Resource · Cyber Insurance · Renewal Readiness

Cyber-insurance readiness checklist.

What carriers actually ask for at renewal, what evidence you need to provide, and the blockers that fail policies. Ten controls, one practical checklist for the cybersecurity questionnaire your broker will send next quarter.

01

Multi-Factor Authentication (MFA)

Carrier expectation

Enforced for all users including admins, with phishing-resistant methods (authenticator app or FIDO2 / WebAuthn) preferred over SMS.

Evidence needed

Conditional Access policy screenshot showing MFA enforcement; sign-in log sample showing 100% MFA prompts; admin role MFA report.

Common blockers

Service accounts that can't take MFA; legacy auth still enabled (POP/IMAP/SMTP); inherited break-glass account without MFA.

02

Endpoint Detection & Response (EDR)

Carrier expectation

Modern EDR or XDR on every workstation and server. Microsoft Defender for Endpoint, CrowdStrike, SentinelOne, and similar are accepted. Anti-virus alone is not.

Evidence needed

EDR console screenshot showing device coverage percentage; deployment report; named SOC analyst or 24/7 SOC contract.

Common blockers

Coverage gap on macOS or Linux; servers excluded; unmanaged personal devices accessing corporate data.

03

Immutable + Tested Backups

Carrier expectation

3-2-1 rule (3 copies, 2 media, 1 offsite). Immutability flag or air-gap. Successful restore test within the last 12 months.

Evidence needed

Backup configuration showing immutability; last restore-test log; runbook showing the restore process and contacts.

Common blockers

Microsoft 365 not backed up (Microsoft does not back up tenant data by default); no documented restore test; backups stored on the same domain controllers.

04

Patch Management

Carrier expectation

Documented cadence — security patches within 14 days for high-severity, 30 days for medium. Server patching window defined. Workstation patching automated.

Evidence needed

Patch compliance report (last 90 days); known-exposed CVE list with remediation status; documented exception process.

Common blockers

End-of-life operating systems still in production; unmonitored network appliances; firmware not in scope.

05

Email Security & Anti-Phishing

Carrier expectation

SPF, DKIM, DMARC at p=quarantine or stricter. Anti-phish controls in Microsoft 365 or equivalent. Impersonation protection on executives.

Evidence needed

DMARC report aggregator screenshot; Defender for Office 365 anti-phish policy; phishing simulation result summary.

Common blockers

DMARC at p=none indefinitely; no DKIM on marketing-platform mail; impersonation protection not configured.

06

Security Awareness Training

Carrier expectation

Annual minimum. Phishing simulation cadence (monthly to quarterly). Onboarding training for new hires.

Evidence needed

Training completion log; phishing simulation results; new-hire onboarding checklist with security training step.

Common blockers

Training is one-and-done from years ago; no phishing simulation; non-trackable training source.

07

Incident Response Plan

Carrier expectation

Documented IR plan. Named IR contact. Tabletop exercise within the last 12 months.

Evidence needed

IR plan document with version and date; tabletop exercise minutes; carrier-specific breach notification clause.

Common blockers

No documented plan; plan from years ago never reviewed; no named IR contact; no out-of-band communication channel.

08

Logging & Monitoring

Carrier expectation

Centralized logging (SIEM or equivalent). 90-day retention minimum for sign-in logs; 365 days for audit logs.

Evidence needed

Log retention policy; SIEM dashboard sample; alert response runbook with named owner.

Common blockers

Logs not centralized; retention insufficient; alerts not triaged; no documented response procedure.

09

Privileged Access Management

Carrier expectation

Separation of admin accounts from daily-use accounts. PIM or equivalent just-in-time elevation where the license allows. Quarterly access review.

Evidence needed

Admin account inventory; PIM activation log sample; quarterly review meeting minutes.

Common blockers

Global Administrator on every IT staff member; no separation of daily and admin accounts; no quarterly review.

10

Asset Inventory

Carrier expectation

Documented asset inventory covering servers, workstations, mobile devices, network appliances, and SaaS applications.

Evidence needed

Asset inventory report; MDM / Intune device list; SaaS application inventory with ownership.

Common blockers

Manual spreadsheet that's out of date; mobile devices missing; SaaS shadow IT undocumented.

FAQ.

How long does an evidence pack take to assemble?

Two to four weeks when starting from a relatively mature environment. Two to three months when starting from scratch — most of that is implementing the missing controls, not gathering the evidence.

Carriers ask different questions. Is this checklist universal?

The ten controls above are the consensus across Beazley, Chubb, AIG, Travelers, CFC, Coalition, and the major specialty markets. Specific phrasing varies, but the underlying questions are the same.

Will having all this in place lower our premium?

It will reliably keep your policy in force and minimize sublimits. Premium reduction depends on broker negotiation and overall market conditions. The bigger savings are in declining a renewal because evidence is missing, or being moved to a higher-risk tier mid-policy.