NYDFS Issues Report on SolarWinds Response and Recommends Critical Cybersecurity Measures
Published on 29 Apr 2021
New York, USA (National/Federal)
by Practical Law Data Privacy Advisor
PRACTICAL LAW
29 Apr 2021
The New York State Department of Financial Services (NYDFS) has issued a report after investigating how regulated entities responded to the recent widely publicized SolarWinds, Inc. supply chain cyberattack. Among its findings, the agency noted the prompt response by and lack of reported exploitation to-date of financial institutions and other regulated entities, identified key issues in patch management, and recommended four critical cybersecurity measures going forward.
On April 27, 2021, the New York State Department of Financial Services (NYDFS) published its Report on the SolarWinds Cyber Espionage Attack and Institutions' Response. The report details its investigation of NYDFS-regulated entities' mitigation efforts following the widely publicized SolarWinds, Inc. supply chain cyberattack announced in December 2020.
In its report, the NYDFS warned that the SolarWinds cyberattack should be a "wake-up call" and highlighted critical cybersecurity measures regulated entities should take to minimize the risks of future attacks, including:
  • Fully assess and address third party risk.
  • Adopt a "zero trust" approach and implement multiple layers of security.
  • Timely address vulnerabilities through patch deployment, testing, and validation.
  • Address supply chain compromise in incident response plans.
The highly sophisticated attack, which the White House recently attributed to Russian state actors in announcing sanctions, exploited SolarWinds Orion, enterprise network management software that many organizations use to monitor and support their IT infrastructures. The hackers compromised the SolarWinds development and build environment, adding malware to software updates that some 18,000 customer organizations received, leaving them vulnerable to hard-to-detect targeted network attacks and infiltration.
After interviews with 88 regulated entities that used affected versions of SolarWinds Orion, the NYDFS found that 94% had addressed specified vulnerabilities within three days after SolarWinds' original announcement of the attack. However, the NYDFS also determined that some regulated entities could better address ongoing high-risk cyber vulnerabilities with a more timely patch management process.
Regulated entities and others should consider that NYDFS's recommendations may likely contribute to its and other regulators' views on what constitute reasonable security measures going forward.
End of Document
Resource ID w-030-8075Document Type Legal update: archive
Products

PLC US Data Privacy & Cybersecurity, PLC US Intellectual Property and Technology, PLC US Law Department

© 2024 Thomson Reuters. No claim to original U.S. Government Works.