EssentialScore (Essential Eight)·CISScore (CIS Controls)·PrivacyScore (Privacy Act)·CyberInsureReady (Cyber Insurance)

Underwriting Checklist

Cyber Insurance Checklist — What Insurers Actually Check (2026)

Cyber insurance underwriting has changed dramatically. Insurers no longer simply ask "do you have antivirus?" — they want evidence of specific, layered controls across five domains. This checklist covers exactly what underwriters look for, why each control matters, and the impact each gap has on your application.

Why Underwriting Has Gotten Harder

Following a surge in ransomware claims from 2019 to 2022, cyber insurers globally tightened their underwriting requirements significantly. Many insurers withdrew from the market entirely. Those that remained introduced more detailed questionnaires, mandatory controls, and new exclusions.

In Australia, this has played out through higher premiums for businesses without strong controls, exclusions for specific attack types (particularly ransomware), and outright declines for businesses that can't demonstrate basic security hygiene.

The businesses that get the best rates and broadest coverage are those that can demonstrate their controls before a broker shops the risk — not those that claim to have controls they can't evidence.

The 5-Domain Underwriting Checklist

01

Identity & Access Management

MFA is now the single most important control for cyber insurers. Multiple insurers will either decline coverage or add a specific exclusion for breaches involving accounts without MFA.

Multi-factor authentication on email

Critical

Email is the #1 attack vector. Credential stuffing, phishing, and password spraying all target email accounts. Without MFA on email, an attacker who gets your password has full access — and most underwriters treat this as a hard requirement.

Critical — some underwriters decline coverage without it

MFA on remote access (VPN, RDP, remote desktop)

Critical

RDP with only a password is one of the most exploited entry points for ransomware operators. Insisting on MFA for all remote access has become standard practice for insurers following a wave of ransomware claims.

Critical — specifically asked on most cyber application forms

Privileged access management

High

Admin accounts with standing privileges that are used for day-to-day tasks dramatically increase breach impact. Attackers move laterally using stolen admin credentials. Insurers look for separation between standard and admin accounts.

High — affects premium and scope of coverage

Password management policy

Medium

Unique, strong passwords across all systems reduce credential reuse attacks. Documented policies show the insurer your controls are intentional and auditable — not ad hoc.

Medium — demonstrates maturity

02

Endpoint & Network Security

Basic antivirus is no longer sufficient. Underwriters are asking specifically about Endpoint Detection and Response (EDR) — which detects and responds to threats that traditional AV misses.

Endpoint Detection and Response (EDR)

High

EDR tools (SentinelOne, CrowdStrike, Microsoft Defender for Endpoint) detect attacker behaviour patterns, not just known malware signatures. They catch ransomware in the early stages and can contain attacks before they spread. Traditional AV doesn't.

High — increasingly required for higher coverage limits

Operating system and application patching

High

Most successful attacks exploit known vulnerabilities that have patches available. Insurers want to know your patching cadence — particularly how quickly you apply critical patches. A 30-day window is often considered reasonable; longer creates exposure.

High — slow patching is a major risk factor for underwriters

Network segmentation

Medium-High

Flat networks allow ransomware to spread from one infected device to everything else. Segmentation limits the blast radius of a breach. Insurers see good segmentation as evidence of mature security architecture.

Medium-High — critical for businesses with OT/IoT or large networks

Firewall and perimeter controls

Medium

Documented, maintained firewall configurations show that network access is controlled intentionally. Insurers look for evidence that internet-facing services are minimised and access is controlled.

Medium — table stakes, but documented controls matter

03

Email Security & Phishing Defence

Business Email Compromise (BEC) is the costliest cybercrime category in Australia. Underwriters look closely at both technical email controls and human awareness training.

SPF, DKIM, and DMARC configured

High

These three DNS-based email authentication controls prevent attackers from spoofing your domain in phishing emails targeting your customers and partners. DMARC in particular (with a reject or quarantine policy) is increasingly expected by underwriters.

High — easy to check externally, frequently asked on applications

Business Email Compromise (BEC) controls

High

BEC attacks impersonate executives or suppliers to redirect payments. Controls include dual-approval for transfers above a threshold, out-of-band verification for payment changes, and email filtering that flags external sender impersonation.

