HOW-TO GUIDE | RISK MANAGEMENT
Active Threat10 min read

Cyber Insurance Requirements Checklist: What Insurers Actually Require in 2026

50%
Average cyber insurance premium increase between 2020–2022
15%
Organizations denied coverage due to insufficient controls
MFA
Required by virtually every carrier for privileged and remote access
3x
Premium reduction potential with mature security controls vs. minimal controls

Cyber insurance underwriting changed fundamentally after the 2020–2022 ransomware wave. Carriers that previously issued policies based on self-attestation of general security practices now require evidence of specific technical controls, conduct pre-binding technical assessments, and in some cases deploy external scanning tools to verify your attack surface before quoting.

This guide reflects current underwriting requirements based on application questionnaires from major carriers. The controls that matter most to underwriters are the ones most correlated with ransomware claims — because ransomware represents the majority of cyber insurance losses. Understanding what carriers require and why helps you prioritize your security investments for both risk reduction and favorable underwriting outcomes.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.

MFA: The Non-Negotiable Baseline

Multi-factor authentication is the single most universally required control across all major cyber insurance carriers. The specific requirements have evolved beyond 'we have MFA' to specific coverage mandates.

What underwriters require: (1) MFA for all privileged and administrative access — domain admin, server admin, cloud IAM admin roles must authenticate with MFA, with no exceptions. (2) MFA for all remote access — VPN, RDP, Citrix, and any remote desktop protocol must require MFA before granting access. (3) MFA for email — Microsoft 365, Google Workspace, and other cloud email platforms must require MFA, especially for executives and finance roles (the primary BEC targets). (4) Phishing-resistant MFA preferred — carriers increasingly distinguish between SMS/TOTP MFA and phishing-resistant options (FIDO2/WebAuthn, hardware security keys). SMS-based MFA is increasingly noted as inadequate for privileged access.

The most common reason for coverage denial or premium loading: MFA not deployed for remote access (RDP exposed without MFA is a near-automatic coverage denial from most carriers) and email access without MFA.

Endpoint Detection and Response (EDR)

EDR deployment is now a standard underwriting requirement across virtually all major carriers. The specific requirements: EDR must be deployed on all endpoints (servers, workstations, laptops), not just a subset. The agent must be actively managed (not just installed) with alerting configured to a monitored destination. Coverage on unmanaged endpoints is a common gap carriers look for.

What distinguishes premium vs. standard EDR credit: real-time response capability (not just detection), managed detection and response (MDR) service layered on the EDR platform, and integration with the organization's incident response process. Carriers view organizations with an MDR service as significantly lower risk than organizations with EDR deployed but no managed monitoring — because MDR provides the 24/7 detection capability that most in-house security teams cannot maintain.

Document your EDR coverage percentage (percentage of endpoints with active agent), your alert routing and response process, and your contract with an MDR provider if applicable. This documentation is often specifically requested in the underwriting questionnaire.

Backup and Recovery Controls

Backup integrity directly affects ransomware recovery outcomes, and carriers have learned to ask specific questions that distinguish meaningful backup programs from those that will fail under a ransomware attack.

What underwriters assess: (1) Offline or immutable backups — backups accessible from the same credentials as production systems will be compromised in a ransomware attack. Carriers require evidence of offline (tape, physical media) or cloud immutable (S3 Object Lock, Azure Blob immutability) backup copies. (2) Backup testing frequency — documented backup restoration tests, not just backup creation monitoring. Carriers increasingly require quarterly or annual restoration tests with documentation. (3) Backup coverage — critical systems (domain controllers, email, financial systems, ERP) must be backed up. Carriers look for gaps in coverage of high-value systems. (4) Recovery time objectives — documented RTOs and the testing evidence that supports them.

Organizations that cannot demonstrate immutable or offline backups face significant premium loading or coverage exclusions for ransomware incidents — the most common and costly claim type.

Privileged Access Management and Credential Controls

After MFA, PAM controls are the next most heavily weighted security factor in cyber insurance underwriting. The specific controls assessed: (1) Privileged account inventory — can you enumerate all privileged accounts (local admin, service accounts, domain admin, cloud IAM admin) in your environment? Carriers are suspicious of organizations that cannot answer this question. (2) Principle of least privilege — are privileged accounts used only for privileged tasks, or do admins use the same account for email and administration? (3) Service account credential management — are service account passwords regularly rotated and unique across systems? (4) Privileged Access Workstations — do administrators use dedicated hardened systems for privileged tasks?

