Insurers won’t cover you without specific technical controls. Customers won’t work with you without insurance. Regulators fine you if you get breached without proper safeguards.
These are mandatory. A breach costing $500K in 2020 now triggers millions in regulatory fines, contractual penalties, and coverage denials when controls are missing.
Insurance requirements have hardened since 2020. Carriers now demand MFA, EDR, offline backups, and incident response plans. Most companies discover customer and regulatory requirements first. Then they face carrier denial or 5-10x premium costs.
This article maps all three requirement sources. You’ll learn what each demands and how to satisfy all three at once.
Three Requirement Sources
Requirements come layered.
Customers demand it
Enterprise vendors require cyber liability in contracts. Minimum: $1-10M. They want you named additional insured. Some demand SOC 2 Type II or specific coverage forms.
Regulators demand it
Industry and data type determine what. Payment processing? PCI-DSS mandatory. Healthcare? HIPAA Security Rule. California? CCPA/CPRA: $799 per person per incident. Public company? SEC: disclose material incidents on Form 8-K within 4 business days.
Carriers demand MORE
Strictest of all. Carriers know breach data. They know which controls work. They require MFA (non-negotiable), EDR (required, not optional), offline backups, and incident response plans.
Smart companies build to satisfy the strictest source: carriers.
Contractual Requirements: What Your Customers Demand
Contracts carry explicit cyber insurance obligations. These are conditions of business.
Coverage limits.
Standard: $1M-$10M depending on customer size and data sensitivity. Small SaaS: $1-2M. Healthcare/financial for large enterprises: $5-10M. Non-negotiable.
What must be covered.
Data breach response, data restoration, notification expenses, credit monitoring, regulatory investigation support, business interruption. Customers want proof you’ve thought through breach costs.
Additional insured.
Many require you to name them as additional insured. Your policy covers their losses too. Your insurer defends claims from both of you. Some carriers restrict this or charge extra.
Policy form.
Most require “occurrence” over “claims-made.” Occurrence covers incidents during the policy period regardless of when the claim is filed. Claims-made covers claims filed during the period, creating tail risk if you discover a breach six months after the policy ends. Customers demand occurrence or tail agreements in place before expiry.
SOC 2 Type II.
Some customers demand it. Third-party proof your controls meet standards and work over time. Carriers respect it. You get better rates.
NIST or ISO 27001.
Growing requirement. These frameworks aren’t insurance, but insurers recognize and value them.
Incident response plan.
Tested. Security training. MFA. Encryption. These sound like customer demands. They’re insurance demands when you apply.
Non-cancellation clauses.
“Notify us if insurance lapses.” Creates administrative burden. You need notification tracking systems and continuous coverage proof.
Regulatory Requirements: The Government’s Stake in Your Cyber Posture
Regulatory requirements vary by industry and data type. Some are universal. Others are sector-specific.
Public Company Requirements: SEC Disclosure Rules
Public companies face SEC cybersecurity disclosure rules. Material incidents go on Form 8-K within 4 business days. Annual disclosure on Form 10-K Item 106: governance, board oversight, risk management.
No mandate for insurance exists. But the rules create pressure to show comprehensive risk management. Insurance demonstrates it.
The SEC’s disclosure rules shifted the cyber insurance market overnight. Public companies faced a new question: if we’re disclosing cyber incidents to the SEC, do we have coverage for the financial impact? The answer became yes. Regulators and investors expect it.
Healthcare Requirements: HIPAA’s Growing Bite
HIPAA’s Security Rule requires administrative, physical, and technical safeguards for protected health information. No explicit insurance mandate. But penalties drive the decision. Violations: up to $1.5M per violation category per year.
OCR (Office for Civil Rights) enforces aggressively. They investigate breaches, examine security, assess penalties. They also impose corrective action agreements requiring specific security investments. Companies without insurance can’t afford remediation plus penalties at the same time.
Insurance is essential. HIPAA doesn’t require it. Non-compliance costs make it rational.
Payment Processing Requirements: PCI-DSS Obligations
PCI-DSS applies to organizations processing, storing, or transmitting payment card data. Contractual standard imposed by payment networks. Non-compliance: $5K-$100K per month.
No insurance mandate. But PCI requires technical controls carriers also require: cardholder data encryption, security testing, vulnerability scanning, access controls, network segmentation, patch management, incident response.
The intersection is clear: PCI-DSS controls equal insurance requirements. Meet PCI-DSS and you’re more insurable. Fail PCI-DSS and you’re uninsurable at standard rates.
State Privacy Laws: The Multiplying Requirement Problem
State privacy laws fragment requirements by location. California CCPA/CPRA: $107-$799 per person per incident. 100K California residents = $10.7M-$79.9M statutory damages. Notification: 15 days.
January 2026: CPRA imposes cybersecurity audit requirements. You must meet baseline standards.
