SMBCyberHub - Cybersecurity Compliance Kits for Small Business SMBCyberHub Home

US Cyber Insurance: SMB Requirements Guide

16 Mar 2026

US Cyber Insurance Requirements for Small Businesses

📋 TL;DR Summary

US insurers look for these 5 things before they’ll write or renew a cyber policy:

  1. Multi-factor authentication (MFA) on email, remote access, and admin accounts
  2. Documented security awareness training with completion records for every employee
  3. A written incident response plan that names who does what during a breach
  4. Verified backups tested regularly and stored offsite or in the cloud
  5. Endpoint protection (antivirus/EDR) on every device that touches company data

Missing even one of these can mean a denied application, a coverage gap, or premiums 30–50% higher than necessary. Our compliance kits help you document all five in under an hour.

If you run a small business in the United States, cyber insurance is no longer optional. Clients ask for it. Contracts require it. And if a breach hits, the costs without coverage can shut you down. But getting a policy — or keeping one at a reasonable price — now depends on proving you take security seriously.

This guide is written specifically for US-based small businesses with 1–20 employees. No jargon, no enterprise-level fluff. Just the practical steps you need to satisfy American insurers and protect your business.


🔍 Why US Cyber Insurance Is Different

If you’ve read any EU-focused cyber insurance advice, set it aside for a moment. The American landscape has its own rules.

No Single Federal Framework

The EU has GDPR — one regulation that covers the whole bloc. The US has no equivalent. Instead, you’re dealing with a patchwork of federal laws (HIPAA, FTC Act, GLBA) and state-level regulations that vary wildly. Insurers know this, and they adjust their requirements based on where you operate and what data you handle.

A Litigation-Driven Market

The US leads the world in data breach lawsuits. American insurers price that litigation risk into every policy. That means they scrutinize your security controls more aggressively than their European counterparts. A missing MFA policy or a gap in training records isn’t just a checkbox issue — it’s a liability the insurer has to price.

State Attorneys General Are Active

In the US, state attorneys general can — and do — investigate breaches and levy fines on small businesses. Insurers factor this regulatory exposure into your premiums. The stronger your documentation, the lower your risk profile looks to underwriters.

The Bottom Line

US cyber insurance is shaped by lawsuits, state regulators, and the absence of a single compliance standard. That actually makes documentation more important, not less. If you can show an insurer you’ve done the work, you stand out from the majority of small businesses that can’t.


📋 What US Insurers Actually Ask For

When you apply for or renew a cyber policy in the US, expect a security questionnaire. Here’s what it covers and what you need to provide.

1. MFA Evidence

What they ask: “Is multi-factor authentication enabled on email, remote access, and privileged accounts?”

What you need: Screenshots or admin console reports showing MFA is active. A written policy stating MFA is required for all employees. Most US insurers will flat-out decline coverage if MFA isn’t in place.

2. Security Awareness Training Records

What they ask: “Do all employees receive regular cybersecurity training?”

What you need: Completion rosters with names, dates, and signatures. Quiz or test results showing comprehension. An annual training schedule. See our detailed breakdown in What Insurers Expect in Cybersecurity Training Records.

3. Written Incident Response Plan

What they ask: “Do you have a documented plan for responding to a cyber incident?”

What you need: A step-by-step plan that names specific people, defines their roles, and includes contact information for your insurer, legal counsel, and IT support. The plan should cover containment, investigation, notification, and recovery.

4. Backup Verification

What they ask: “Are critical data backups maintained and tested regularly?”

What you need: Logs showing backup frequency (daily or weekly), evidence of offsite or cloud storage, and records of restoration testing. Insurers want proof your backups actually work — not just that they exist.

5. Endpoint Protection

What they ask: “Is antivirus or endpoint detection and response (EDR) deployed on all devices?”

What you need: A list of devices, the protection software installed on each, and evidence of automatic updates. If employees use personal devices for work, you need a BYOD policy covering security requirements.

6. Written Security Policies

What they ask: “Do you maintain written information security policies?”

What you need: At minimum, an Acceptable Use Policy, a Password Policy, and a Data Protection Policy — all signed by staff. Insurers want to see that rules exist and that employees have acknowledged them.

