IR 2.0 Framework · v0.1.0
DOCUMENT 03 / 05 · THE GAP ASSESSMENT

The
Insurability
Cheat‑Code.

A practical map for cyber-insurance readiness and a credible IR program.

Many cyber-insurance applications now probe controls directly. Their questions can serve as a practical gap-assessment input for incident-response readiness. Based on cyber-insurance applications we have reviewed, this document distills what we call the Big 7 baseline controls, the enhanced controls underwriters commonly ask about, and a five-minute self-assessment that helps you see where you stand on those controls.

SeriesIR 2.0
Document03 of 05
Version0.1.0 · 2026
LicenseCC BY 4.0

This framework supports resilience, evidence, and readiness. It does not certify compliance, guarantee security, or guarantee cyber-insurance eligibility. It is not a substitute for professional legal, regulatory, or insurance advice.

03 / Insurability
Why this matters

The application is the audit. Treat every "No" answer as a project.

Based on cyber-insurance applications we have reviewed, the questions below represent the baseline controls most underwriters ask about before quoting. In our experience, missing one of what we call the Big 7 often leads to denial or a less favorable quote — outcomes vary by carrier, industry, and broker. Stacking the enhanced controls strengthens the application conversation.

01

Written Information Security Program

Documented policies covering data classification, access control, incident response, and acceptable use. Reviewed annually.

02

Tested Incident Response Plan

Written IR plan with defined roles, escalation paths, and communication templates. Tabletop-tested within the last 12 months.

03

Multi-Factor Authentication

MFA enabled on all remote access, email, privileged accounts, cloud admin consoles, and VPN. Aim for 100% coverage.

04

Endpoint Detection & Response

EDR deployed on every workstation and server. Actively monitored. Alerts reviewed within 24 hours.

05

Offline, Immutable Backups

Backups stored offline or air-gapped. Immutable — cannot be modified or deleted. Tested restoration within last 90 days.

06

Documented Patch Management

Critical patches applied within 30 days. Compliance tracking evidenced. Vulnerability scanning performed regularly.

07

Formal Employee Training

Security-awareness training for all employees. Phishing simulations conducted on a defined cadence. Training records maintained for the audit trail.

IR 2.0 · The Insurability Cheat Code v0.1.0 · © 2026 Deretti Cyber Labs · CC BY 4.0 02
03 / Insurability
Enhanced controls

Controls underwriters commonly ask about beyond the baseline.

These are not part of the baseline Big 7. Based on cyber-insurance applications we have reviewed, they are controls underwriters commonly ask about as evidence of mature architecture and program discipline. Stack them deliberately; document them aggressively. Specific underwriter responses vary by carrier, industry, and broker.

ControlUnderwriter impact
Network segmentationLimits blast radius. Critical systems isolated. Demonstrates mature architecture.
Privileged access managementVaulted credentials, just-in-time access, session recording. Major differentiator.
24/7 security monitoringIn-house SOC or MDR service. Shows proactive detection capability.
Email security gatewayAdvanced threat protection, sandboxing, URL rewriting. Addresses the #1 attack vector.
Vendor risk managementThird-party assessments, contract requirements, ongoing monitoring.
Data loss preventionPrevents sensitive data exfiltration. Important for regulated industries.
Self-assessment

Count your "Yes" answers from the Big 7.

0 – 3 CONTROLS
Significant gaps

In our experience, application conversations at this level are difficult — outcomes range from declined to onerous quote terms. Treat the missing controls as a 90-day plan.

4 – 5 CONTROLS
Notable gaps

Application conversations possible, often with exclusions in our experience. Close the gaps before renewal.

6 – 7 CONTROLS
Application-ready

Strong position for application conversations. Stack the enhanced controls to strengthen the picture.

Treat cyber-insurance applications as a practical gap-assessment input. Use them.

IR 2.0 · The Insurability Cheat Code v0.1.0 · © 2026 Deretti Cyber Labs · CC BY 4.0 03