Broker / Security teamProof / BOFU

What counts as acceptable MFA evidence for cyber insurance

Understand what MFA evidence cyber insurers accept. Learn platform requirements, enrollment proof, and common rejection reasons.

Overview

Cyber insurers require evidence that multifactor authentication (MFA) is enforced across all users and cannot be bypassed. Acceptable evidence typically includes screenshots of Entra ID (formerly Azure AD) Conditional Access policies showing MFA required for all users and cloud applications, Okta admin console settings documenting MFA enforcement, Cisco Duo policy enforcement screenshots, or Google Workspace 2-Step Verification reports. Underwriters request enrollment reports, usage statistics, and documentation that MFA cannot be disabled by end users. Common insufficient evidence includes password manager MFA (considered weaker than native platform MFA), MFA enabled for some users but not all, and attestations without supporting screenshots. Requirements often mandate 100% user adoption with documented proof of active enforcement.

Key Facts

  • Acceptable evidence: Entra ID Conditional Access showing MFA required for all users and cloud apps.
    Source: BindLedger Research
  • Acceptable evidence: Okta or Cisco Duo policy enforcement screenshots with full user coverage.
    Source: BindLedger Research
  • Insufficient evidence: Password manager MFA, partial MFA (some users only), unenforceable MFA.
    Source: BindLedger Research
  • Required supporting documentation: Enrollment reports, usage statistics, evidence that users cannot disable MFA.
    Source: BindLedger Research

How it Works Today

Current Manual Process

Brokers request MFA policy screenshots from IT/security team, manually compile enrollment and usage reports, compile into email or PDF, submit to underwriter.

Friction Points

Non-standardized evidence format; unclear exactly what platforms/configurations underwriters will accept; manual gathering of enrollment/usage reports; no way to prove policies have not changed since screenshot was taken.

Ideal Output

Structured MFA compliance attestation with platform, policy rules, user enrollment count, last-active timestamp, and API-queryable enforcement status.

BindLedger Tool Handoff

Ready to streamline this workflow?

Use Evidence Room

Use Evidence Room

Related Answers

Sources

Underwriters require enrollment reports, usage statistics, and evidence that MFA cannot be disabled by end users.

Cyber insurers typically require 100% user adoption with documented proof of active MFA usage across your organization.

Password manager MFA is considered weaker than native platform MFA and is often insufficient for cyber insurance.