Not sure where to start with documentation? Our cybersecurity documentation guide for insurance renewals walks through every document step by step.


💰 US Cyber Insurance Costs for Small Businesses

Let’s talk dollars. Here’s what American small businesses are actually paying.

Average Premiums

Business SizeAnnual PremiumTypical Coverage
1–5 employees$1,000–$3,000$1M liability
6–15 employees$2,500–$5,500$1M–$2M liability
16–50 employees$4,000–$7,500$2M–$5M liability

These are ballpark figures for low-to-moderate risk industries. Healthcare, financial services, and businesses handling large volumes of personal data pay more.

What Drives Your Premium Up

  • No MFA — automatic 20–30% surcharge at most carriers
  • No documented training — 15–25% premium increase
  • Prior claims history — can double your premium
  • High-risk industry — healthcare and finance pay 30–60% more
  • Outdated systems — running unsupported software is a red flag

How Documentation Cuts Costs

US businesses with complete security documentation typically pay 20–30% less than those without. Insurers reward proof. If you can hand over an organized packet — policies, training records, MFA evidence, incident response plan — you look like a lower risk. That translates directly to lower premiums.

Our compliance kits are designed to produce exactly the documentation insurers want to see. Most teams complete everything in under an hour.


🔐 State-Level Requirements That Affect Insurance

Because the US lacks a single federal privacy law, state regulations fill the gaps. Where your business operates — or where your customers live — determines which laws apply. These laws directly influence what insurers require from you.

California — CCPA / CPRA

The California Consumer Privacy Act (and its successor, the CPRA) gives California residents broad rights over their personal data. If you have customers in California, insurers expect you to demonstrate data inventory practices, deletion procedures, and consumer request handling.

New York — SHIELD Act

The Stop Hacks and Improve Electronic Data Security Act requires businesses that hold private information on New York residents to implement “reasonable safeguards.” For small businesses, this means written security policies, employee training, and risk assessments — all things insurers also want.

Massachusetts — 201 CMR 17.00

One of the strictest state data protection regulations in the country. It requires a Written Information Security Program (WISP) covering administrative, technical, and physical safeguards. If you do business in Massachusetts, expect your insurer to ask for your WISP.

Other States to Watch

Texas, Virginia, Colorado, and Connecticut have all passed comprehensive privacy laws in recent years. The trend is clear: more states, more requirements, more documentation. Staying ahead of this curve keeps your insurance costs down and your coverage intact.

For a full compliance overview, see our SMB Cybersecurity Compliance Guide.


🎯 Industry-Specific Requirements

Your industry adds another layer of requirements on top of state law. US insurers tailor their questionnaires based on what sector you operate in.

Healthcare — HIPAA

If you handle protected health information (PHI), insurers require evidence of HIPAA compliance: risk assessments, business associate agreements, encryption, access controls, and breach notification procedures. Even a 3-person medical practice needs this documentation.

Financial Services — FTC Safeguards Rule and SOX

The FTC’s updated Safeguards Rule (effective since 2023) requires non-bank financial institutions to implement specific security controls including encryption, MFA, access controls, and a written information security program. Insurers will verify compliance. Publicly traded companies also face Sarbanes-Oxley (SOX) requirements that overlap with cyber insurance expectations.

Defense Contractors — CMMC

If you’re in the Department of Defense supply chain, the Cybersecurity Maturity Model Certification (CMMC) now dictates your minimum security posture. Insurers writing policies for defense contractors will ask about your CMMC level and may require evidence of compliance before offering coverage.

Professional Services — Client Contractual Requirements

Law firms, accounting practices, and consultancies often face cyber insurance requirements written into client contracts. Your clients’ insurers may dictate your minimum coverage levels and security controls. This is increasingly common with enterprise clients requiring vendor security attestations.


🏆 The NIST CSF Connection

Here’s a shortcut that works across almost every US insurer: align your security program with the NIST Cybersecurity Framework (CSF).

