The New Reality

The questionnaire got harder. Most firms are not ready.

A few years ago, cyber insurance applications asked whether you had antivirus and backups. Check two boxes, get a policy.

That era is over. Carriers have paid out enough claims to know exactly which controls were missing when breaches happened. The questionnaires now reflect that knowledge. They ask about specific Microsoft 365 settings. They ask about MFA enforcement methods. They ask about privileged account controls and email authentication records.

When I work with law firms and CPA practices around Austin, this is where the renewal conversation falls apart. The managing partner gets a 12-page questionnaire, sends it to their IT person, and nobody actually knows the answer to half the questions. They guess. Sometimes they guess wrong.

Why this matters beyond the premium

If you answer a questionnaire inaccurately and then file a claim, the carrier will investigate your actual environment at the time of the policy. Misrepresentation, even unintentional, can be grounds for denial. You need to know the true answers.

The MFA Question

MFA is table stakes. But carriers want to know which kind.

Almost every questionnaire asks whether you have multi-factor authentication enabled. That is no longer sufficient as a question or as an answer.

What underwriters actually want to know now is whether you have MFA enforced for all users (not just enabled), whether that includes administrative accounts, and whether you are using phishing-resistant MFA such as Microsoft Authenticator with number matching, passkeys, or hardware tokens.

SMS-based MFA still counts, but several carriers are now explicitly distinguishing it from app-based or hardware-based methods when setting premiums. Some are beginning to exclude SMS from their definition of compliant MFA entirely.

What the right answer looks like

MFA enforced via Conditional Access, not just enabled per-user Per-user MFA can be bypassed in ways that Conditional Access policies prevent. Carriers are starting to ask which method you use.
MFA required for all users with no exceptions A single account without MFA is an open door. Carriers want to see 100% enforcement, or a documented exception process for edge cases.
Admin accounts using phishing-resistant methods Global administrator accounts should use the Microsoft Authenticator app with number matching enabled, or hardware security keys. Not SMS.
Email Authentication

SPF, DKIM, and DMARC. Carriers now ask about all three.

Email authentication records are DNS settings that tell the world which servers are allowed to send email on your behalf. They also give receiving mail servers instructions on what to do with email that fails those checks.

Law firms and title companies are high-value targets for business email compromise. A criminal impersonates your domain, sends a wire transfer instruction to a client, and the client pays. Email authentication makes that significantly harder to pull off convincingly.

Carriers know this. Many questionnaires now ask specifically whether you have SPF, DKIM, and DMARC records configured, and what your DMARC policy is set to. The answers carriers want are as follows.

A DMARC policy set to "none" is better than nothing, but carriers distinguish between monitoring mode and enforcement mode. If you are still in "none" at renewal, expect questions.

Privileged Access

Who has admin access, and do you actually know?

This is the question that exposes most small firms. Underwriters are asking about privileged access controls because compromised administrator accounts are responsible for the most expensive claims.

The specific questions vary by carrier, but the themes are consistent. How many accounts have Global Administrator rights in Microsoft 365? Are those admin accounts used for day-to-day work or only for administrative tasks? Are you using Privileged Identity Management to require just-in-time elevation for admin tasks?

When I run assessments, I routinely find firms where every person in IT (or their IT vendor) has standing Global Admin access. Sometimes the owner has a Global Admin account they use to check email. Both are problems that carriers are now looking for.

The benchmark underwriters reference

Microsoft's own guidance recommends no more than five Global Administrator accounts for most organizations, with those accounts used only for admin tasks and not for daily email or productivity work. Having a dedicated admin account separate from your regular user account is a basic control that carriers expect.

Backup and Recovery

Microsoft 365 is not a backup. Carriers know this now.

This is still a common misconception. Microsoft 365 keeps your data available and provides some limited recovery options, but it does not replace a backup solution. Microsoft's own service agreement makes this clear.

Cyber insurance questionnaires now ask specifically whether you have a backup solution separate from your primary Microsoft 365 tenant, how frequently backups run, how long backups are retained, and whether you have tested restoration. The testing question catches most firms.

Endpoint and Identity

Endpoint detection and legacy protocol questions.

Carriers are asking whether you have endpoint detection and response (EDR) on all devices, not just traditional antivirus. Microsoft Defender for Business, included in Microsoft 365 Business Premium, qualifies. Basic antivirus alone is increasingly insufficient for favorable terms.

The legacy authentication protocol question is one firms consistently struggle with. Legacy protocols such as Basic Authentication allow connections to Exchange Online without MFA, regardless of your Conditional Access policies. Microsoft disabled Basic Auth for most services in 2022, but legacy authentication can still be re-enabled or may be active in older tenant configurations. Carriers are asking whether legacy authentication is blocked. The correct answer is yes, and you should be able to verify it in your Conditional Access policies or through the Entra ID sign-in logs.

Documentation

The documentation question is not about paperwork.

Several questionnaires now ask whether you have a written information security policy, an incident response plan, and a vendor management process. For a 10-person law firm, this sounds like enterprise overhead.

It is not. What carriers want to see is evidence that you have thought about these things before an incident. A one-page incident response plan that covers who to call, who is responsible for what, and what the first 24 hours look like is infinitely better than nothing.

Carriers are also asking about security awareness training. Did employees receive training in the past 12 months? Do you have records of it? Phishing simulation is not required but noted favorably.

The firms that get the best terms are not the ones with the most technology. They are the ones who can answer every question with documented evidence.

The Practical Path

What to do before your next renewal.

Do not wait for the questionnaire to arrive. Pull last year's questionnaire now and go through it with your IT provider. For every question you cannot confidently answer, you have identified a gap that needs to close before renewal.

The specific items to verify in your Microsoft 365 environment are as follows.

If your IT provider cannot help you verify these items or does not know the answers, that is useful information about both your security posture and your IT relationship.

Not sure how your M365 environment stacks up?

A Lowery Solutions security assessment covers every item carriers are asking about, with findings documented and ready for your renewal questionnaire.

Get a Security Assessment

Built for Austin law firms, CPA practices, and title companies.