RSG Logic · The offering · Cyber Insurance Readiness Audit
Layer 01 · Productized · Fixed fee

Cyber Insurance
Readiness Audit.

Underwriters ask thirty questions on the renewal application. We have the answers — and the evidence pack to prove them. A fixed-scope, fixed-price audit against the ten controls insurers verify, cross-mapped to specific carrier questionnaires so your broker can take the result straight to renewal. Starting at $4,500.

40%
Cyber claims denied
Industry data, 2025
82%
Denials tied to MFA gaps
Industry data, 2025
96%
Carriers requiring MFA
2026 application data
88%
Carriers requiring EDR
2026 application data
01 — Why this audit, why now

An undisclosed gap voids the policy.

The renewal questionnaire isn't a marketing form. It's the document a carrier will point to when they deny a claim. The questions have multiplied year over year, and the controls behind each question have hardened. The good news: the same audit satisfies most carriers, because the underlying controls converge.

01.

Renewals are harder, not easier.

Cyber liability premiums have stabilized, but applications have grown. Most renewal questionnaires now run 25–50 questions, with technical evidence required for nearly every one. A "yes" with no proof is worse than a "no" — it's a defensible denial waiting to happen.

RSG Logic audit findings, 2025–2026
02.

The carrier wants evidence, not assurance.

Underwriters and claims adjusters increasingly require screenshots, configuration exports, policy excerpts, and audit logs to back each application response. "We have MFA" no longer suffices when the carrier needs to see the conditional access policy.

Application requirements · Chubb, Travelers, Coalition, At-Bay, Cowbell
03.

Brokers are stretched. They need a technical partner.

A commercial P&C broker writing cyber liability is rarely a security technologist. When the client can't answer the questionnaire, the broker is left to guess — or to send back blank fields, which the underwriter reads as risk.

Channel observation · Phoenix metro brokers, 2025–2026
02 — What we audit

Ten control domains. Cross-mapped.

The ten domains carriers consistently verify, cross-mapped to specific questionnaires from Chubb, Travelers, Coalition, At-Bay, and Cowbell, and aligned to CIS Controls IG1. Every finding ties back to a specific question on the application you're about to submit.

01.

Multi-Factor Authentication

Email, VPN, RDP, cloud apps, and all administrative accounts. Conditional access verified, enforced, and evidenced.

02.

Endpoint Detection & Response

EDR or MDR coverage across endpoints, alerting policies, response runbook, and proof of active monitoring.

03.

Backup & Recovery

Immutable backups, encryption verification, restore testing cadence, recovery time objectives documented.

04.

Patch Management

Patch cadence, exception handling, end-of-life inventory, and compliance reporting against carrier expectations.

05.

Email Security

Anti-phishing posture, sender authentication (SPF/DKIM/DMARC), attachment sandboxing, user reporting workflow.

06.

Remote Access Hardening

VPN configuration, RDP exposure analysis, jump server posture, third-party remote access controls.

07.

Privileged Access Management

Admin account inventory, separation of duties, just-in-time elevation, service account audit.

08.

Security Awareness Training

Training cadence, phishing simulation results, completion rates, and the evidence trail an underwriter will request.

09.

Incident Response Plan

Written IR plan, tabletop exercise cadence, breach notification workflow, retainer with IR counsel where applicable.

10.

Vendor Risk Management

Third-party inventory, contractual cyber requirements, ongoing posture monitoring of critical vendors.

— The deliverable

The Evidence Pack.

Every audit produces a single, underwriter-ready binder. Not a 60-page PDF nobody reads — a structured document an insurer or broker can open, scan, and use. The cover identifies the engagement. The contents map every finding to the specific questionnaire it answers. The evidence sits next to the finding it proves. The remediation roadmap is prioritized by impact, not by alphabet.