Why NIST CSF Matters

NIST CSF isn’t a law — it’s a voluntary framework published by the National Institute of Standards and Technology. But it has become the de facto standard that US insurers reference when evaluating small businesses. If your documentation maps to NIST CSF’s five core functions, you’re covering what insurers want to see:

  1. Identify — Know what data and systems you have (asset inventory, risk assessment)
  2. Protect — Implement safeguards (MFA, training, access controls, encryption)
  3. Detect — Monitor for threats (endpoint protection, log review)
  4. Respond — Have a plan ready (incident response plan, communication procedures)
  5. Recover — Restore operations (backup strategy, business continuity plan)

The Practical Benefit

You don’t need to implement every NIST CSF subcategory. For a small business, covering the basics within each function is enough to satisfy most insurers. The key is having it written down and organized.

Our 2026 Compliance Checklist maps directly to these NIST CSF functions, making it easy to track what you’ve completed.


✅ 30-Day Action Plan: Get Insurance-Ready

Here’s a practical, week-by-week plan to go from “nothing documented” to “ready for underwriting.”

Week 1 — Foundation

  • Download and customize your security policy templates (AUP, password policy, data protection)
  • Enable MFA on all email accounts and admin tools
  • Take screenshots of MFA settings for your evidence file
  • Create a simple asset inventory (devices, software, cloud services)

Week 2 — Training and Documentation

  • Conduct security awareness training for all staff
  • Collect signed completion rosters and quiz results
  • Document your training schedule for the next 12 months
  • Have all employees sign the Acceptable Use Policy

Week 3 — Technical Controls

  • Verify endpoint protection is installed and up to date on every device
  • Confirm backup schedule and run a test restore
  • Document your backup procedures and save the test results
  • Review and document access controls (who has access to what)

Week 4 — Incident Response and Review

  • Write or customize your incident response plan
  • Assign roles (who calls the insurer, who leads containment, who handles communications)
  • Compile all documentation into an organized “insurance packet”
  • Review everything against your insurer’s questionnaire

Need templates for every item on this list? Our compliance kits include policy templates, training materials, quizzes, checklists, and incident response plans — everything in one download.


🔍 Common Mistakes US Businesses Make

❌ Assuming Small Size Means No Requirements

“We’re only 5 people — insurers won’t ask us about security policies.” They will. US insurers now apply the same questionnaire to a 5-person firm that they use for a 50-person one. The documentation expectations don’t scale down just because your team is small.

❌ Not Documenting Training

You ran a training session last quarter. Great. But if there’s no completion roster, no quiz results, and no signed acknowledgments, it didn’t happen as far as your insurer is concerned. Always create a paper trail.

❌ Waiting Until Renewal

The worst time to discover you’re missing documentation is 2 weeks before your policy renews. Start building your evidence file now, even if renewal is months away. It takes the pressure off and gives you time to close gaps. Our cyber insurance renewal checklist can help you plan ahead.

❌ Treating Insurance as a Substitute for Security

A cyber policy doesn’t prevent attacks — it helps you recover from them financially. Insurers know this and will deny claims if they find you had no reasonable security measures in place. The documentation you provide during underwriting becomes the standard you’re held to during a claim.

❌ Ignoring State-Specific Laws

Operating in multiple states means complying with multiple data protection laws. A California CCPA violation that triggers a breach notification might not be covered if your policy excludes regulatory fines in that jurisdiction. Know your state obligations and make sure your coverage matches.


Insurance and Compliance

Checklists and Guides


🎁 Download Your Free Cyber Security Training Kit

Written by the SMBCyberHub Team
Cybersecurity compliance specialists helping US small businesses meet insurer requirements with practical, no-jargon documentation. Our kits are used by 500+ organizations across all 50 states.

Need audit-ready documentation that US insurers actually accept? Training materials, policy templates, incident response plans, and compliance checklists — all in one kit, designed for teams of 1–20.

👉 Download the Free Cyber Security Training Kit


🕒 Estimated Reading Time: 12 minutes 🔐 Aligned With: NIST CSF 2.0, CCPA, SHIELD Act, HIPAA, FTC Safeguards Rule 👥 Team Size: Optimized for 1–20 employees 🎯 Target Audience: US small business owners, office managers, and founders seeking cyber insurance

📋 GDPR Compliance Documentation Kit

Download GDPR-aligned policy templates, staff training records, and audit checklists. Pass your compliance audit with confidence.