CCPA/CPRA Security Requirements for California Businesses: Where Penetration Testing Fits | Lorikeet Security Skip to main content
Back to Blog

CCPA/CPRA Security Requirements for California Businesses: Where Penetration Testing Fits

California's privacy laws are the most consequential data protection regulations in the United States, and they carry real enforcement teeth. The California Consumer Privacy Act (CCPA), amended and expanded by the California Privacy Rights Act (CPRA), requires covered businesses to implement "reasonable security procedures and practices" to protect the personal information of California residents. That obligation is legally binding, the California Privacy Protection Agency (CPPA) is actively enforcing it, and the private right of action for breach victims means litigation exposure compounds every lapse.

What "reasonable security" actually means in practice is where most businesses get stuck. The statute does not define it. Courts and regulators have spent years filling in the gaps, and the picture that has emerged is clear: basic controls are not optional, known vulnerabilities that testing would have surfaced are treated as negligence, and penetration testing is one of the most direct ways to demonstrate that your security program is active rather than performative.

This guide covers what CCPA and CPRA require, how the California Attorney General and the CPPA have interpreted and enforced those requirements, how penetration testing fits into a compliance-oriented security program, the overlap with SOC 2, and what the specific risk picture looks like for entertainment, media, and streaming companies operating in and around Los Angeles.

What "Reasonable Security" Means Under CCPA and CPRA

Section 1798.150 of the CCPA creates a private right of action for consumers whose "nonencrypted and nonredacted personal information" is subject to unauthorized access, exfiltration, theft, or disclosure as a result of the business's failure to "implement and maintain reasonable security procedures and practices appropriate to the nature of the information." That is the entire security requirement in the statute. No framework citation. No prescriptive control list. Just the word "reasonable."

The CPRA added further weight to the security obligation by establishing the CPPA, authorizing it to require annual cybersecurity audits and risk assessments for businesses engaged in high-risk processing, and explicitly linking enforcement to the adequacy of security practices at the time of a breach or violation.

The California AG's 2016 Data Breach Report

The most authoritative public definition of "reasonable security" under California law comes from the former Attorney General's 2016 Data Breach Report. That report stated directly: "The 20 controls in the Center for Internet Security's Critical Security Controls identify a minimum level of information security that all organizations that collect or maintain personal information should meet. The failure to implement all the Controls that apply to an organization's environment constitutes a lack of reasonable security."

The CIS Controls (now in version 8, reorganized into 18 control groups) provide the de facto baseline. If your organization is not implementing the CIS Controls that apply to your environment, you are, by the AG's own analysis, failing to maintain reasonable security under California law. Businesses subject to the CCPA should be able to map their security program against CIS Controls and document where each control is implemented.

How Courts Have Interpreted the Standard

CCPA litigation has given courts the opportunity to interpret "reasonable security" in context. Several patterns have emerged from early decisions and settlements:

The practical consequence: Reasonable security is not a fixed checklist you complete once. It is measured against what the industry considers standard at the time a breach or violation occurs. If you are not actively testing your controls, remediating findings, and keeping pace with evolving threats, you are almost certainly below the bar. Regulators and plaintiffs' attorneys understand this standard well.

The AG's Enforcement History: What Has Actually Been Penalized

The California Attorney General's CCPA enforcement actions since 2020 reveal a consistent set of targets. Understanding where enforcement attention has concentrated helps compliance teams prioritize their work.

Failure to Honor Consumer Rights

The AG's first wave of enforcement letters targeted businesses that failed to provide the required "Do Not Sell My Personal Information" link, did not respond to consumer requests within the statutory 45-day window, or collected consumer data without disclosing required categories and purposes. These are the operational mechanics of CCPA compliance and the easiest failures for regulators to identify.

Inadequate Security Practices Tied to Breaches

Where a breach triggers investigation, the AG and now the CPPA look specifically at whether the business maintained reasonable security. Enforcement actions in this category have focused on:

CPPA Enforcement and the New Regulatory Landscape

The CPPA began exercising enforcement authority in 2023, and its posture has been more aggressive than the AG's office. The agency has made clear through public statements and proposed regulations that it views cybersecurity audits and risk assessments as core compliance requirements for businesses engaged in processing that presents "significant risk" to consumer privacy. The CPPA has also signaled that enforcement will not be limited to large companies. Any business meeting the CCPA thresholds is subject to the same standard.

Administrative fines reach $2,500 per unintentional violation and $7,500 per intentional violation or violation involving a minor. With violations assessed per consumer, per incident, the exposure for a breach affecting tens of thousands of California residents is substantial. This is separate from the private right of action, which adds statutory damages of $100 to $750 per consumer on top of regulatory fines.

How Penetration Testing Demonstrates CCPA Compliance

Penetration testing is one of the most defensible security activities a covered business can undertake, precisely because it generates documented evidence that your controls were actively validated by an independent party. The compliance value operates on several levels.

