On October 21st, 2025 NYDFS issued guidance to help Covered Entities understand how to systematically assess, contract with, monitor and eventually terminate TPSP (third party service providers) relationships in a manner consistent with the Cybersecurity Regulation (23 NYCRR Part 500) and industry best practices.
The guidance outlined here reflects both regulatory mandates (under 23 NYCRR Part 500) and industry best practices in TPSP governance. A robust cybersecurity program will protect your organization’s systems and information, safeguard data, and mitigate operational risk.
As third-party services continue to evolve (cloud-native providers, fintech ecosystems, AI-enablement, global supply chains), so too will TPSP related cybersecurity risks. Recent examinations by NYDFS have revealed deficiencies in how Covered Entities manage TPSP risk: weak due diligence, insufficient contractual protections, inadequate monitoring and even over-reliance on TPSPs for regulatory obligations. Respondents that outsourced critical compliance obligations without ensuring oversight have been subject to scrutiny and enforcement.
In recent years, financial services organizations have grown increasingly reliant on Third-Party Service Providers (TPSPs) that handle or access their information systems and nonpublic information (NPI). While such reliance brings operational advantages, it also introduces heightened cybersecurity risk: a cybersecurity incident at a TPSP can ripple back and impact the Covered Entity’s operations, data, reputation, and regulatory standing.
Because of this, senior governing bodies and senior officers at Covered Entities must engage proactively in governance, oversight, and continuous adaptation of third-party risk management as part of their broader cybersecurity program. The new NYSDFS guidance touched on defining the acceptable use of AI and the data it is trained on: “Where relevant, Covered Entities should consider including a clause related to the acceptable use of Artificial Intelligence (“AI”), and whether the Covered Entity’s data may be used to train AI models or be otherwise disclosed to additional parties.”.
The guidance also touched on the requirements for TPSPs to be included in the DRP process, incident response plans, and business continuity plans. “Where relevant, Covered Entities should request updates on vulnerability management, assess patching practices, and confirm remediation of previously identified deficiencies. Material or unresolved risk should be documented in the Covered Entity’s risk assessment and escalated through appropriate internal risk governance channels. As part of a broader resiliency strategy, Covered Entities should incorporate third-party risk into their incident response and business continuity planning.”.
NYSDFS guidance reiterated the lifecycle of a third party service provider, which starts with conducting due diligence before awarding the contract, during the time the TPSPS has access your IT systems, and ends after terminating and verifying access has been revoked. The guidance included the following examples:
The policies required under § 500.11 must reference specific controls drawn from other sections of Part 500 Notably § 500.7 (access privilege management), § 500.12 (MFA), § 500.15 (encryption).
When the relationship with a TPSP ends, risk does not end there. Proper off-boarding is crucial to avoid residual access or data exposure. Best practices outlined by the latest guidance included:
TLDR; Due to an increased reliance on TPSP's, additional monitoring and a heightened level of due diligence must be conducted when selecting, utilizing, and eventually terminating a TPSP.
New York, USA
23 CRR-NY 500.11
23 CRR-NY 500.12
23 CRR-NY 500.7
23 CRR-NY 500.15
"§ 500.1(e) as “any person operating under or required to operate under a license, registration, charter, certificate, permit, accreditation or similar authorization under the Banking Law, the Insurance Law or the Financial Services Law, regardless of whether the covered entity is also regulated by other government agencies.”
"§ 500.1(s) as “a person that: (1) is not an affiliate of the covered entity; (2) is not a governmental entity; (3) provides services to the covered entity; and (4) maintains, processes or otherwise is permitted access to nonpublic information through its provision of services to the covered entity.”
CFR 208 D-2
As your reliance on TPSPs grows, the importance of rigorous vendor-risk governance, first-class contracting, continuous monitoring and disciplined off-boarding cannot be overstated.