High — BEC claims are among the most frequent and expensive

Phishing awareness training

Medium-High

Technical controls only go so far. Regular phishing simulation training demonstrably reduces click rates. Insurers see it as evidence that your human layer is actively managed — not just your technology.

Medium-High — increasingly asked on applications

Email filtering and anti-malware

Medium

Advanced email filtering (Microsoft Defender for Office 365, Proofpoint, Mimecast) blocks malicious attachments and links before they reach users. Combined with user training, this reduces the success rate of phishing campaigns significantly.

Medium — expected as baseline

04

Backup & Recovery

Ransomware's only leverage is your data. Good backups turn a catastrophic ransomware attack into a recovery exercise. Underwriters look at backup frequency, separation, and whether you've actually tested restoration.

Regular, automated backups

Critical

Daily backups are considered the minimum for most business data. Backups that run weekly or less frequently create large recovery point gaps — meaning you could lose up to a week of data if attacked at the wrong time.

Critical — directly affects your recovery options and claim outcome

Offsite or cloud backup storage

Critical

Backups stored only on-site are often encrypted along with live data in a ransomware attack. Insurers want to see at least one copy stored offsite or in cloud storage — separate from your primary environment.

Critical — on-site-only backups are treated as a significant gap

Immutable or air-gapped backups

High

Modern ransomware specifically seeks out and encrypts backup systems before triggering the visible attack. Immutable storage (where backups can't be modified or deleted for a set period) and air-gapped backups are the most resilient defence.

High — increasingly expected, especially for higher coverage limits

Tested recovery procedures

High

An untested backup is an assumption. Many businesses discover their backups are corrupted, incomplete, or take far longer to restore than expected — only when they actually need them. Insurers want evidence that restoration has been tested, not just assumed.

High — lack of testing is a major flag at claim time

05

Incident Response

Having a plan before you need it dramatically changes outcomes. Underwriters look for evidence that you've thought through how you'd respond to a breach — not just that you'd figure it out on the day.

Documented incident response plan

High

A written IR plan that covers roles, communication procedures, containment steps, and recovery processes shows the insurer that your response will be structured — not panicked. It also helps establish the sequence of events during a claim investigation.

High — asked on most application forms, critical for claims

Cyber insurance history

Medium

Underwriters look at your prior insurance history — previous claims, previous coverage, and any lapses. First-time buyers may be asked more questions. Businesses with prior claims may face higher premiums but can demonstrate what improved since.

Medium — informs underwriting assessment

Breach notification procedures

Medium-High

Under Australia's Notifiable Data Breaches scheme, eligible businesses must notify the OAIC and affected individuals within 30 days of identifying an eligible breach. Insurers want to know you understand these obligations and have a process to meet them.

Medium-High — regulatory non-compliance creates additional liability

Vendor and supply chain risk management

Medium

Third-party breaches are a growing source of incidents. Underwriters increasingly ask about your awareness of key vendor risks — especially cloud providers, IT managed service providers, and payment processors with access to your systems.

Medium — growing area of underwriter scrutiny

Automatic Red Flags for Underwriters

These gaps will either result in a decline, significant premium loading, or specific exclusions being added:

No MFA on email or remote access

RDP exposed directly to the internet without MFA

Backups stored only on the same network as live systems

No tested backup restoration in the past 12 months

Running end-of-life operating systems (Windows 7, Server 2008/2012)

No written incident response plan

Prior ransomware incident with no evidence of remediation

Critical patches not applied within 30 days

Quick Wins Before You Apply

If you're applying for cyber insurance in the next 60–90 days, these are the highest-impact things you can do to improve your application:

Enable MFA on email for all staff

1–2 days

Enable MFA on all remote access (VPN/RDP)

1–3 days

Configure DMARC on your email domain (p=reject)

1 week

Verify backups are running and test restoration

1–2 days

Set up a cloud backup separate from your on-site systems

1 week

Write a basic incident response plan (1–2 pages)

2–3 days

Deploy EDR on all endpoints

1–2 weeks

Audit admin accounts and remove unnecessary privileges

1 week

Find out where you stand right now

Our free 20-question assessment covers all 5 underwriting domains. You'll get a readiness score, a list of your gaps, and a clear picture of how an underwriter would see your business — before you apply.