Testing Satisfies the "Reasonable" Requirement

A business that conducts regular penetration testing and remediates findings can credibly argue that it was actively working to identify and address security risks. A business that has no testing history cannot make that argument. Courts and regulators treat the absence of testing as evidence that the business was not taking its security obligations seriously, regardless of what its written policies say.

The CIS Controls framework referenced by the AG includes CIS Control 18 (Penetration Testing) as a required control. A business that can point to a testing program aligned with CIS Control 18 is directly addressing the standard the AG has identified as the baseline for reasonable security.

Testing Creates a Defensible Record

In breach litigation and regulatory investigations, your lawyers and compliance team will need to reconstruct your security posture at the time of the incident. A history of annual or more frequent penetration tests, with written reports, documented findings, and remediation evidence, provides that record. It is significantly more persuasive than a stack of policies and a verbal assertion that security was taken seriously.

The pentest report also does something that policies cannot: it proves that your controls were tested under realistic attack conditions. A policy that says "we encrypt all data" is less valuable than a pentest report confirming that an independent expert could not find an unencrypted data pathway.

Testing Surfaces Vulnerabilities Before Attackers Do

The "reasonable security" standard includes an obligation to know about discoverable vulnerabilities. A business that discovers and remediates a vulnerability through penetration testing is in a very different legal position than one that discovers the same vulnerability because an attacker exploited it and California residents' data was exposed. The former demonstrates proactive security. The latter demonstrates negligence.

What a CCPA-Focused Pentest Should Cover

A penetration test scoped for CCPA compliance should specifically address:

CCPA/CPRA and SOC 2: Where the Frameworks Overlap

Many California businesses pursuing CCPA or CPRA compliance are simultaneously working toward SOC 2 attestation. The two frameworks address different questions but share substantial technical common ground, and a well-designed compliance program can satisfy both without duplicating work.

CCPA / CPRA

A California state law creating enforceable consumer rights over personal information and requiring covered businesses to implement reasonable security. Enforcement through the CPPA and private right of action for breach victims. Focused on personal information of California residents. No formal certification mechanism.

SOC 2

An auditing framework evaluating a service organization's controls against the AICPA Trust Services Criteria. Covers security, availability, processing integrity, confidentiality, and privacy. Results in an attestation report from a licensed CPA firm. Market-driven requirement for enterprise sales, particularly in B2B SaaS.

Shared Technical Ground

The controls that satisfy SOC 2's Security criterion directly address the "reasonable security" standard under CCPA. Both frameworks require:

A business that has achieved SOC 2 Type II attestation has, in effect, documented and validated a security program that satisfies the core technical requirements of CCPA's "reasonable security" standard. The SOC 2 report becomes an exhibit in your CCPA compliance posture.

Where They Diverge

SOC 2 does not address the consumer rights mechanics that are specific to CCPA: the "Do Not Sell or Share" opt-out infrastructure, the 45-day response window for consumer requests, deletion propagation to third-party service providers, or the "Limit the Use of My Sensitive Personal Information" link. SOC 2's Privacy criterion addresses some data governance requirements, but it is not calibrated to California law's specific consumer rights obligations.

The practical approach is to build your security program once against the CIS Controls baseline, pursue SOC 2 attestation for B2B sales purposes, and add the CCPA-specific consumer rights infrastructure and privacy notice requirements as a separate compliance workstream. You get the most out of your security investment when the same controls serve multiple compliance purposes rather than treating each framework as a separate project.

Learn more about our CCPA/CPRA compliance support services and how we structure assessments to satisfy both regulatory and audit requirements.

Entertainment, Media, and Streaming Companies in Los Angeles

Los Angeles is home to one of the highest concentrations of entertainment and media companies in the world, and the CCPA/CPRA exposure for companies in this sector is particularly acute. The reasons are structural: entertainment and media businesses collect high volumes of consumer data, including sensitive behavioral and demographic information, across platforms that are specifically designed to maximize engagement and personalization.

Why the Risk Profile Is Elevated

Streaming and On-Demand Platforms

Streaming platforms collect precise viewing histories, device identifiers, payment information, and behavioral data used for recommendation algorithms. The CPRA's "sensitive personal information" category captures some of this data, particularly financial account details and inferences drawn from content consumption that could reveal religious beliefs, political orientation, or other protected characteristics. Platforms that share this data with advertising technology vendors are engaged in "sharing" under the CPRA's definition, triggering opt-out obligations regardless of whether money changes hands.

Studios and Production Companies

Major studios and production companies maintain large datasets of talent, crew, and contractor personal information, including Social Security numbers, financial account details for payroll, and health information collected for production insurance purposes. This is sensitive personal information under the CPRA, and the security obligations that attach to it are more demanding than those for general personal information. A breach of a talent database carries both regulatory exposure and substantial reputational risk.