New York NYDFS 23 NYCRR 500 (financial services): MFA, encryption in transit and at rest, annual risk assessments, incident response plans, annual training. Applies to fintech and processors, not just banks.
Virginia VCDPA, Colorado CPA, Illinois BIPA: each has own timelines. Texas expanded breach notification law. Each adds a regulatory layer.
Multi-state breach? Three different timelines. Three different frameworks. Three different statutory damage regimes. Insurance must cover all of them.
FTC Enforcement: The Catch-All
FTC has broad authority on unfair or deceptive cybersecurity practices. It checks if security matches public claims. Claim encryption but skip implementation? FTC enforcement. Promise training but skip it? FTC action.
FTC settlements (Twitter, Amazon, Meta) impose obligations that require insurance or massive self-insurance. The FTC doesn’t mandate coverage. Enforcement creates the pressure to carry it.
Carrier Underwriting Requirements: What Insurers Need
This is where most companies fail. Carriers are stricter than regulators and customers.
Carriers have claims data. They know which controls prevent breaches. They’ve rebuilt networks after ransomware. They’ve paid forensics and notification costs. They use that data to underwrite. When carriers call a control non-negotiable, they mean it. Missing control = no coverage at any price.
Multi-Factor Authentication: Non-Negotiable
MFA is the line carriers hold. Most won’t cover companies without it on all remote access and administrative accounts.
Carriers paid too many claims for breaches MFA would have stopped. Credential compromise leads every attack vector list. Verizon’s 2025 DBIR shows vulnerability exploitation up 34% and third-party involvement climbing to 30%.
Carriers want MFA on every remote access point: VPNs, cloud apps, remote desktop gateways, admin systems. Time-based tokens or push notifications preferred. SMS acceptable as fallback.
No MFA? Surplus lines rates (non-standard carriers, higher cost) or no coverage at all.
Endpoint Detection and Response: Increasingly Required
EDR has moved from “recommended” to “required.” It provides visibility into endpoint behavior, detects anomalies, and enables rapid response.
Table stakes for any company with more than a handful of employees. Expensive to implement. Cheap compared to the breach costs it prevents.
Some carriers write coverage without EDR but at higher deductibles ($50K vs. $10K) or with sublimits ($1M ransomware cap instead of full coverage). Premium savings rarely justify skipping it.
Email Security and DMARC: Foundational
Carriers expect email security as a baseline. Email filtering, anti-phishing, DMARC.
DMARC authenticates senders, prevents spoofing and phishing. Without DMARC, attackers can email customers from your domain. Carriers won’t cover that.
Email is how most breaches start. Phishing. Compromised accounts. Ransomware attachments. Carriers require email security as a coverage condition.
Backup Protocols: The 3-2-1 Rule and Beyond
Carriers require the 3-2-1 rule: three data copies, two media types, one offline and removed from the production network.
This emerged from ransomware claims. Attackers encrypt everything, including network-connected backups. No offline backups means the company is destroyed, pays ransom, and the carrier pays the claim.
Offline backups must be immutable (can’t be modified or deleted by anyone, including admins). This prevents attackers from corrupting them.
Sensitive data organizations face stricter rules: backups geographically dispersed, different jurisdictions, strict access controls. Expensive and complex. But carriers won’t cover shortcuts.
Patch Management: Structured, Documented, and Cadenced
Carriers require documented patch management with defined timelines:
Critical patches: 15 days of release. High-priority: 30 days. Standard: 90 days.
This is a requirement, not a suggestion. Carriers ask during underwriting. Can’t commit? Declined or higher deductibles.
Simple in theory. Hard when you run 5K servers, 10K endpoints, and apps break when you patch the OS. Many claim 30-day patch cycles but miss the mark. Carriers ask for proof: logs, compliance reports, exception documentation.
Employee Security Training: Required, Documented, Annual
Carriers require annual security awareness training for all employees. Real training with quizzes, attestations, and documented completion rates.
Trained employees click fewer malicious links, report suspicious activity, use stronger passwords, and enable MFA. Training costs almost nothing compared to breach costs prevented.
Carriers want proof: completion rates, test scores, attestations. Evidence employees understood the material.
Incident Response Plan: Written, Tested, Current
Carriers require written incident response plans. A real document with roles, responsibilities, notification procedures, vendor contacts, and recovery procedures.
Better: tested plans. Tabletop exercises walk through scenarios, identify gaps, and update the plan.
Must cover: ransomware, data breach, outages, supply chain incidents, insider threats. Must identify vendors: forensics, counsel, notification.
Companies without plans struggle. They make mistakes. They notify wrong people. They engage forensics late. Carriers require documented plans for a reason.
Privileged Access Management: Controlling the Keys
Carriers increasingly require PAM systems for organizations with dedicated IT staff or complex infrastructure. PAM controls admin access, requires MFA for privileged actions, and logs all activity.
