Underwriting Checklist
Cyber Insurance Checklist — What Insurers Actually Check (2026)
Cyber insurance underwriting has changed dramatically. Insurers no longer simply ask "do you have antivirus?" — they want evidence of specific, layered controls across five domains. This checklist covers exactly what underwriters look for, why each control matters, and the impact each gap has on your application.
Why Underwriting Has Gotten Harder
Following a surge in ransomware claims from 2019 to 2022, cyber insurers globally tightened their underwriting requirements significantly. Many insurers withdrew from the market entirely. Those that remained introduced more detailed questionnaires, mandatory controls, and new exclusions.
In Australia, this has played out through higher premiums for businesses without strong controls, exclusions for specific attack types (particularly ransomware), and outright declines for businesses that can't demonstrate basic security hygiene.
The businesses that get the best rates and broadest coverage are those that can demonstrate their controls before a broker shops the risk — not those that claim to have controls they can't evidence.
The 5-Domain Underwriting Checklist
Identity & Access Management
MFA is now the single most important control for cyber insurers. Multiple insurers will either decline coverage or add a specific exclusion for breaches involving accounts without MFA.
Multi-factor authentication on email
CriticalEmail is the #1 attack vector. Credential stuffing, phishing, and password spraying all target email accounts. Without MFA on email, an attacker who gets your password has full access — and most underwriters treat this as a hard requirement.
Critical — some underwriters decline coverage without it
MFA on remote access (VPN, RDP, remote desktop)
CriticalRDP with only a password is one of the most exploited entry points for ransomware operators. Insisting on MFA for all remote access has become standard practice for insurers following a wave of ransomware claims.
Critical — specifically asked on most cyber application forms
Privileged access management
HighAdmin accounts with standing privileges that are used for day-to-day tasks dramatically increase breach impact. Attackers move laterally using stolen admin credentials. Insurers look for separation between standard and admin accounts.
High — affects premium and scope of coverage
Password management policy
MediumUnique, strong passwords across all systems reduce credential reuse attacks. Documented policies show the insurer your controls are intentional and auditable — not ad hoc.
Medium — demonstrates maturity
Endpoint & Network Security
Basic antivirus is no longer sufficient. Underwriters are asking specifically about Endpoint Detection and Response (EDR) — which detects and responds to threats that traditional AV misses.
Endpoint Detection and Response (EDR)
HighEDR tools (SentinelOne, CrowdStrike, Microsoft Defender for Endpoint) detect attacker behaviour patterns, not just known malware signatures. They catch ransomware in the early stages and can contain attacks before they spread. Traditional AV doesn't.
High — increasingly required for higher coverage limits
Operating system and application patching
HighMost successful attacks exploit known vulnerabilities that have patches available. Insurers want to know your patching cadence — particularly how quickly you apply critical patches. A 30-day window is often considered reasonable; longer creates exposure.
High — slow patching is a major risk factor for underwriters
Network segmentation
Medium-HighFlat networks allow ransomware to spread from one infected device to everything else. Segmentation limits the blast radius of a breach. Insurers see good segmentation as evidence of mature security architecture.
Medium-High — critical for businesses with OT/IoT or large networks
Firewall and perimeter controls
MediumDocumented, maintained firewall configurations show that network access is controlled intentionally. Insurers look for evidence that internet-facing services are minimised and access is controlled.
Medium — table stakes, but documented controls matter
Email Security & Phishing Defence
Business Email Compromise (BEC) is the costliest cybercrime category in Australia. Underwriters look closely at both technical email controls and human awareness training.
SPF, DKIM, and DMARC configured
HighThese three DNS-based email authentication controls prevent attackers from spoofing your domain in phishing emails targeting your customers and partners. DMARC in particular (with a reject or quarantine policy) is increasingly expected by underwriters.
High — easy to check externally, frequently asked on applications
Business Email Compromise (BEC) controls
HighBEC attacks impersonate executives or suppliers to redirect payments. Controls include dual-approval for transfers above a threshold, out-of-band verification for payment changes, and email filtering that flags external sender impersonation.
