Penetration Testing for Compliance: SOC 2, ISO 27001, PCI DSS, and HIPAA Requirements Compared | Lorikeet Security Skip to main content
Back to Blog

Penetration Testing for Compliance: SOC 2, ISO 27001, PCI DSS, and HIPAA Requirements Compared

Lorikeet Security Team March 8, 2026 12 min read

Every major compliance framework expects some form of security testing, but the specifics vary significantly. SOC 2 strongly expects it without explicitly mandating it. PCI DSS prescribes exact scope and frequency. ISO 27001 requires it as part of your risk treatment plan. HIPAA references it as an addressable safeguard. Understanding these differences is the difference between running one well-scoped engagement that satisfies all your frameworks and paying for redundant tests that still leave gaps.

This guide breaks down exactly what each framework requires, where the overlaps exist, and how to structure penetration testing engagements that check every compliance box efficiently.


The Master Comparison: Pentest Requirements by Framework

Requirement SOC 2 ISO 27001 PCI DSS v4.0 HIPAA
Explicitly required No (strongly expected) Yes (A.8.8, A.5.36) Yes (Req. 11.4) No (addressable)
Minimum frequency Annual (auditor expectation) Annual or risk-based Annual + after changes Periodic (undefined)
Scope In-scope systems and applications ISMS scope per risk assessment CDE + connected systems ePHI systems
Network-layer testing Expected Per risk assessment Required Recommended
Application-layer testing Expected Per risk assessment Required Recommended
Segmentation testing Not specified Not specified Required (every 6 months) Not specified
Methodology requirement Industry-accepted Industry-accepted Industry-accepted (PTES, OWASP, NIST) Not specified
Remediation verification Expected Required Required Recommended

SOC 2 Penetration Testing Requirements

SOC 2 does not include a line item that says "thou shalt conduct a penetration test." Instead, the requirement emerges from multiple Common Criteria controls, particularly CC4.1 (the entity selects, develops, and performs ongoing evaluations to ascertain whether the components of internal control are present and functioning) and CC7.1 (the entity uses detection and monitoring procedures to identify changes to configurations and new vulnerabilities).

In practice, every SOC 2 auditor expects to see a penetration test report. The absence of one will generate an inquiry at minimum and may result in a qualification or exception in your report. Auditors view penetration testing as the most credible evidence that your security controls are effective against real-world attack scenarios.

What SOC 2 Auditors Look For in Your Pentest Report

Auditor perspective: SOC 2 auditors increasingly view penetration testing as table stakes. A company that cannot produce a recent pentest report signals to the auditor that security testing maturity is low, which often triggers deeper scrutiny of other controls in the audit. Starting at $7,599, a SOC 2 pentest is one of the most cost-effective investments in your compliance program.


ISO 27001 Penetration Testing Requirements

ISO 27001:2022 addresses penetration testing through two primary controls. Annex A 8.8 (Management of technical vulnerabilities) requires organizations to identify and address technical vulnerabilities, with penetration testing as a key validation mechanism. Annex A 5.36 (Compliance with policies, rules, and standards for information security) requires independent review of security practices, which penetration testing directly supports.

Unlike PCI DSS, ISO 27001 does not prescribe exact testing frequency or methodology. Instead, the scope and frequency of penetration testing should be driven by your risk assessment. However, in practice, certification auditors expect to see annual penetration testing covering your ISMS scope, and the risk assessment should justify the testing approach you have chosen.

ISO 27001 Pentest Scope Considerations

An ISO 27001-focused penetration test typically starts at $10,000, reflecting the broader scope and detailed reporting required for certification auditors. For organizations pursuing dual SOC 2 and ISO 27001 certification, a single engagement can be scoped to satisfy both frameworks.


PCI DSS v4.0 Penetration Testing Requirements

PCI DSS is the most prescriptive framework when it comes to penetration testing requirements. Requirement 11.4 specifies exactly what must be tested, how often, and what the report must contain.

PCI DSS Pentest Mandatory Requirements

PCI DSS v4.0 also introduced new requirements around authenticated application testing and expanded the scope of what constitutes a "significant change" that triggers re-testing. Organizations processing card data should budget for at least one comprehensive annual test plus ad-hoc testing as infrastructure changes occur.

