← Back to all briefings
Cybersecurity 5 min read Published Updated Credibility 85/100

November 2025: NYDFS Cybersecurity Regulation second amendment reaches

November 1, 2025 is the final compliance deadline for NYDFS's amended cybersecurity regulation. If you are a covered financial institution and have not fully implemented MFA for privileged accounts, deployed EDR, or completed your first independent audit—you are out of time. Enforcement is coming.

Reviewed for accuracy by Kodi C.

Cybersecurity pillar illustration for Zeph Tech briefings
Cybersecurity threat, control, and response briefings

The New York State Department of Financial Services’ 2023 second amendment to its Cybersecurity Regulation (23 NYCRR Part 500) entered into force on 1 November 2023 with staged milestones. The final compliance date of 1 November 2025 now closes the remaining transition window for all covered entities, ending temporary relief for items such as board-level certification, privileged access governance, and ransomware response protocols.

Controls due by 1 November 2025

  • Board oversight. Covered entities must obtain annual board or senior officer certification affirming compliance, backed by documented risk assessments, materiality determinations, and remediation plans.
  • Privileged access hardening. Class A companies have to run independent penetration tests, implement password vaulting or multi-factor authentication for privileged accounts, and log privileged sessions for continuous monitoring.
  • Security operations uplift. 24×7 monitoring through internal staff or managed services must be demonstrable, along with incident response playbooks that explicitly cover ransomware and extortion events.

November execution priorities

  • Evidence readiness. Align GRC systems so audit trails for risk assessments, gap remediation, and board briefings are exportable for DFS examinations and certification sign-off.
  • Ransomware tabletop drills. Validate containment, legal escalation, OFAC screening, and communication playbooks against the amended incident response requirements.
  • Continuous monitoring proofs. Capture SOC metrics—including alert coverage, mean time to detection, and escalation evidence—to show 24×7 operations are either insourced or under contract with a qualified provider.

References

Security Architecture Considerations

Security architecture should account for the implications of this development across the technology stack. Defense-in-depth principles recommend implementing multiple layers of controls that address different attack vectors and failure modes. Network segmentation, endpoint protection, identity controls, and application security measures should work together to reduce overall risk exposure.

Threat modeling exercises should incorporate the specific attack patterns and techniques associated with this development. Understanding adversary capabilities and likely attack paths helps focus on defensive investments and ensures controls address realistic threats rather than theoretical risks.

Security Monitoring and Response

If you are affected, implement continuous monitoring mechanisms to detect and respond to security incidents related to this vulnerability or threat. Security operations centers should update detection rules, threat hunting hypotheses, and incident response procedures to address the specific attack patterns and indicators associated with this development. Regular testing of detection and response capabilities ensures readiness to handle related security events.

Post-incident analysis should document lessons learned and drive improvements to preventive and detective controls. Information sharing with industry peers and sector-specific information sharing organizations contributes to collective defense against common threats.

Resource Planning and Execution

Resource planning should account for the specific requirements of this development, including staffing needs, technology investments, and external support that may be required. Early identification of resource requirements helps ensure timely execution and avoids delays that may create compliance or operational risks.

Budget allocation should reflect the priority and urgency of setup activities, with appropriate contingencies for unexpected challenges or scope changes. Regular monitoring of resource use helps identify potential issues before they impact timelines or outcomes.

Vendor selection and management processes should address the specific requirements of any external support needed, including evaluation criteria, contract terms, and performance expectations. Effective vendor relationships can significantly accelerate setup timelines and improve outcomes.

Knowledge transfer and documentation should ensure that setup expertise is retained within the organization for ongoing maintenance and future reference. This includes capturing lessons learned, decision rationale, and operational procedures that support sustainable adoption.

Enhanced governance requirements for covered entities

The amended NYDFS Cybersecurity Regulation (23 NYCRR 500) requires CISOs to report directly to the board or senior governing body, not just management. Board members must receive sufficient cybersecurity training to provide effective oversight. Annual certifications must now address the improved governance and access control requirements.

Class A companies face additional requirements including independent audits and heightened endpoint detection controls. Verify classification status and ensure all applicable requirements are met before the compliance deadline.

Incident response and notification requirements

The amended regulation expands incident notification requirements. Covered entities must notify DFS within 72 hours of cybersecurity events that have a reasonable likelihood of materially harming normal operations. Ransomware payments require separate notification within 24 hours.

Incident response plans must be tested annually through tabletop exercises or simulations. Documentation of tests and lessons learned should be retained for examination.

Access controls and privileged access management

Enhanced access control requirements include privileged access management controls, MFA for all remote access, and access reviews at least annually. Class A companies must implement endpoint detection and response (EDR) or equivalent monitoring capabilities.

Access control policies should address both internal privileged users and third-party access to covered systems. Vendor access must be monitored and time-limited.

Business continuity and disaster recovery

Business continuity plans must address cybersecurity incidents specifically, not just natural disasters. Recovery time objectives should consider data restoration from backups protected from ransomware. Test backup restoration procedures at least annually.

Third-party service provider oversight

Covered entities must assess cybersecurity practices of third-party service providers and require minimum security controls in contracts. Due diligence should include review of SOC 2 reports, penetration testing results, and incident history. Periodic reassessment ensures continued compliance.

Asset management and data classification

The regulation requires inventory of information systems and classification of nonpublic information. Asset management processes should track hardware, software, and data repositories containing regulated information. Classification labels guide access control and protection requirements.

Training and awareness program requirements

All personnel must receive cybersecurity awareness training that addresses risks relevant to their roles. Training should cover phishing recognition, password hygiene, incident reporting procedures, and handling of nonpublic information. Annual refresher training maintains awareness of evolving threats.

Track training completion and maintain records for examination. Training content should be updated to reflect current threats and regulatory requirements.

Encryption and data protection controls

Nonpublic information must be encrypted in transit and at rest using industry-standard cryptographic protocols. Key management procedures should address generation, rotation, and destruction. Data loss prevention controls help detect and prevent unauthorized transmission of sensitive information.

Annual certification and examination readiness

Senior officers must submit annual certifications to DFS confirming compliance with all applicable requirements. Maintain examination-ready documentation throughout the year, not just at certification time. DFS examinations may request evidence of control setup, policy adherence, and incident handling at any time.

Continue in the Cybersecurity pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

References

  1. NYDFS Second Amendment to 23 NYCRR Part 500 (Final Text) — New York State Department of Financial Services
  2. DFS Industry Guidance on Cybersecurity Regulation Enhancements — New York State Department of Financial Services
  3. ISO/IEC 27001:2022 — Information Security Management Systems — International Organization for Standardization
  • NYDFS Cybersecurity Regulation
  • Financial services cybersecurity
  • Ransomware response
  • Governance
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.