Gaming and Interactive Entertainment

Gaming companies operating in California collect account data, in-app purchase histories, device and location data, and in many cases biometric information if games use facial or voice recognition features. The CPRA's protections for children's data (those under 16) are particularly relevant for gaming companies, where violations involving minors carry the elevated $7,500 per violation penalty and have attracted specific CPPA enforcement attention.

Talent Agencies and Management Companies

Talent agencies maintain sensitive personal information about clients that spans financial details, contact information, health data relevant to production eligibility, and sometimes immigration status. These are small to mid-sized organizations that often operate without mature security programs, and they are subject to the same CCPA thresholds as larger companies if their revenue or data processing volume meets the statutory tests.

Common Security Gaps in the Entertainment Sector

In assessments of entertainment and media companies, recurring security gaps include:

Our Los Angeles penetration testing team works specifically with entertainment, media, and streaming companies to address these gaps. We understand the architecture patterns common to this sector and scope assessments to cover the specific attack surfaces that carry the highest CCPA exposure.

Practical Steps Toward CCPA/CPRA Security Compliance

Building a security program that genuinely satisfies the CCPA's "reasonable security" standard requires more than a policy library. The following steps address the technical and operational foundations that regulators and courts have consistently referenced.

Step 1: Build a Data Inventory

You cannot protect what you have not mapped. A comprehensive data inventory is the foundation for every CCPA/CPRA technical requirement. It needs to document:

Step 2: Implement and Verify Encryption

The CCPA's private right of action exempts encrypted data from consumer breach claims. Encryption is one of the highest-leverage controls you can implement for CCPA purposes. This means AES-256 encryption at rest for all databases and file storage containing personal information, TLS 1.2 or higher for all data in transit including internal service-to-service communication, and field-level encryption for sensitive personal information such as SSNs, financial account numbers, and biometric data. Encryption policy is not the same as encryption implementation. A penetration test will verify whether your encryption is actually enforced or whether there are pathways to plaintext data that your policies do not address.

Step 3: Enforce Access Controls

Access control failures are among the most common targets in CCPA enforcement investigations. Least-privilege policies must be implemented in practice, not just documented. This requires:

Step 4: Conduct Annual Penetration Testing

Annual penetration testing by a qualified, independent third party is the most direct way to satisfy the CIS Control 18 requirement and the CPPA's implicit expectation of regular security validation. The testing scope should cover systems that store or process personal information, consumer-facing applications and APIs, and the network paths between them. Findings must be documented, triaged by severity, and remediated within defined timelines. Retesting should confirm remediation before the finding is closed.

For businesses subject to CPPA's cybersecurity audit requirement, the annual pentest is a core component of that audit. Having a pentest report from a recognized security firm is substantially better evidence of reasonable security than an internally conducted assessment.

Step 5: Build Consumer Rights Infrastructure

The consumer rights granted by CCPA and CPRA require engineering work, not just policy. Access requests, deletion requests, correction requests, and opt-out requests must be fulfilled within the statutory timelines. This requires:

Step 6: Document Everything

In enforcement proceedings and litigation, documentation is your defense. Maintain records of your data inventory, security policies, penetration test reports and remediation evidence, access reviews, incident response activities, and consumer rights request fulfillment. The businesses that fare best in CPPA investigations are those that can demonstrate an active, documented security program, not just a set of policies that were written once and never revisited.

Starting point for compliance teams: If you are beginning this process, prioritize encryption implementation, access control documentation, and commissioning a penetration test. These three areas address the most common sources of enforcement exposure and provide the technical foundation that supports every other compliance requirement. Consumer rights infrastructure and the data inventory can be built in parallel but should be complete before you begin substantive marketing to California residents at scale.

Working with a California-Based Security Partner

CCPA and CPRA compliance is not a one-time certification exercise. It is an ongoing security obligation that requires regular testing, continuous monitoring, and documented remediation. Working with a security partner that understands California's regulatory environment, the CPPA's enforcement priorities, and the specific risk profiles of California industries is an advantage that shows up both in the quality of your security program and in how your posture is received by regulators if something goes wrong.

Lorikeet Security works with companies across California, with particular focus on the Los Angeles entertainment, media, and technology sectors and the San Francisco Bay Area's enterprise software and fintech ecosystem. Our penetration testing engagements are structured to produce reports that serve both your security team's remediation needs and your legal team's compliance documentation requirements.

If you are in Los Angeles and need CCPA-aligned security testing, visit our Los Angeles penetration testing page for more information about our local team and engagement process. For Bay Area companies, our San Francisco office serves the full range of California privacy compliance use cases.

You can also review our full security services catalog or go directly to start a testing engagement if you already know what your program needs.

CCPA Compliance Starts with Knowing What You Have

Our penetration testing engagements are scoped to cover the systems and controls that California regulators look at when a breach occurs. Reports are structured for both technical remediation and legal compliance review. We work with entertainment, media, technology, and professional services companies across Los Angeles and San Francisco.

Los Angeles Team San Francisco Team
-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!