Weak remote access controls are the crack in the wall that the New York Department of Financial Services (NYDFS) Cybersecurity Regulation tries to seal shut. Under 23 NYCRR 500, any covered entity must secure nonpublic systems against unauthorized access—whether from employees, contractors, or third parties. The rules don’t just suggest stronger passwords or periodic reviews. They require clear policies, continuous risk assessment, encryption, and, for remote access in particular, robust controls that can stand up to real-world attacks.
A remote access proxy sits at the front line of compliance. It is not an optional layer; for many, it is the control that keeps privileged accounts and sensitive data away from any direct network exposure. NYDFS mandates multi-factor authentication for external access. It also pushes for granular monitoring, logging, and restrictions that prevent lateral movement if credentials are compromised. A properly implemented proxy enforces all of these steps in one choke point.
This is not about theory. Section 500.14(b) makes vendor and third-party access subject to the same rules as internal staff. That means a vendor logging in from an unsecured laptop in another country must pass through the same secure remote gateway, often shaped as a proxy with inspection, session recording, and automated lockouts. Every connection is recorded. Every access attempt is logged. Regulators and auditors can retrace sessions to the second.