Evaluate readiness for cyber liability insurance coverage by assessing security controls, incident response, and risk management practices that insurers require
Primary insurer requirement: MFA on VPN, RDP, admin portals, cloud apps (Office 365, AWS, etc.)
Admin access restricted, logged, reviewed; no shared admin accounts
Minimum 12 characters, complexity requirements, password manager use encouraged
Next-gen AV, EDR, or XDR on workstations, servers, laptops with centralized management
Network firewalls with IDS/IPS, rule reviews, no overly permissive rules
VLANs separate corporate, production, guest networks; critical systems isolated
Daily/weekly backups, offsite/offline storage, quarterly restoration tests
Air-gapped, tape, or immutable cloud storage (e.g., AWS S3 Object Lock)
Encryption for databases, file servers, laptops; TLS for data in transit
IR plan with roles, escalation, communication, tabletop exercises annually
Pre-negotiated rates with incident response firm and breach attorney
Centralized logging for 90+ days, SIEM alerts on suspicious activity
Training on phishing, password security, social engineering, data handling
Quarterly phishing tests, remedial training for clickers
Policy covers device use, data handling, prohibited activities, signed acknowledgment
Security questionnaires, SOC 2 reports, pen test results for high-risk vendors
Contracts specify security controls, audit rights, breach notification timelines
Vendor accounts tracked, periodic reviews, prompt deprovisioning
Please answer all required questions to see your results