wiredepth
Run a check

Compliance crosswalk · NYDFS Part 500

NYDFS 23 NYCRR Part 500 (New York State) - email + domain controls, mapped to Wiredepth

Framework version: Original 2017; major amendments effective November 2023 (Part 500 amended) with phased compliance through April 2025

Who this is for. Financial services companies licensed by, authorised by, or registered with the New York State Department of Financial Services - banks, insurance companies, mortgage originators, money transmitters, virtual currency businesses, and many more. New York being the US financial-services capital means most US-anchored financial entities have at least one NYDFS-regulated subsidiary.

Where email + domain controls fit. Part 500 organises requirements around a cybersecurity programme (500.2), governance (500.4), access privileges (500.7), risk assessments (500.9), third-party risk management (500.11), encryption (500.15), incident response (500.16), and incident notification (500.17). Email-auth + domain-posture controls show up most heavily under cybersecurity-programme implementation, third-party risk, encryption, and incident response.

Why now. The November 2023 amendments significantly expanded Part 500 requirements - particularly around MFA, vulnerability management, governance, and 72-hour incident notification. Compliance dates phased through 2024 + April 2025. NYDFS examinations through 2025-2026 are testing the amended requirements directly.

Clause-by-clause mapping

Each row maps a specific NYDFS Part 500requirement to the Wiredepth surface that addresses it. The clause ids are the framework's own naming - verify them against the official text. We use precise language: "addresses" (the tool directly satisfies the control), "supports" (the tool contributes evidence the auditor will need), and "evidence for" (the artifact is part of the attestation package).

ClauseRequirementWiredepth response
§500.2 (Cybersecurity programme)
Authentication
Maintain a cybersecurity programme designed to protect the confidentiality, integrity + availability of the entity's Information Systems. Programme must be based on the entity's risk assessment.DMARC + SPF + DKIM analyzer scores authentication posture as direct input to risk assessment. Spoofability + scorecard provide the programme-effectiveness evidence.
§500.3 (Cybersecurity policy)
Reporting
Implement + maintain a written cybersecurity policy approved by a senior officer or the board. Must address (among others) data governance, access controls, customer-data privacy, vendor + third-party-service provider management.Continuous monitoring + vendor consolidation report provide the evidence underlying the policy. Updates documented via change-history snapshots.
§500.7 (Access privileges + management)
Authentication
Limit user access privileges to Information Systems containing Nonpublic Information. Includes MFA requirements + privileged-access management. Email-sender authentication (DKIM signing) extends the access-management story to outbound channels.DKIM checker validates outbound-message signing posture. Spoofability check ensures access controls extend to your customer-facing email surface.
§500.9 (Risk assessment)
Monitoring
Conduct + document periodic risk assessments. Includes evaluation of cybersecurity risks. Must be updated as reasonably necessary to address changes to Information Systems, Nonpublic Information, or business operations.Continuous-monitoring change history evidences the "updated as reasonably necessary" expectation - posture changes appear in the audit log within hours of occurrence.
§500.11 (Third-party service provider security)
Inventory
Implement written policies + procedures for security of Information Systems + Nonpublic Information accessible to or held by third-party service providers. Includes due-diligence processes + periodic assessment.Vendor consolidation audit inventories every authorized email-sending third party. Vendor monitoring (Wiredepth Pro+) tracks ongoing third-party posture. De-authorization guides cover the exit side.
§500.15 (Encryption of nonpublic information)
Transport
Implement controls, including encryption, to protect Nonpublic Information held or transmitted by the entity, both in transit + at rest. Email transmission of Nonpublic Information is in scope.MTA-STS + TLS-RPT checker validates enforce-mode transport encryption for email. TLS checker covers the web-side encryption surface.
§500.17 (Notice to superintendent)
Reporting
Notify the NYDFS Superintendent of any cybersecurity event the entity reasonably believes may materially harm any material part of its normal operations - no later than 72 hours after determining a cybersecurity event has occurred.Continuous-monitoring + change-history snapshots provide the timeline-reconstruction evidence for the 72-hour clock. Wire-fraud monitor (Wiredepth Prove) flags customer-impersonation incidents at the earliest detection point.
§500.4 (CISO + board oversight)
Reporting
Designate a Chief Information Security Officer + report at least annually to the board on the cybersecurity programme. Annual report must include material cybersecurity risks + cybersecurity events.Email-auth scorecard PDF is the kind of timestamped, attestable artifact CISOs include in board-reportable evidence. Quarterly trend report (Wiredepth Prove) covers the "material risks" half.

What auditors actually look at

From NYDFS exam patterns in 2024-2025 (post-amendment), here's what comes up most when email + domain posture is in scope:

  • Documented third-party service-provider inventory. §500.11 is among the most-tested clauses post-amendment. NYDFS expects an entity to know which vendors handle Nonpublic Information + what assessment they passed.
  • 72-hour incident-notification trail. §500.17 timing is unforgiving. Detection + escalation workflow must demonstrably support the clock.
  • Annual risk-assessment refresh tied to system change.§500.9 - the "as reasonably necessary" phrase invites scrutiny on whether posture changes triggered re-assessment.
  • CISO board reporting evidence (§500.4). Annual report must include both cybersecurity-risk discussion + actual events. Posture trend reports + incident audit log = the evidence.
  • Encryption of email in transit. §500.15 explicitly references transmission encryption. MTA-STS enforce-mode posture + TLS-RPT receipt is the direct evidence.
  • Vulnerability + patch-cadence evidence. §500.5 (post-amendment) expects vulnerability scanning + remediation tracking. Email/domain posture regressions surface vulnerabilities at the infrastructure level.

Generate a NYDFS Part 500-tagged evidence pack (Wiredepth Prove)

Prove subscribers can generate a ZIP of all five workpapers + a NYDFS Part 500 README in one click. Single domain, single click, ready to file in your audit binder. See pricing at /pricing#prove ($499/mo standalone, bundled in Enterprise).

Other compliance crosswalks

Disclaimer. This crosswalk is provided for informational purposes. It is not legal advice, audit guidance, or a substitute for engagement with a qualified assessor (QSA for PCI, accountant or QSA for SOC 2, lawyer for HIPAA / NIS2 / SEC). Framework clause ids and language may have been updated since publication; verify against the official text. Wiredepth does not guarantee compliance based on the use of any tool or page on this site.