Mapping the coverage of security controls in cyber insurance proposal forms
Jason R. C. Nurse
- Publisher: SpringerOpen
Journal of Internet Services and Applications,
(issn: 1867-4828, eissn: 1869-0238)
Q | Computer engineering. Computer hardware | SANS20 controls | T | Security controls | Business security | ISO/IEC 27000 series | TK5101-6720 | Telecommunication | Cyber insurance | HG | TK7885-7895
Abstract Policy discussions often assume that wider adoption of cyber insurance will promote information security best practice. However, this depends on the process that applicants need to go through to apply for cyber insurance. A typical process would require an applicant to fill out a proposal form, which is a self-assessed questionnaire. In this paper, we examine 24 proposal forms, offered by insurers based in the UK and the US, to determine which security controls are present in the forms. Our aim is to establish whether the collection of security controls mentioned in the analysed forms corresponds to the controls defined in ISO/IEC 27002 and the CIS Critical Security Controls; these two control sets are generally held to be best practice. This work contains a novel research direction as we are the first to systematically analyse cyber insurance proposal forms. Our contributions include evidence regarding the assumption that the insurance industry will promote security best practice. To address the problem of adverse selection, we suggest the number of controls that proposal forms should include to be in alignment with the two information security frameworks. Finally, we discuss the incentives that could lead to this disparity between insurance practice and information security best practice, emphasising the importance of information security economics in studying cyber insurance.