02 — What we audit
Ten control domains. Cross-mapped.
The ten domains carriers consistently verify, cross-mapped to specific
questionnaires from Chubb, Travelers, Coalition, At-Bay, and Cowbell, and aligned to
CIS Controls IG1. Every finding ties back to a specific question on the application
you're about to submit.
01.
Multi-Factor Authentication
Email, VPN, RDP, cloud apps, and all administrative accounts. Conditional access verified, enforced, and evidenced.
02.
Endpoint Detection & Response
EDR or MDR coverage across endpoints, alerting policies, response runbook, and proof of active monitoring.
03.
Backup & Recovery
Immutable backups, encryption verification, restore testing cadence, recovery time objectives documented.
04.
Patch Management
Patch cadence, exception handling, end-of-life inventory, and compliance reporting against carrier expectations.
05.
Email Security
Anti-phishing posture, sender authentication (SPF/DKIM/DMARC), attachment sandboxing, user reporting workflow.
06.
Remote Access Hardening
VPN configuration, RDP exposure analysis, jump server posture, third-party remote access controls.
07.
Privileged Access Management
Admin account inventory, separation of duties, just-in-time elevation, service account audit.
08.
Security Awareness Training
Training cadence, phishing simulation results, completion rates, and the evidence trail an underwriter will request.
09.
Incident Response Plan
Written IR plan, tabletop exercise cadence, breach notification workflow, retainer with IR counsel where applicable.
10.
Vendor Risk Management
Third-party inventory, contractual cyber requirements, ongoing posture monitoring of critical vendors.