Skip to main content
All Insights
M&A Due Diligence·8 min read·

Cybersecurity Due Diligence for M&A: A Practitioner's Framework

By Dritan Saliovski

Cybersecurity due diligence in M&A has evolved through three generations - from IT audit checkbox to compliance framework to the risk-based, quantitative value protection model that now determines deal outcomes. This practitioner's framework covers the eight assessment domains, three-tier investment structure, and Expected Annual Loss methodology that PE firms and corporate acquirers use to make defensible investment decisions.

Key Takeaways

  • An eight-domain framework - governance, infrastructure, applications, data protection, identity, incident response, third-party risk, and compliance - provides complete coverage for middle-market M&A cybersecurity assessment
  • Three-tier investment structure optimizes ROI: pre-LOI screening ($5K-15K, 24-72 hours) eliminates deal-breakers; comprehensive assessment ($50K-150K, 3-4 weeks) informs valuation and structure; post-close monitoring ($15K-30K annually) protects value through the hold period
  • Expected Annual Loss (EAL) - breach probability × expected impact across identified scenarios - translates technical findings into the $2-8M financial risk figures that drive purchase price adjustments and holdback sizing
  • Technical assessment uncovers 65-75% of material findings that document-only review misses: vulnerability scanning, configuration analysis, and architecture review reveal risks invisible in management-prepared documentation
  • Industry-specific requirements vary significantly: healthcare requires HIPAA and medical device security focus; financial services demands regulatory examination review; SaaS requires SOC 2 and multi-tenancy assessment; manufacturing requires OT/IT segmentation evaluation

How the Assessment Has Evolved

Third-generation cybersecurity due diligence differs fundamentally from its predecessors. The defining feature is quantification - translating technical findings into financial figures that inform valuation models and deal structure.

GenerationPeriodApproachPrimary Limitation
First2000-2010IT audit checklistNo financial quantification; treated as IT-only issue
Second2010-2018Compliance-focusedFramework coverage without deal integration
Third2018-presentRisk-based value protectionQuantitative, deal-integrated, board-level visibility
Fourth (emerging)2024+AI-enhanced intelligenceContinuous pipeline monitoring; predictive risk modeling

Without quantification, even technically excellent diligence fails to influence deal outcomes. A report identifying 312 vulnerabilities is not actionable. A report translating those vulnerabilities into a $3.2M expected annual loss that drives a $4M holdback is.

The Eight Assessment Domains

A complete cybersecurity assessment evaluates these domains. For middle-market transactions, total expert assessment time runs 40-60 hours; industry-specific overlays add 8-16 hours for healthcare, financial services, or OT environments.

DomainPrimary Evaluation FocusAssessment Time
GovernanceCISO reporting line, board oversight, security policies4-6 hours
InfrastructurePatch management, EDR, network segmentation, cloud config8-12 hours
ApplicationsSDLC security, API controls, vulnerability tracking6-8 hours
Data protectionEncryption, data classification, DLP, cross-border transfers4-6 hours
Identity managementMFA adoption, PAM, access reviews, third-party access4-6 hours
Incident responseIR plan maturity, test frequency, historical incident review4-6 hours
Third-party riskVendor inventory, risk assessments, critical vendor coverage4-6 hours
ComplianceActive certifications, audit findings, regulatory history4-6 hours

The gap between document review findings and technical assessment findings is typically largest in infrastructure and identity management - exactly the domains where exploitable vulnerabilities originate.

Expected Annual Loss: Translating Risk to Deal Economics

EAL methodology is the translation layer between technical findings and deal terms:

EAL = Σ (Breach Probability × Expected Impact) across all material scenarios

For a SaaS target with inadequate access controls and 150,000 customer records:

ScenarioAnnual ProbabilityExpected ImpactEAL Contribution
Ransomware25%$3.5M$875K
Data breach (customer records)15%$8.2M$1.23M
Regulatory enforcement (GDPR)10%$4.0M$400K
Total EAL$2.5M

This $2.5M annual exposure informs a $3-5M holdback over 18-24 months and a $10-15M cybersecurity indemnification cap - numbers both investment committee and counterparty can negotiate around. Without EAL methodology, cybersecurity findings remain a narrative risk list with no deal structure anchor.

The Three-Tier Investment Structure

The three-tier approach eliminates the false choice between thorough-but-slow and fast-but-superficial:

TierTimingInvestmentOutput
Pre-LOI screeningBefore LOI submission$5K-15KGo/no-go, preliminary risk summary, key diligence flags
Comprehensive assessmentPost-LOI, pre-close$50K-150KFull report, EAL, deal structure recommendations
Post-close monitoringOngoing through hold$15K-30K/yearRemediation validation, emerging risk alerts

The screening tier protects against wasted confirmatory diligence investment - material issues surface before the $50K-150K commitment is made. Across a firm evaluating 200 annual opportunities, eliminating 15-20% of problematic targets through screening avoids $1.5-3M in misdirected diligence costs annually.

Industry-Specific Assessment Requirements

Standard framework coverage provides the foundation; industry-specific overlays address sector risk concentrations that generic assessment misses.

SectorPrimary Additional Focus
HealthcareHIPAA Business Associate Agreements, medical device FDA cybersecurity documentation, OCR enforcement history
Financial servicesFFIEC examination ratings, PCI-DSS QSA audit reports, fraud detection system architecture
SaaS / TechnologySOC 2 Type II report and exception analysis, multi-tenancy isolation architecture, open source component management
ManufacturingOT/IT network segmentation, ICS/SCADA patch management, remote access controls to production systems

Healthcare receives particular scrutiny because cybersecurity findings can prevent deal close - HHS OCR requires corrective action plans before permitting ownership changes in companies with material HIPAA violations.

What This Means in Practice

Deal teams that apply this three-tier framework from the start of a process - rather than commissioning diligence as a confirmatory exercise post-LOI - make structurally better decisions. They price more accurately, structure holdbacks around quantified risk, and avoid post-close surprises that erode hold-period returns. The M&A Cybersecurity Due Diligence Checklist covers the complete evaluation framework for all eight domains, EAL calculation templates, industry-specific assessment overlays, and deal structure templates for translating findings into holdbacks, indemnification caps, and insurance requirements.

Free Resource

Download the M&A Cybersecurity Due Diligence Checklist

Submit your details and we'll send the M&A Cybersecurity Due Diligence Checklist directly to your inbox.

Request M&A Cybersecurity Due Diligence Checklist