US Cyber Insurance Requirements: What You Need to Qualify

US insurers have exacting requirements around MFA, EDR, state breach compliance, and regulatory standards. Here's exactly what carriers expect.

Get a Quote β†’

See how your controls align with US insurer expectations.

Why US insurers scrutinise security controls

The US cyber insurance market is highly regulated with complex state-by-state breach notification laws, industry-specific compliance regimes (HIPAA, PCI DSS, NYDFS), and a patchwork of requirements that varies significantly by state and industry. Insurers have become highly selective because claim severity in the US is exceptionally high.

The average cost of a data breach in the US is $5.09 million β€” the highest in the world. Insurers are therefore extremely rigorous in underwriting. You don't need to be Fortune 500, but you must demonstrate that you have the fundamentals in place.

Essential controls (required by virtually all US insurers)

These are table stakes in the US market. If you're missing any of these, expect a declined application or prohibitive premium penalties.

Multi-Factor Authentication (MFA)

This is the #1 requirement without exception. No MFA = no coverage. MFA must be implemented on:

MFA implementation alone can reduce premiums by 15–25%. If you haven't deployed it, this is your first priority.

Endpoint Detection and Response (EDR)

Basic antivirus is no longer sufficient. US insurers now demand EDR β€” continuous monitoring, threat hunting, and response capabilities on all endpoints. Enterprise detection and response solutions like Microsoft Defender for Endpoint, CrowdStrike, SentinelOne, or Fortinet are standard expectations even for mid-market firms.

Email security

Email remains the primary attack vector for ransomware and phishing. Insurers require:

Backup and recovery procedures

Insurers mandate the 3-2-1 rule: 3 copies of your data, on 2 different media types, with at least 1 copy offsite and offline. Critical requirement: you must have tested and documented a restore from these backups. Untested backups don't count. Immutable or air-gapped backups score additional credit.

Patch management

A documented patching process is essential. Carriers expect critical patches deployed within 30 days (often faster for remotely exploitable vulnerabilities). Show your patch management policy and recent deployment schedule.

Security awareness training

Annual training is insufficient. Insurers expect regular, documented training at least quarterly. Bonus points for phishing simulations, tracking employee click-through rates, and remedial training for repeat offenders.

US-specific regulatory requirements

Beyond baseline controls, US carriers assess compliance with state and federal regulations:

State breach notification laws

All 50 states have data breach notification statutes. Insurers examine:

California (CCPA/CPRA) compliance

If you handle California resident data, compliance with the California Consumer Privacy Act and Privacy Rights Act is mandatory. Insurers ask about:

New York NYDFS cybersecurity requirements (23 NYCRR 500)

If you're a licensed financial services firm or serve NY customers, NYDFS rules apply. Insurers specifically ask about:

HIPAA compliance (healthcare)

Healthcare providers and business associates face strict requirements. Insurers demand documentation of:

PCI DSS compliance (payment processors & retailers)

Companies handling payment card data must comply with PCI DSS standards. Insurers require evidence of:

Important controls (expected by most US carriers)

You're unlikely to be outright declined without these, but they're strongly expected and will significantly improve your premium.

Privileged Access Management (PAM)

Separate admin accounts from regular user accounts. Implement just-in-time (JIT) access so administrators don't stay logged in to privileged accounts all day. Log and audit all privileged access. This is a major control for US carriers.

Network segmentation

Don't put everything on a flat network. Separate IT from OT (operational technology), isolate critical systems, and restrict lateral movement. Network segmentation is critical for ransomware containment.

Incident response plan

You must have a documented incident response plan covering:

Best practice: test your plan annually via tabletop exercises.

Vulnerability scanning and assessment

Regular vulnerability scans (internal and external) are standard. Quarterly minimum. Many US insurers will run their own external scans during underwriting to verify your claims.

Encryption

Data in transit (TLS/SSL, VPN) and at rest (full-disk encryption on laptops, encrypted databases). This is especially critical for HIPAA and PCI DSS compliance.

Logging and monitoring

Collect logs from critical systems. SIEM (Security Information and Event Management) or simpler cloud-based log aggregation. Retain logs for at least 90 days (1+ year preferred for forensics and compliance).

Advanced controls (significant premium reduction)

If you implement these, you'll qualify for better rates:

What to expect during the US application process

Step 1: Preliminary proposal form

A detailed questionnaire covering your business, employees, revenue, industry, location(s), and security posture. Be honest and comprehensive. Understatement or misrepresentation will void your policy later.

Step 2: Supplemental applications

Depending on your industry and risk, expect targeted questions about:

Step 3: External vulnerability scan

Most US carriers will perform an external scan of your perimeter during underwriting. They're checking for:

Step 4: Underwriter interview (mid-market and enterprise)

Larger accounts typically receive a call with the underwriter to discuss your security programme in detail. Be prepared to discuss your controls, incident history, and risk management approach.

Timeline

Common reasons for declined applications in the US

Cyber insurance requirements checklist for the US

Below is your complete checklist for US underwriting. Use this to benchmark your current posture and plan improvements.

Control Description Priority
Multi-factor authentication MFA on all remote access, email, cloud services, admin accounts Essential
Endpoint detection and response (EDR) Advanced endpoint protection with continuous monitoring Essential
Email security DMARC/DKIM/SPF, anti-phishing, spam filtering Essential
Backup and recovery (3-2-1) Tested, documented backups with offline/immutable copy Essential
Patch management Critical patches within 30 days, documented process Essential
Security awareness training Quarterly+, documented, with phishing simulations Essential
State breach notification readiness Documented procedures for all 50 states Important
Privileged access management (PAM) Separate admin accounts, JIT access, logging Important
Network segmentation IT/OT separation, restrict lateral movement Important
Incident response plan Documented, tested annually via tabletop Important
Vulnerability scanning Internal and external scans (quarterly+) Important
Encryption Data at rest (disk, database) and in transit (TLS/VPN) Important
Logging and monitoring SIEM or log aggregation, 90+ day retention Important
HIPAA compliance (if healthcare) Technical, administrative, physical safeguards documented Important
PCI DSS compliance (if payment processor) Network segmentation, encryption, access controls Important
NYDFS compliance (if serving NY) Encryption, MFA, 72-hour breach notification Important
24/7 SOC or MDR Continuous threat hunting and response Advanced
Zero trust architecture "Never trust, always verify" approach Advanced
Penetration testing Annual or biannual third-party assessments Advanced
Third-party risk management Vendor assessment and continuous monitoring Advanced

Next steps

Ready to apply for cyber insurance in the US? Get matched with a specialist broker who understands US regulatory requirements, state-specific considerations, and carrier expectations.

Ready to get covered in the US?

Tell us about your business and we'll match you with a specialist US cyber insurance broker.

Get a Quote β†’

Last updated: April 2026