Insurers are now requiring businesses to demonstrate specific, verifiable security controls before coverage is offered or renewed. The days of self-reported, good-faith attestations are fading fast. Here is what most carriers are actively looking for before they’ll approve an application:
Multi-Factor Authentication (MFA)
MFA is required across the board, especially for email, remote access, and any administrative accounts. A business without it is often disqualified before the rest of the application is reviewed.
Endpoint Detection and Response (EDR)
Basic antivirus is no longer sufficient. Insurers want active, behavior-based endpoint monitoring that can detect and respond to threats in real time rather than simply scanning for known signatures.
Privileged Access Management (PAM)
Controlling and logging who has access to what, especially at the administrative level, has become a standard underwriting requirement that insurers verify rather than assume.
Tested Incident Response Plan
Carriers want documented proof that a business knows what to do when an attack occurs. An untested or undocumented plan is treated nearly as poorly as having no plan at all.
Regular Backups with Offline or Immutable Storage
Ransomware recovery depends on backups that can’t be encrypted alongside your primary systems. Insurers are asking specifically about backup architecture and how frequently it’s tested.
These aren’t optional improvements to pursue when time allows. For many carriers, they are hard stops in the application process that determine whether a conversation even continues.