What insurance carriers really want
Multi-factor authentication (MFA)
MFA is a top requirement for most carriers, yet adoption is still low. According to the Cyber Readiness Institute SMB MFA Survey, 65% of global small and medium-sized businesses don’t use MFA, and 58% of those aren’t even aware of its security benefits. Carriers won't accept simple attestations about MFA use. Expect detailed inquiries about deployment rates, enforcement policies, and even proof that privileged accounts are covered.
Endpoint detection and response (EDR)
Underwriters expect EDR solutions to be in place and actively monitored. They’ll inquire about detection rates, response times, and even proof that your team reviews alerts.
Security awareness training & 24/7 monitoring
Security awareness training completion rates, phishing simulation results, and ongoing education logs are now standard proof points. Similarly, insurers expect documented alert logs, response times, and SOC reports showing that threats are actively detected and mitigated around the clock.
Email security
Email remains a prime attack vector, with phishing-related incidents costing an average of $4.88 million USD. Underwriters expect documented evidence that email security controls, including anti-phishing measures, quarantine policies, and user reporting mechanisms, are effectively protecting your organization.
Backups
Backups must exist, but so must documented testing schedules, offline storage, and restoration procedures.
And that’s not all: Patch management, privileged access controls, logging, incident response plans, and vendor risk assessments are the usual suspects that round out most standard requirements.Carriers require documentation, policies, and evidence of execution for each. Attestations are good. Verification is better.