- The hardening cycle of 2021 made technical controls mandatory, not optional, for most cyber policies
- MFA on remote access is the single most common reason carriers decline to quote
- Post-breach forensics will check whether your controls match what you stated on the application
- Lloyd's of London now excludes state-sponsored attacks from standalone cyber policies
- First-party and third-party sublimits in your policy schedule often differ from the headline limit
Why cyber insurance underwriting changed
The ransomware epidemic of 2020 and 2021 cost insurers more than they had modelled. Colonial Pipeline, JBS Foods, and dozens of hospital systems filed multi-million dollar claims within months of each other. The combined loss ratio across the market reached unsustainable levels: carriers were paying out more in claims than they collected in premium, with overhead on top.
Premiums rose sharply. Marsh McLennan reported average increases of 130% for some segments in Q4 2021. Carriers also introduced sublimits specifically for ransomware, so a policy with a headline limit for any cyber event might cap ransomware recovery at half that amount, with a higher deductible.
The market has since stabilised. Average premium increases dropped to around 3% in 2023 as carriers adjusted their books and controls requirements tightened. But the controls that emerged from that hardening cycle are now permanent fixtures. They are not going away when the market softens further.
The five controls underwriters check first
Modern underwriting applications run to 40 or more questions. Five controls carry more weight than all the others combined. If you cannot demonstrate these five, expect either a declined quote or coverage with significant carve-outs.
Beyond the five, carriers increasingly ask about DMARC, DKIM, and SPF email authentication (reduces phishing and business email compromise exposure), network segmentation, and whether you have a documented incident response plan that has been tested in the past 12 months.
What the application process looks like
The accuracy of your answers matters more than the quality of your controls. Post-breach forensics will check what was actually in place, not what you said was in place. If there is a gap between the two, the insurer has grounds to challenge the claim on misrepresentation.
Typical application questions cover:
- Whether MFA is deployed on email, VPN, remote access, cloud services, and privileged accounts separately, not as a single yes/no answer
- The percentage of endpoints covered by EDR
- Your patch management SLA for critical vulnerabilities
- Whether you have a documented incident response plan and when it was last tested
- Whether backups are tested for restoration and how frequently
- Whether you have PAM controls, and whether privileged accounts are vaulted
- Annual revenue, number of employees, data types processed (PII, payment card, health), and sector
Do not complete the questionnaire from memory. Build a controls inventory before you start: map each required control to the system or user group it covers, the person responsible, and the last review date. Bring documentation to the application process. If you discover gaps during this exercise, address them before applying rather than after.
Request a copy of last year's application from your broker. Comparing year-on-year answers against your current posture is one of the fastest ways to identify where your documentation does not match your controls.
How insurers evaluate claims
When you file a claim, your insurer appoints a forensic firm. That firm's primary function is to determine root cause, scope, and whether your controls matched your application. They will review Active Directory logs and firewall records, assess whether MFA was enforced at every authentication point you described, examine backup logs, and check whether the initial attack vector was a known unpatched vulnerability.
The forensic report goes to the insurer before the claim is settled. If it contradicts your application, the insurer will use that to challenge the claim. This is not theoretical: denial rates on cyber claims have been climbing.
The second thing that determines claim outcomes is notification timing. Most policies require you to notify your insurer promptly after becoming aware of an incident, typically within 72 hours. Late notification is itself a grounds for claim reduction, independent of whether your controls were in place.
Contact your insurer and legal counsel before engaging a public relations firm or making external statements after a breach. Many policies cover crisis communication costs, but only if the insurer approves the communications firm. Engaging one independently can void that element of coverage.
Exclusions you need to understand
Read your policy schedule, not just the marketing summary. The exclusions that matter most are not prominently featured.
Preparing for renewal
The best time to prepare for renewal is six months before it happens. Most brokers will give you a pre-renewal questionnaire two to three months out. By that point, any gaps you find will take longer to close than you have.
An organisation that arrives at renewal with a completed controls inventory, a tested backup report, and a documented tabletop exercise is in a fundamentally different position from one that relies on memory. The documentation is also what survives a post-breach forensic review.