New York publishes FAQs on enhanced multi-factor authentication rules

Are your systems secure?

The New York State Department of Financial Services recently published additional Frequently Asked Questions addressing compliance and providing clarity regarding the enhanced multi-factor authentication requirements in the Amended Cybersecurity Regulation. The enhanced requirements took effect in November for all entities subject to NYDFS regulation.

Covered Entities still struggling with a well-implemented multi-factor authentication program may find the additional FAQs helpful in ensuring that their cybersecurity programs are compliant and systems are secure.  

The FAQs are available here (scroll down to Section 500.12, FAQs 18-23). The following is a summary:

FAQs 18-19

Multi-factor authentication, better known as MFA, means the use of two or more types of verification to confirm a user’s identity before granting access to an information system. The New York regulation does not mandate the use of any specific type of MFA. However, it must consist of at least two of these three “KPI” characteristics: Knowledge, Possession, or Inherence.

  • Knowledge is something one knows, like a password or personal identification number.
  • Possession is something one has such as a physical key, a mobile authenticator app (like DUO or Microsoft Authenticator), or smart card. A smart card is a physical card with an integrated chip that securely stores and processes data and can be used for authentication purposes.
  • Inherence means something unique to the person, such as a fingerprint or facial recognition.

Examples of successful MFA protocols could be a combination of PIN (Knowledge) and Mobile Authenticator (Possession), or of Physical Key (Possession) and Fingerprint (Inherence). However, compliance officers should be wary of “auto-fill” and the like as “something one has.” Mere storage of information without cryptographic proof of possession or reliance on device recognition, that is policy-based, or that relies on software-stored certificates, does not qualify as Possession because these measures can be bypassed with ease.  

FAQ 20

With the permissibility of push-based applications, comes a risk of “MFA fatigue.” Push-based applications send automatic updates or notifications to a user’s device to keep the user informed and engaged. MFA fatigue is a social engineering cyberattack strategy that involves repeatedly pushing MFA requests to a victim’s email, phone, or registered devices. The goal is to coerce the victim into confirming their identity. Thus, MFA fatigue can occur when users accidentally approve an MFA prompt, making the network vulnerable to cyberattacks.

FAQ 20 suggests that Covered Entities enable number matching (where the user inputs the number displayed on their device to authenticate) or challenge-response verification (where the user must provide the answer to a question as part of the authentication process); display contextual login details (that is, location access), or limit the number of push retries and enforce adaptive MFA for suspicious activity. Adaptive MFA evaluates the context of each login attempt. This means that each login attempt would be based on user behavior, historical login patterns, device status and registration, or geolocation and IP address. Unfortunately, adaptive MFA, if necessary, would incorporate the use of Artificial Intelligence into private systems, which could create its own set of concerns for Covered Entities.

FAQ 21

Single Sign On services can also create concerns. SSOs expand access by allowing users to reach multiple systems with only one set of credentials. These services are popular because they are convenient, providing a streamlined user experience. Nevertheless, SSOs in isolation do not meet the regulatory requirements. Multi-factor authentication must be enforced in conjunction with the user’s login to the SSO system.

However, the regulation does not require individuals to use MFA each time the SSO system shares the authentication token with the systems and applications included in the system coverage. The expectation is that MFA enforcement is centrally managed and applies equally to all systems and cannot be bypassed by legacy logins or connections that bypass SSO controls.

FAQ 22

Email and document hosting platforms are included in this FAQ. Cloud service providers are a part of Information Systems if they store, process, or transmit non-public, private information. Cloud-based email and other document hosting platforms must use MFA or a reasonably equivalent or more secure control if approved by a Chief Information Security Officer. CISO approval must be provided in writing and reviewed annually.

FAQ 23

This FAQ addresses MFA requirements for external-facing systems for Covered Entities. Generally, external-facing systems do not require MFA. However, MFA may become required if the information systems allow unauthenticated access to the entity’s additional systems or if the information system otherwise poses a material cybersecurity risk to the entity, its customers, other information systems, or non-public Information. It is up to the entity to document these potential risks and exercise “best judgment.” Ultimately, the CISO must ensure that these risks do not conflict with other requirements under the regulation.

Conclusion

Multi-factor authentication remains one of the most widely recommended methods of securing an entity’s information systems. It can significantly reduce, although not eliminate, the risk of access to a network from an unauthorized actor. Covered Entities should review the new FAQs in their entirety and ensure that their systems are in compliance.  

The Constangy Cybersecurity & Data Privacy Team regularly counsels businesses of all sizes and industries on how to comply with the growing number of data privacy laws and regulations. If you would like additional information on how to prepare your organization, please contact us at cyber@constangy.com.

  • Lauren Godfrey wearing a gray blazer over a white top, accessorized with a cross necklace and drop earrings, arms crossed, posed against a light blue and white geometric background.
    Partner

    Lauren guides clients through data security incidents, leading initial assessments and coordinating forensic and remediation efforts to contain, investigate, and resolve issues. She helps clients develop privacy, incident ...

  • A confident woman wearing glasses and a gray business suit smiles with her arms crossed against a transparent background. Her professional attire and posture suggest a business or leadership context.
    Associate Attorney

    With a background in data privacy, intellectual property, and regulatory compliance, Sydney brings a thoughtful, practical approach to managing sensitive matters in fast-paced environments.

    Before joining Constangy, Sydney ...

The Constangy Cyber Advisor posts regular updates on legislative developments, data privacy, and information security trends. Our blog posts are informed through the Constangy Cyber Team's experience managing thousands of data breaches, providing robust compliance advisory services, and consultation on complex data privacy and security litigation. 

Search

Get Updates By Email

Subscribe

Archives

Jump to Page

Constangy, Brooks, Smith & Prophete, LLP Cookie Preference Center

Your Privacy

When using this website, Constangy and certain third parties may collect and use cookies or similar technologies to enhance your experience. These technologies may collect information about your device, activity on our website, and preferences. Some cookies are essential to site functionality, while others help us analyze performance and usage trends to improve our content and features.

Please note that if you return to this website from a different browser or device, you may need to reselect your cookie preferences.

For more information about our privacy practices, including your rights and choices, please see our Privacy Policy. 

Strictly Necessary Cookies

Always Active

Strictly Necessary Cookies are essential for the website to function, and cannot be turned off. We use this type of cookie for purposes such as security, network management, and accessibility. You can set your browser to block or alert you about these cookies, but if you do so, some parts of the site will not work. 

Functionality Cookies

Always Active

Functionality Cookies are used to enhance the functionality and personalization of this website. These cookies support features like embedded content (such as video or audio), keyword search highlighting, and remembering your preferences across pages—for example, your cookie choices or form inputs during submission.

Some of these cookies are managed by third-party service providers whose features are embedded on our site. These cookies do not store personal information and are necessary for certain site features to work properly.

Performance Cookies

Performance cookies help us improve our website by collecting and reporting information on its usage. We access and process information from these cookies at an aggregate level.

Powered by Firmseek