For organizations with a PAM tool (CyberArk, BeyondTrust, Delinea), document it explicitly in your application. PAM tool deployment is one of the most significant factors for premium reduction because it demonstrates credential discipline that directly reduces attacker ability to leverage stolen credentials for lateral movement.

Incident Response, Patch Management, and Vendor Risk

Beyond the technical controls, underwriters assess organizational maturity indicators that predict how well an organization will respond to and contain an incident.

Incident response: A documented IR plan is required by most carriers — specifically, one that has been tested (tabletop exercise with documented date) and includes specific roles, contact information for legal counsel and IR retainer, and regulatory notification procedures. Carriers look unfavorably on IR plans that have never been exercised. An IR retainer (pre-contracted relationship with an IR firm) is increasingly expected for mid-market and enterprise accounts.

Patch management: Carriers ask about your critical patch deployment SLA (how quickly do you apply CRITICAL CVEs?) and your process for internet-facing systems specifically. The most common pattern in ransomware claims involves exploitation of unpatched VPN or firewall vulnerabilities on internet-facing systems. A 30-day or less patch SLA for critical CVEs on internet-facing systems is the typical underwriting threshold.

Vendor and third-party risk: After high-profile supply chain attacks, carriers ask whether you conduct security assessments of critical third-party vendors, whether you have SLAs in your vendor contracts for security incident notification, and whether you monitor for vendor breaches via threat intelligence.

Subscribe to unlock Remediation & Mitigation steps

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

The bottom line

Cyber insurance underwriting is now a proxy for security program maturity assessment. Carriers have learned, through billions in claims, which controls most reduce ransomware outcomes — and their questionnaires reflect that knowledge. Organizations that treat the underwriting questionnaire as a security program gap analysis (rather than a compliance exercise) get both better coverage terms and a more defensible security posture. MFA, EDR, immutable backups, and a tested IR plan are not just insurance requirements — they are the minimum viable defense against the attacks that generate the most claims.

Frequently asked questions

What are the minimum security controls required for cyber insurance?

Minimum requirements vary by carrier and coverage amount, but the near-universal baseline across major carriers in 2026: MFA for all privileged and remote access, EDR on all endpoints, offline or immutable backups of critical systems, and a documented incident response plan. Organizations that cannot demonstrate all four controls face either coverage denial, significant premium loading, or ransomware exclusions. These four controls are also the most effective ransomware prevention and response investments available.

How much does cyber insurance cost?

Premiums vary dramatically based on revenue, industry, coverage limits, and security controls. As a rough benchmark, mid-market companies ($50M–$500M revenue) with mature security programs pay approximately 0.1–0.3% of revenue annually for $10M–$25M in coverage limits. Organizations with weak controls (no MFA, no EDR, poor backup posture) pay 3–5x the rate of comparable organizations with strong controls. Healthcare, financial services, and education sectors face higher premiums due to higher claim frequency.

What does cyber insurance actually cover?

A comprehensive cyber insurance policy typically covers: incident response and forensics costs, ransomware payments (subject to OFAC compliance), business interruption losses from system downtime, breach notification costs and credit monitoring, regulatory fines and penalties (coverage varies by jurisdiction and policy), third-party liability from data breach, and crisis communications costs. Coverage exclusions vary significantly — review ransomware sub-limits, war/nation-state exclusions, and social engineering coverage limits carefully before binding.

Will my cyber insurer cover a ransomware payment?

Ransomware payment coverage exists in most cyber policies but with important conditions: you must notify the carrier before making any payment (most policies require pre-authorization), payments to OFAC-sanctioned groups are not covered and may expose you to federal liability, and many policies have ransomware sub-limits lower than the overall policy limit. Engage your carrier and legal counsel at the beginning of an incident, not after making a payment decision.

Sources & references

  1. CISA Cyber Insurance Resources
  2. Coalition Cyber Threat Index 2025
  3. Marsh Cyber Insurance Market Update 2025

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Get tomorrow's threat briefing before your inbox does.