Mandatory when you have more than a handful of IT staff. One compromised admin account is a network-wide breach entry point.
Carriers want credentials vaulted, access temporary and time-limited, all actions logged and reviewed. Especially for sensitive data or critical infrastructure.
Requirements by Industry: The Sector-Specific Picture
Requirements vary by industry. Regulators and customers have different expectations for each.
Healthcare: The Strictest Environment
Perfect storm: HIPAA baseline, state privacy constraints, enterprise SOC 2 demands, high insurance requirements.
Carriers apply higher standards: backup protocols, access controls, incident response. Minimum: dedicated IT staff with background checks, segregated clinical networks, documented change control, $5M insurance limits.
Healthcare breaches are expensive. They affect patient safety. They trigger investigations. Carriers price accordingly and write cautiously.
Financial Services: Regulatory Scrutiny and High Limits
Regulatory scrutiny is intense: federal and state regulators, examiners reviewing cyber insurance, customer contracts demanding $5-10M coverage.
Banks and credit unions face federal banking regulator expectations. Non-banks face state regulators. Fintech faces stricter requirements (regulators view them as less mature).
Carriers demand comprehensive security aligned to regulatory expectations. NIST alignment. MFA non-negotiable. EDR required. Incident response documented and tested.
Rates reflect risk. Expensive. Higher deductibles. Carriers scrutinize applicants carefully.
Technology and SaaS: Vendor-Driven Requirements
Different structure. Customers (other businesses) impose contractual security requirements. Insurance flows from customer expectations.
Typical SaaS contracts require SOC 2 Type II, $2-5M cyber liability, named additional insured, specific encryption and access controls.
Carriers view SaaS favorably. Security-conscious teams that understand risk. Better rates and more flexibility than traditional businesses.
SaaS companies face tight vulnerability deadlines. Responsible disclosure requires fast fixes. Carriers expect and reward this.
Retail and E-commerce: Payment Processing and Breach Costs
PCI-DSS if they process payments. Breach notification if they store customer data. High notification costs if a breach hits thousands of customers.
Carriers require PCI-DSS compliance baseline, EDR, email security, documented backup protocols, and incident response plans accounting for high notification volume.
Large transaction volumes drive the highest insurance costs. A breach hitting millions of customer records creates enormous notification and credit monitoring costs.
Professional Services: Client Data and Contracts
Handle sensitive client information. Clients demand high limits ($5-10M), additional insured status, specific policy forms.
Carriers treat this as medium risk. Professional service firms aren’t state-sponsored targets. But they’re targets for cybercriminals seeking client data, IP, and extortion leverage.
Requirements: access controls, client data segregation, incident response capabilities.
How Requirements Have Tightened Since 2020
2020: Requirements light. Rates low. Coverage simpler.
2020-2022: Ransomware surge. Carriers paid massive claims. Ransoms exceeded limits. They learned: many organizations had zero basic controls.
Response: requirements hardened fast.
2020: MFA recommended. 2025: required for all remote access. EDR: nice-to-have became required. Backups: assumed became prove-it-with-documentation.
2020: minimal security got you covered. 2025: no security program makes you uninsurable.
This reflects underwriting discipline. Carriers can’t write profitable cyber insurance covering uncontrolled organizations. Rates for well-controlled companies stayed competitive. Rates for poorly-controlled companies became prohibitive.
Companies that didn’t upgrade from 2020-2023 are now uninsurable or paying 5-10x old rates.
Get Your Cyber Requirements Gap Review
Meeting carrier, regulatory, and contractual requirements at the same time takes a map of what you have, what’s missing, and what’s achievable in the next renewal cycle. Alliance Risk reviews your controls against market requirements and places your risk with carriers that specialize in cyber liability, delivering proposals in a few business days.
What We Need for Your Quote:
- Company revenue, industry, and regulatory footprint (HIPAA, PCI, NYDFS, GDPR, state privacy)
- Current security controls: MFA, EDR, email security, backup strategy, patch cadence, PAM
- Incident response plan status (written, tested, current)
- Compliance certifications (SOC 2, ISO 27001) and customer contractual requirements
- Current cyber coverage, limits, and prior declinations or sub-limited ransomware
- 5-year claims and incident history
Schedule a Consultation:
Speak with a cyber specialist about your requirements gaps at no cost.
Policy Review:
Already have coverage? We’ll review your existing policy at no charge, flagging control gaps that jeopardize renewal, sublimits below contract minimums, and exclusions that conflict with regulator expectations.
Request a Quote:
Complete our online form or contact us directly to begin the quote process.
Want coverage that satisfies carriers, regulators, and customers at once? Let’s talk. Alliance Risk: your specialized partner for cyber liability insurance.


