4. Testing and Vulnerability Assessments
One of the most operationally significant — and often overlooked — parts of New York’s new hospital cybersecurity regulation is the mandate for ongoing testing and vulnerability assessments. Under 10 NYCRR 405.46(f), hospitals must continuously assess the effectiveness of their cybersecurity program and identify vulnerabilities across their information systems. These requirements go beyond HIPAA’s “periodic testing” expectations and establish a far more prescriptive standard of care.
The law requires hospitals to ensure that monitoring, testing, and vulnerability management are risk-based, routine, and tied directly to the hospital’s operational environment.
A. Annual Penetration Testing
Hospitals are required to conduct:
- Penetration testing of hospital information systems at least once per year, and
- Testing must be performed by a qualified internal or external party
The regulation emphasizes that penetration testing must align to the hospital’s risk assessment, ensuring that testing focuses on high-risk systems such as:
- Electronic health records (EHR)
- Clinical and diagnostic systems
- Medical device networks
- Cloud-hosted applications
- Vendor-managed systems with elevated privileges
This shifts penetration testing from a “best practice” to a mandatory annual requirement for all general hospitals in New York.
B. Vulnerability Scanning & Continuous Monitoring
In addition to annual penetration testing, hospitals must also implement:
- Automated scans or
- Manual or automated reviews of systems
These assessments must be reasonably designed to identify publicly known cybersecurity vulnerabilities, such as:
- Missing patches
- Exposed services or ports
- Misconfigurations
- Unsupported or outdated software
- Known CVEs impacting hospital technologies
- Vendor-related vulnerabilities in connected systems
Importantly, the regulation requires that vulnerability testing be aligned to the hospital’s specific risk assessment, meaning high-risk systems should receive more frequent or more intensive scanning.
C. Timely Remediation Based on Risk
Detection alone is not sufficient. Hospitals must also:
- Remediate vulnerabilities within a timeframe appropriate to the risk they pose
The regulation does not define specific SLAs, but a risk-based approach typically includes:
- Immediate remediation for critical vulnerabilities with active exploits
- Short-term remediation for high-risk vulnerabilities tied to essential systems
- Documented remediation timelines for medium and lower-risk issues
- Compensating controls when patching is not immediately possible (e.g., medical device constraints)
The expectation is that hospitals not only identify vulnerabilities but also demonstrate consistent, risk-driven remediation practices — supported by documentation that NYSDOH can review during audits.