High — BEC claims are among the most frequent and expensive
Phishing awareness training
Medium-HighTechnical controls only go so far. Regular phishing simulation training demonstrably reduces click rates. Insurers see it as evidence that your human layer is actively managed — not just your technology.
Medium-High — increasingly asked on applications
Email filtering and anti-malware
MediumAdvanced email filtering (Microsoft Defender for Office 365, Proofpoint, Mimecast) blocks malicious attachments and links before they reach users. Combined with user training, this reduces the success rate of phishing campaigns significantly.
Medium — expected as baseline
Backup & Recovery
Ransomware's only leverage is your data. Good backups turn a catastrophic ransomware attack into a recovery exercise. Underwriters look at backup frequency, separation, and whether you've actually tested restoration.
Regular, automated backups
CriticalDaily backups are considered the minimum for most business data. Backups that run weekly or less frequently create large recovery point gaps — meaning you could lose up to a week of data if attacked at the wrong time.
Critical — directly affects your recovery options and claim outcome
Offsite or cloud backup storage
CriticalBackups stored only on-site are often encrypted along with live data in a ransomware attack. Insurers want to see at least one copy stored offsite or in cloud storage — separate from your primary environment.
Critical — on-site-only backups are treated as a significant gap
Immutable or air-gapped backups
HighModern ransomware specifically seeks out and encrypts backup systems before triggering the visible attack. Immutable storage (where backups can't be modified or deleted for a set period) and air-gapped backups are the most resilient defence.
High — increasingly expected, especially for higher coverage limits
Tested recovery procedures
HighAn untested backup is an assumption. Many businesses discover their backups are corrupted, incomplete, or take far longer to restore than expected — only when they actually need them. Insurers want evidence that restoration has been tested, not just assumed.
High — lack of testing is a major flag at claim time
Incident Response
Having a plan before you need it dramatically changes outcomes. Underwriters look for evidence that you've thought through how you'd respond to a breach — not just that you'd figure it out on the day.
Documented incident response plan
HighA written IR plan that covers roles, communication procedures, containment steps, and recovery processes shows the insurer that your response will be structured — not panicked. It also helps establish the sequence of events during a claim investigation.
High — asked on most application forms, critical for claims
Cyber insurance history
MediumUnderwriters look at your prior insurance history — previous claims, previous coverage, and any lapses. First-time buyers may be asked more questions. Businesses with prior claims may face higher premiums but can demonstrate what improved since.
Medium — informs underwriting assessment
Breach notification procedures
Medium-HighUnder Australia's Notifiable Data Breaches scheme, eligible businesses must notify the OAIC and affected individuals within 30 days of identifying an eligible breach. Insurers want to know you understand these obligations and have a process to meet them.
Medium-High — regulatory non-compliance creates additional liability
Vendor and supply chain risk management
MediumThird-party breaches are a growing source of incidents. Underwriters increasingly ask about your awareness of key vendor risks — especially cloud providers, IT managed service providers, and payment processors with access to your systems.
Medium — growing area of underwriter scrutiny
Automatic Red Flags for Underwriters
These gaps will either result in a decline, significant premium loading, or specific exclusions being added:
No MFA on email or remote access
RDP exposed directly to the internet without MFA
Backups stored only on the same network as live systems
No tested backup restoration in the past 12 months
Running end-of-life operating systems (Windows 7, Server 2008/2012)
No written incident response plan
Prior ransomware incident with no evidence of remediation
Critical patches not applied within 30 days
Quick Wins Before You Apply
If you're applying for cyber insurance in the next 60–90 days, these are the highest-impact things you can do to improve your application:
Enable MFA on email for all staff
Enable MFA on all remote access (VPN/RDP)
Configure DMARC on your email domain (p=reject)
Verify backups are running and test restoration
Set up a cloud backup separate from your on-site systems
Write a basic incident response plan (1–2 pages)
Deploy EDR on all endpoints
Audit admin accounts and remove unnecessary privileges
Find out where you stand right now
Our free 20-question assessment covers all 5 underwriting domains. You'll get a readiness score, a list of your gaps, and a clear picture of how an underwriter would see your business — before you apply.