How to document security awareness training for a cyber insurance questionnaire

How to document security awareness training for a cyber insurance questionnaire

Cyber insurance carriers require documented security awareness training. Here's what underwriters look for — and what most SAT platforms don't give you by default.

The cyber insurance market shifted hard between 2021 and 2023. Underwriting tightened, premiums jumped, and many organizations encountered security awareness training documentation requirements for the first time — not because of HIPAA, SOC 2, or any federal regulation, but because their cyber insurance carrier started requiring it.

That's the email landing on a Tuesday morning. Your MSP client is facing their annual cyber insurance renewal in 45 days. The underwriter just sent the new supplementary questionnaire. Right near the top of the form is a demand for complete documentation of the organization's security awareness training and phishing simulation program.

You know the client's employees completed the training modules. Proving it to a claims adjuster or underwriter is another story. You are staring at hours of manual data extraction just to build a cohesive timeline. The stakes are real. Missing documentation during underwriting leads directly to denied coverage or severe premium increases. Missing documentation after a breach leads to a denied claim.

This post covers what cyber insurance carriers expect for security awareness training documentation, what underwriters look for when they ask for it, and what most SAT platforms don't give you by default.

What cyber insurance carriers expect from your security awareness training program

Unlike federal frameworks, there is no single regulatory anchor for cyber insurance. Cyber insurance underwriting is driven entirely by carrier questionnaires that vary heavily by carrier and policy tier. Major carriers whose training-related questions shape industry practice include Chubb, Travelers, Coalition, Beazley, AIG, and Hiscox.

Carrier expectations apply to all workforce members who use organizational systems or have access to sensitive data. If an individual can touch the network, the underwriter expects them to be trained.

Frequency expectations have accelerated. Annual training is the floor. Quarterly training or continuous micro-learning is increasingly the baseline expectation for mid-market and larger policies. Furthermore, active phishing simulation programs are now explicitly required by most carriers at mid-market tiers and above. An annual training video alone is often insufficient for underwriting.

Content requirements are highly specific. Training programs must cover current threat vectors. Since 2022, carriers increasingly expect explicit coverage of AI phishing, business email compromise (BEC), smishing, and social engineering.

Documentation retention must be aligned to the specific policy retention requirements. This is typically three to seven years, but it varies by carrier and policy.

Review periods are rigid. Organizations face annual renewal questionnaires. Mid-cycle reviews are also routinely triggered by claims, loss ratio issues, or significant organizational changes.

What underwriters and claims adjusters actually look for

When a cyber insurance underwriter or claims adjuster evaluates your training program, they are calculating risk. They do not want verbal assurances. They execute a formal review protocol to determine if the organization is actually insurable. They want hard evidence.

First, they look for evidence of the program itself. This means reviewing the written cybersecurity policy. They cross-reference the required underwriting controls against the actual training curriculum. If the carrier explicitly requires business email compromise training, the underwriter expects to see a curriculum that explicitly addresses BEC.

Next, they demand per-person records. An underwriter or post-breach investigator will request a directory roster of everyone with access to the organization's systems. They will demand corresponding training logs. They are looking for strict scope coverage. If a temporary contractor was granted access in May, the adjuster wants the exact date their initial training was completed.

They also demand cadence evidence. Carriers want to see a timeline of continuous engagement. They look for ongoing phishing simulations distributed consistently across the policy period, proving the training adapts to new threats as required by the underwriting terms.

Finally, they look at the response to identified issues. If an employee consistently falls for simulated phishing attacks, the underwriter wants to see the documented follow-up. Recording the failure is not enough. They want evidence of the specific remedial training triggered by that failure. They need proof the program actively mitigates human risk.

What most SAT platforms give you by default

The security awareness training category produces massive amounts of data. It rarely produces evidence. Most SAT platforms function simply as campaign distribution tools.

They output raw completion reports. They show per-campaign phishing results, isolating exactly who failed a test on a given Thursday. They build dashboard dials with aggregate percentages showing high-level organizational risk.

For an MSP operator trying to satisfy an underwriter, this is raw material. It requires significant manual labor to become actual evidence. Building campaigns, chasing learners, pulling reports.

What these platforms typically do not produce in an audit-ready format are framework-mapped reports specific to cyber insurance requirements. They lack evidence bundles that neatly combine a user's initial training, their ongoing phishing simulation performance, and their policy acknowledgements into a single chronological timeline. They do not generate date-range-scoped exports that cleanly match the specific policy renewal window.

Instead, you get manual reconciliation. You export a CSV from the directory service. You export another CSV from the training platform. You run VLOOKUPs to identify missing users. You manually filter out activity that occurred outside the policy period. You reconcile the workforce roster against the completion logs by hand just to prove no one slipped through the cracks.

The platform logs the activity. You carry the burden of proving compliance.

The final output is a fragile spreadsheet. It lacks the integrity-hashed PDF artifacts claims adjusters prefer to verify the data hasn't been modified post-export.

Your cyber insurance training documentation checklist

To get through a cyber insurance renewal without wasting days on manual data formatting, your evidence must be precise and organized. Build your documentation bundle using this scannable checklist.

Per-person records:

  • Full legal name and employee ID

  • Organizational role or title

  • Official hire date or system access date

  • Training completions with exact dates and timestamps

  • Content mapping (explicitly tying modules to AI phishing, BEC, smishing, and social engineering)

  • Information security policy acknowledgements with signature dates

  • Refresher evidence (timestamps for ongoing phishing simulations and continuous micro-learning)

  • Response to identified needs (remedial training dates triggered by simulation failures)

Program-level artifacts:

  • Written information security policy

  • Scope statement defining all workforce members with system access

  • Complete curriculum overview mapping back to the carrier's specific underwriting questionnaire

  • Audit protocol compliance evidence showing training occurred within the required intervals

Retention:

  • Maintain all listed records for the duration of the policy retention requirements (typically 3-7 years), securely stored and readily accessible for underwriter or claims adjuster review.

Modern managed SAT platforms can generate this documentation automatically. Kinds, for example, produces cyber insurance-mapped PDF reports scoped by date range and workforce selection, with SHA-256 integrity hashes embedded in the footer so underwriters and claims adjusters can verify the report hasn't been modified. But whatever platform you use, the checklist above is what your documentation should include. If your current platform can't produce this without manual reconciliation, you have a documentation problem, not a training problem.

Related Frameworks

For related guidance, see our posts on PCI DSS and NYDFS Part 500.

This post describes general patterns in cyber insurance training documentation. It is not legal or compliance advice. Confirm specific obligations with your compliance advisor, broker, or relevant carrier.

Always automated.
Nothing to manage.

Leave Training & Simulated Phishing to us.

Leave Training & Simulated Phishing to us.

Always automated.
Nothing to manage.

Leave Training & Simulated Phishing to us.

Always automated.
Nothing to manage.

Leave Training & Simulated Phishing to us.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.