PCI pentest pricing: PCI DSS penetration tests start at $11,500 due to the expanded scope requirements, mandatory segmentation testing, and detailed reporting format required by QSAs. For organizations with complex cardholder data environments, the PCI-specific pentest methodology ensures every requirement is covered.

Common PCI Pentest Failures


HIPAA Penetration Testing Requirements

HIPAA's Security Rule (45 CFR 164.308) includes technical evaluation as an addressable implementation specification under the evaluation standard. "Addressable" in HIPAA does not mean optional -- it means the organization must either implement the safeguard or document why an equivalent alternative measure is reasonable and appropriate.

For organizations handling electronic protected health information (ePHI), penetration testing is the most defensible way to satisfy the technical evaluation requirement. The HIPAA security testing guide provides detailed guidance on scoping these assessments.

HIPAA Pentest Scope Recommendations

While HIPAA does not specify testing frequency, annual penetration testing aligned with your risk analysis cycle is the standard practice accepted by OCR during investigations. Healthcare organizations should also consider testing after significant system changes, particularly EHR migrations or new patient-facing portal deployments.


Satisfying Multiple Frameworks with One Engagement

The most cost-effective approach for organizations subject to multiple compliance frameworks is to scope a single penetration test that covers the broadest required scope and structure the report to map findings to each framework's requirements.

The Unified Compliance Pentest Approach

  1. Map the broadest scope. If you need SOC 2, ISO 27001, and PCI DSS coverage, the PCI CDE scope plus your SOC 2 in-scope systems plus your ISO ISMS scope defines the test boundary. In most cases, PCI DSS defines the floor because it is the most prescriptive
  2. Include all required test types. Ensure the engagement covers external network testing, internal network testing, application-layer testing, and segmentation testing (if applicable for PCI)
  3. Structure the report with framework mappings. Each finding should map to the relevant controls across all applicable frameworks. This allows auditors and assessors from each framework to find their specific evidence without requiring separate reports
  4. Plan for remediation and retesting. PCI DSS requires retesting of all exploitable findings. Building this into the engagement timeline ensures you have the verified remediation evidence that all frameworks expect
Approach Estimated Cost Audit Coverage
Separate tests per framework $30,000 - $55,000+ Each framework covered independently
Unified compliance pentest $11,500 - $25,000 All frameworks covered in one engagement
Offensive Security Bundle $37,500/year 2x web app pentests, 1x network pentest, 1x API assessment, quarterly scanning, ASM

Lorikeet Security's compliance-focused penetration tests are specifically structured to produce reports that satisfy multiple frameworks simultaneously. The report includes framework-specific mappings, executive summaries formatted for different audiences (auditors, QSAs, board members), and remediation guidance prioritized by both risk severity and compliance impact.


Pentest Frequency: Finding the Right Cadence

Annual penetration testing is the minimum for any compliance-driven organization, but the optimal cadence depends on your risk profile and change velocity.

When Annual Testing Is Sufficient

When More Frequent Testing Is Necessary

The Offensive Security Bundle at $37,500 per year provides the testing cadence that compliance-mature organizations need: two web application penetration tests, one network penetration test, one API assessment, quarterly vulnerability scanning, and continuous attack surface management. This covers annual compliance requirements while providing the additional testing events needed when infrastructure changes occur.


Choosing a Compliance-Focused Pentest Provider

Not all penetration testing providers produce reports that compliance auditors will accept. When evaluating providers for compliance-driven testing, look for these qualifications:

Lorikeet Security provides compliance-focused penetration testing with report formats specifically designed for auditor consumption. SOC 2 pentests start at $7,599, PCI DSS pentests start at $11,500, and ISO 27001 pentests start at $10,000. Each engagement includes remediation retesting and direct auditor support. For a detailed pricing breakdown across all test types, see our transparent pentest pricing guide.

Need a Pentest That Satisfies Your Compliance Requirements?

Our compliance-focused penetration tests are structured to satisfy SOC 2, ISO 27001, PCI DSS, and HIPAA requirements. One engagement, multiple frameworks covered.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!