  • 01.
    Cover & engagement metadata
    Scope, dates, methodology, sources of authority. Underwriter reads this first.
  • 02.
    Executive summary
    Posture rating, top three risks, recommended path forward. Board-readable.
  • 03.
    Findings by control domain
    Severity, business impact, carrier-question mapping, recommended remediation.
  • 04.
    Proof Packet (appendix)
    Screenshots, config exports, policy excerpts, audit log samples — the evidence a carrier or claims adjuster will ask for.
  • 05.
    Remediation roadmap
    Prioritized punch list with effort, impact, and ownership. Tied to the three remediation paths.
  • 06.
    Glossary & carrier crosswalk
    Every finding cross-referenced to Chubb, Travelers, Coalition, At-Bay, and Cowbell question numbers.
evidence-pack.pdf · Q2 2026 audit ● 47 pages
RSG Logic · Cyber Insurance Readiness Audit
Evidence Pack · illustrative preview
Prepared for: anonymized SMB · Phoenix metro · 42 endpoints · single location
10 controls CIS IG1 Chubb · Travelers · Coalition At-Bay · Cowbell
Contents
01.Cover & methodology01
02.Executive summary & posture rating03
03.Findings · 10 control domains07
04.Proof Packet · evidence appendix28
05.Prioritized remediation roadmap41
06.Carrier crosswalk & glossary45
Finding 03 · Domain 01 (MFA) High severity
MFA not enforced on legacy mailbox access (IMAP/POP)
Conditional access policy excludes legacy authentication protocols. Two service accounts authenticate via Basic/Legacy without MFA. Carrier-stated requirement: MFA on all email access, no exceptions.
Evidence: Entra sign-in log export 2026-04-12 to 2026-05-12 · 314 successful Basic Auth sessions across 2 service accounts · screenshot of conditional access policy CA-006 with legacy auth carve-out highlighted. Mapped to: Chubb Q14b · Travelers §3.2 · Coalition MFA-2.
Illustrative preview. Real Evidence Packs are scoped to the specific engagement and contain de-identified client data.
03 — How the audit runs

Five steps. Two to three weeks.

Predictable rhythm, scoped before kickoff. You know what we're doing, what we need from you, and what you'll hold at the close.

  1. 01

    Listen

    A 30-minute call. Renewal date, current carrier, recent claim history, the questionnaire that's coming, and a quick read of what's already in place.

    Deliverable
    Plain-English summary + scoped proposal, same day.
  2. 02

    Audit

    We walk the ten control domains across identity, endpoints, network, backups, vendors, training, and documentation. Working sessions with your IT lead. Configuration exports, log samples, policy excerpts collected.

    Deliverable
    Working assessment file · raw evidence captured.
  3. 03

    Synthesize

    Findings packaged into the Evidence Pack: posture rating, control-by-control read, proof appendix, carrier crosswalk, and prioritized remediation roadmap.

    Deliverable
    Evidence Pack draft · ready for review.
  4. 04

    Walk-through

    Live review with your team and (if you'd like) your broker. We translate findings into questionnaire answers, discuss the remediation roadmap, and confirm the three remediation paths.

    Deliverable
    Final Evidence Pack · in your hands.
  5. 05

    Verify (optional)

    After remediation closes, we re-audit against the same standard and produce a delta report — what moved, what improved, what's still open. Optional add-on or bundled with Compliance Care.

    Deliverable
    Delta report · proof the fix is real.
04 — Questions

What people actually ask before they hire us.

The renewal letter raises specific questions. Below are the ones we hear most often. Email support@rsglogic.com if yours isn't here.

Fixed fee, scoped before kickoff. Starting at $4,500 for small environments (up to 25 endpoints, single location). Scales with endpoint count and locations. Custom multi-site environments are quoted after a discovery call. No hourly billing — productized work is fixed-price, full stop.

05 — The guarantee

We carry the risk, not you.

You should not have to wire a five-figure fee to a firm on faith and hope the deliverable does its job. So we structure the engagement so the risk sits with us.

— The performance guarantee

If your underwriter rejects the Evidence Pack as insufficient for the questions it maps to, we revise it free until it is accepted — or we refund the engagement fee in full.

01.

50% on delivery, not up front

Half to start, half only when the Evidence Pack is in your hands and you have reviewed it. You see the work before the second invoice.

02.

15 business days, scoped before kickoff

The Evidence Pack is delivered within 15 business days of kickoff for a standard single-location environment. The date is in the proposal, not a hope.

03.

We pull the evidence

Your team gives us about 90 minutes of access and one interview. We do the configuration exports, the log collection, and the documentation. The audit does not become your staff's second job.

Ready when the underwriter is.

A 30-minute conversation with a senior consultant. Bring the renewal date and (if you have one) the application. You'll leave with a clearer read on what the carrier will accept — and a fixed-fee proposal if it makes sense to engage.