness of its cybersecurity
program. '
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node76
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.5
description: 'These policies and procedures shall be designed to ensure that
covered entities:'
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.5.a
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node76
ref_id: 500.5.a
description: 'conduct, at a minimum:'
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.5.a.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.5.a
ref_id: 500.5.a.1
description: "penetration testing of their information systems from both inside\
\ and outside the information systems\u2019 boundaries by a qualified internal\
\ or external party at least annually; and"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.5.a.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.5.a
ref_id: 500.5.a.2
description: automated scans of information systems, and a manual review of
systems not covered by such scans, for the purpose of discovering, analyzing
and reporting vulnerabilities at a frequency determined by the risk assessment,
and promptly after any material system changes;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.5.b
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node76
ref_id: 500.5.b
description: are promptly informed of new security vulnerabilities by having
a monitoring process in place; and
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.5.c
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:node76
ref_id: 500.5.c
description: timely remediate vulnerabilities, giving priority to vulnerabilities
based on the risk they pose to the covered entity.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.6
assessable: false
depth: 1
ref_id: '500.6'
name: Audit trail
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.6.a
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.6
ref_id: 500.6.a
description: 'Each covered entity shall securely maintain systems that, to the
extent applicable and based on its risk assessment:'
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.6.a.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.6.a
ref_id: 500.6.a.1
description: are designed to reconstruct material financial transactions sufficient
to support normal operations and obligations of the covered entity; and
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.6.a.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.6.a
ref_id: 500.6.a.2
description: include audit trails designed to detect and respond to cybersecurity
events that have a reasonable likelihood of materially harming any material
part of the normal operations of the covered entity.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.6.b
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.6
ref_id: 500.6.b
description: Each covered entity shall maintain records required by paragraph
(a)(1) of this section for not fewer than five years and shall maintain records
required by paragraph (a)(2) of this section for not fewer than three years.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7
assessable: false
depth: 1
ref_id: '500.7'
name: Access privileges and management
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7
ref_id: 500.7.a
description: "As part of its cybersecurity program, based on the covered entity\u2019\
s risk assessment each covered entity shall:"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a
ref_id: 500.7.a.1
description: "limit user access privileges to information systems that provide\
\ access to nonpublic information to only those necessary to perform the user\u2019\
s job;"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a
ref_id: 500.7.a.2
description: "limit the number of privileged accounts and limit the access functions\
\ of privileged accounts to only those necessary to perform the user\u2019\
s job;"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a
ref_id: 500.7.a.3
description: limit the use of privileged accounts to only when performing functions
requiring the use of such access;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a.4
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a
ref_id: 500.7.a.4
description: periodically, but at a minimum annually, review all user access
privileges and remove or disable accounts and access that are no longer necessary;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a.5
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a
ref_id: 500.7.a.5
description: disable or securely configure all protocols that permit remote
control of devices; and
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a.6
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.a
ref_id: 500.7.a.6
description: promptly terminate access following departures.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.b
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7
ref_id: 500.7.b
description: To the extent passwords are employed as a method of authentication,
the covered entity shall implement a written password policy that meets industry
standards.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.c
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7
ref_id: 500.7.c
description: 'Each class A company shall monitor privileged access activity
and shall implement:'
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.c.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.c
ref_id: 500.7.c.1
description: a privileged access management solution; and
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.c.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.7.c
ref_id: 500.7.c.2
description: "an automated method of blocking commonly used passwords for all\
\ accounts on information systems owned or controlled by the class A company\
\ and wherever feasible for all other accounts. To the extent the class A\
\ company determines that blocking commonly used passwords is infeasible,\
\ the covered entity\u2019s CISO may instead approve in writing at least annually\
\ the infeasibility and the use of reasonably equivalent or more secure compensating\
\ controls."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.8
assessable: false
depth: 1
ref_id: '500.8'
name: Application security
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.8.a
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.8
ref_id: 500.8.a
description: "Each covered entity\u2019s cybersecurity program shall include\
\ written procedures, guidelines and standards designed to ensure the use\
\ of secure development practices for in-house developed applications utilized\
\ by the covered entity, and procedures for evaluating, assessing or testing\
\ the security of externally developed applications utilized by the covered\
\ entity within the context of the covered entity\u2019s technology environment."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.8.b
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.8
ref_id: 500.8.b
description: All such procedures, guidelines and standards shall be reviewed,
assessed and updated as necessary by the CISO (or a qualified designee) of
the covered entity at least annually.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.9
assessable: false
depth: 1
ref_id: '500.9'
name: Risk assessment
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.9.a
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.9
ref_id: 500.9.a
description: "Each covered entity shall conduct a periodic risk assessment of\
\ the covered entity\u2019s information systems sufficient to inform the design\
\ of the cybersecurity program as required by this Part. Such risk assessment\
\ shall be reviewed and updated as reasonably necessary, but at a minimum\
\ annually, and whenever a change in the business or technology causes a material\
\ change to the covered entity\u2019s cyber risk. The covered entity\u2019\
s risk assessment shall allow for revision of controls to respond to technological\
\ developments and evolving threats and shall consider the particular risks\
\ of the covered entity\u2019s business operations related to cybersecurity,\
\ nonpublic information collected or stored, information systems utilized\
\ and the availability and effectiveness of controls to protect nonpublic\
\ information and information systems."
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.9.b
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.9
ref_id: 500.9.b
description: 'The risk assessment shall be carried out in accordance with written
policies and procedures and shall be documented. Such policies and procedures
shall include:'
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.9.b.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.9.b
ref_id: 500.9.b.1
description: criteria for the evaluation and categorization of identified cybersecurity
risks or threats facing the covered entity;
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.9.b.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.9.b
ref_id: 500.9.b.2
description: "criteria for the assessment of the confidentiality, integrity,\
\ security and availability of the covered entity\u2019s information systems\
\ and nonpublic information, including the adequacy of existing controls in\
\ the context of identified risks; and"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.9.b.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.9.b
ref_id: 500.9.b.3
description: requirements describing how identified risks will be mitigated
or accepted based on the risk assessment and how the cybersecurity program
will address the risks.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.10
assessable: false
depth: 1
ref_id: '500.10'
name: Cybersecurity personnel and intelligence
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.10.a
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.10
ref_id: 500.10.a
description: 'In addition to the requirements set forth in section 500.4(a)
of this Part, each covered entity shall:'
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.10.a.1
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.10.a
ref_id: 500.10.a.1
description: "utilize qualified cybersecurity personnel of the covered entity,\
\ an affiliate or a third- party service provider sufficient to manage the\
\ covered entity\u2019s cybersecurity risks and to perform or oversee the\
\ performance of the core cybersecurity functions specified in section 500.2(b)(1)\u2013\
(6) of this Part;"
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.10.a.2
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.10.a
ref_id: 500.10.a.2
description: provide cybersecurity personnel with cybersecurity updates and
training sufficient to address relevant cybersecurity risks; and
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.10.a.3
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.10.a
ref_id: 500.10.a.3
description: verify that key cybersecurity personnel take steps to maintain
current knowledge of changing cybersecurity threats and countermeasures.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.10.b
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.10
ref_id: 500.10.b
description: A covered entity may choose to utilize an affiliate or qualified
third-party service provider to assist in complying with the requirements
set forth in this Part, subject to the requirements set forth in sections
500.4 and 500.11 of this Part.
- urn: urn:intuitem:risk:req_node:dfs-500-2023-11:500.11
assessable: false
depth: 1
ref_id: '500.11'