What your cyber insurance application is actually asking

Your broker sent you the renewal questionnaire last week. It's longer than last year's. Multi-factor authentication. Backup verification. User access reviews. Vendor management. Incident response. Each question expects a yes-or-no answer with documentation behind it. You're not sure what counts as a good answer.

The structure of these applications has been converging for a few years. Different carriers ask in different orders and use different phrasings, but most of the questions fall into three categories. Once you can see the categories, the application stops looking like a wall of unrelated questions and starts looking like an organized risk assessment. That makes it easier to answer well.

The three categories

The questions break down into technical controls, process controls, and governance controls. The categories build on each other: technical controls are what your IT systems are doing, process controls are what your people are doing on a recurring basis, and governance controls are what your business has committed to in writing. A carrier evaluating your renewal is checking all three layers.

Technical controls: what your IT systems are doing

This is the category most applications start with, and it tends to be the most concrete. The questions test whether specific technical safeguards are actually running in your environment.

The questions in this category are usually some version of: do you enforce multi-factor authentication on email and other critical systems; do you run regular backups and have you verified that those backups can actually restore data; do you patch your operating systems and applications on a defined cadence; do you have endpoint protection on your workstations and servers; do you encrypt sensitive data at rest and in transit.

A credible answer is "yes, here's what we're doing." Multi-factor authentication enforced on email, cloud storage, and financial systems. Backups verified within the last quarter. Patches applied within thirty days of release for critical updates. Endpoint protection deployed and centrally managed. Encryption configured for the data classes that warrant it. The specifics matter more than the yes. An underwriter who sees "yes, MFA enforced via Microsoft Entra Conditional Access (or your platform's equivalent in Google Workspace, Okta, or similar) on all users with phishing-resistant methods" reads a substantially different risk than one who sees "yes."

What if the answer is no? An honest "no" with a remediation plan is sometimes acceptable, especially for renewals where you're showing year-over-year improvement. A "no" with no remediation plan signals that the gap isn't being managed. A "yes" that you can't document is the worst of the three: it sets up the carrier to deny a claim later because the gap was misrepresented at underwriting.

Process controls: what your people are doing on a recurring basis

The second category tests whether you're operationalizing your security, not just installing tools. The questions are usually about recurring activities: do you review user access on a regular cadence; do you train employees on security awareness; do you run phishing simulations; do you tier your vendors by risk and review the high-risk ones annually; do you have a documented process for handling security incidents.

The recurring-cadence framing is the key. Carriers know that any business can claim to "do" any of these once. The question is whether the activity is happening reliably. A quarterly access review that actually happens quarterly is worth more than an annual review that happens whenever someone remembers. A phishing simulation program running every quarter for two years generates evidence that a one-time simulation does not.

What underwriters are testing for here is operational maturity. The technical controls might be in place but unreliable; the process controls are what make the technical controls trustworthy over time. An access control system without a recurring review process is just a snapshot of last year's decisions. An incident response policy without a tabletop exercise is just a document.

A credible answer in this category names the cadence and the evidence. "User access reviewed quarterly, last review March 2026, findings documented." "Phishing simulations run quarterly via [your platform], current click rate 3 percent and trending down." "Vendor risk tiered annually; high-risk vendors reviewed annually with security questionnaires; current vendor list 47 vendors, 8 tiered high-risk." That kind of answer reads as a working program, not a hypothetical one.

Governance controls: what your business has committed to in writing

The third category tests whether your business has formal commitments backing the technical and process controls. The questions are about policies, named responsibility, and documented programs: do you have a written information security policy; is there a named security coordinator or equivalent role; do you have an incident response plan; do you have a documented data classification scheme; do you have a documented vendor management program.

This category is where small businesses most often struggle. Technical controls can be bought. Process controls can be implemented. Written commitments require someone to actually write them. The carrier is checking for evidence that the business has thought about security as a program, not just as a series of one-off purchases.

A credible answer in this category points to the document. "Information Security Policy adopted by ownership, last reviewed January 2026, signed by [owner name]." "Incident Response Policy in place, tested via tabletop exercise in Q4 2025." "Data Classification Policy adopted, four classification levels defined, employees acknowledged the policy at onboarding."

The governance layer is also what survives staff turnover. The technical controls might be running because your IT person knows how to run them; the governance documentation is what lets the next person continue the program when that IT person leaves. Carriers know this; they're partly underwriting your succession risk.

Why a documented "yes" is worth substantially more than an undocumented one

The pattern across all three categories is the same: the documented answer outperforms the undocumented one by a wide margin. A few reasons.

First, an underwriter can't take an undocumented answer at face value. They're paid to assume that "yes" without evidence might be "no" or "sometimes" or "we used to but we're not sure anymore." A documented answer reduces that uncertainty.

Second, a documented answer becomes evidence at claim time. If an incident happens and the carrier investigates, they'll ask for the documentation supporting the underwriting answers. A business that documented its controls is in a substantially better claim position than one that didn't. Misrepresentation at underwriting can void coverage; honest documentation is the defense against that.

Third, documentation forces clarity. Most businesses that can't document their controls also can't honestly verify whether the controls are working. The act of documenting a control surfaces gaps that the business didn't know it had. That's a separate benefit from the underwriting itself.

What this means practically

When you're filling out the application, the answers come from three layers of your business. The technical answers come from whoever runs your IT (internal or outsourced). The process answers come from whoever owns the recurring security work (probably the same person, or the operations lead). The governance answers come from whoever signed the policies (usually the owner or a named coordinator).

If you have all three layers in place and documented, the application is mostly transcription. If you have technical controls but no process or governance layer, the application surfaces the gap before the carrier does. Either outcome is better than guessing.


If you'd rather not assemble the answers from scratch every renewal year, TACSOP includes a Cyber Insurance Application Cheat Sheet with pre-populated answers to the most common questions in each of the three categories, drawn from the kit's policies, procedures, and operational evidence. The kit is here.