The SOC 2 Compliance Package: Pentest, Remediation, and Audit Under One Roof | Lorikeet Security Skip to main content
Back to Blog

The SOC 2 Compliance Package: Pentest, Remediation, and Audit Under One Roof

Lorikeet Security Team February 26, 2026 10 min read

Getting SOC 2 compliant is one of those things that sounds straightforward until you actually start doing it. You need a penetration test, but the pentest firm does not do audits. You need an auditor, but the audit firm does not do security testing. You need someone to help you fix the gaps, but your consultants do not talk to your testers, and neither of them talks to your auditor. You end up project-managing three to five different vendors, coordinating timelines, translating between teams, and hoping everything lines up before your deadline.

We built Lorikeet's SOC 2 compliance package to eliminate that problem entirely. Through our partnership with Accorp Partners CPA LLC, we deliver the complete SOC 2 journey, penetration testing, remediation guidance, vulnerability scanning, and formal audit, all coordinated through a single point of contact. One engagement. One timeline. No vendor wrangling.


The SOC 2 Compliance Journey

Before we get into how our package works, it helps to understand the full SOC 2 process. Most companies underestimate the number of steps involved, which is why timelines slip and costs balloon.

Phase 1: Readiness Assessment

Before you can pass a SOC 2 audit, you need to understand where you stand. A readiness assessment evaluates your current security posture against the SOC 2 Trust Service Criteria (Security, Availability, Processing Integrity, Confidentiality, and Privacy). The output is a gap analysis: here is what you have, here is what you need, and here is what needs to change.

This phase is critical and frequently skipped. Companies that jump straight to the audit without a readiness assessment are the ones who discover control gaps during the audit itself, which leads to delays, exceptions, and qualified reports.

Phase 2: Gap Remediation

Once you know what the gaps are, you fix them. This might involve implementing new security controls, updating policies and procedures, configuring monitoring and alerting, deploying endpoint protection, or establishing incident response processes. The scope of remediation varies enormously depending on your starting maturity.

This is where many companies stall. They get the readiness report, realize they have 40 items to fix, and do not know where to start or how to prioritize. Good compliance guidance is not just telling you what is missing. It is telling you what to fix first, how to fix it efficiently, and which controls are going to get the most scrutiny from your auditor.

Phase 3: Security Testing

SOC 2 auditors expect to see evidence of security testing. This typically includes both vulnerability scanning and penetration testing. The pentest validates that your security controls actually work against real-world attacks. The vulnerability scan demonstrates ongoing monitoring. Together, they provide the evidence your auditor needs to assess the operating effectiveness of your security controls.

Phase 4: Formal Audit

The audit itself is conducted by a licensed CPA firm. The auditor evaluates your controls against the Trust Service Criteria, reviews evidence (including your pentest report and scan results), interviews key personnel, and tests a sample of your controls. For SOC 2 Type I, this is a point-in-time assessment. For SOC 2 Type II, the auditor evaluates controls over a period of time, typically 3 to 12 months.

Phase 5: Report and Attestation

The final deliverable is the SOC 2 report, which includes the auditor's opinion, a description of your system, the trust service criteria evaluated, and the results of testing. This is the document you share with prospects, customers, and partners to demonstrate your security posture.


Why Companies Struggle with SOC 2

The process above is well-documented. So why do so many companies struggle with it? In our experience working with growing organizations, the pain points are remarkably consistent.

Fragmented Vendors

The biggest problem is vendor fragmentation. Most companies end up working with a pentest firm, a separate audit firm, a compliance consultant, and possibly a separate vulnerability scanning vendor. None of these vendors coordinate with each other. You become the project manager, relaying information between teams that have never worked together and do not understand each other's processes or timelines.

When the pentest firm finds issues that need to be fixed before the audit, but the auditor has already started their review, things get complicated fast. When the compliance consultant recommends controls that the pentest later reveals are insufficient, you waste time and money implementing things twice.

Unclear Requirements

SOC 2 is a framework, not a checklist. The Trust Service Criteria are principles-based, which means there is interpretation involved in how they apply to your specific organization. Companies that do not have compliance experience often over-engineer some controls and under-engineer others. They implement elaborate access management processes but forget to set up audit logging. They write detailed security policies but do not actually follow them.

Audit Surprises

Perhaps the most painful scenario: you think you are ready, you start the audit, and the auditor identifies control gaps you did not know about. Now you need to fix things mid-audit, which delays the timeline, increases costs, and sometimes requires the auditor to extend the observation period. This almost always happens when security testing and audit preparation are not coordinated.

Timeline Creep

SOC 2 projects have a way of taking longer than expected. The readiness assessment takes a month. Remediation takes three months instead of two. The pentest schedule slips because the vendor is booked. The auditor needs additional evidence. Before you know it, a six-month timeline has become a year, and the enterprise deal you were trying to close has gone to a competitor.

The core issue: SOC 2 compliance requires security expertise, audit expertise, and project management working in coordination. When these are spread across multiple vendors with no shared accountability, the process breaks down.


The Lorikeet + Accorp Partners Approach

Our SOC 2 compliance package solves the vendor coordination problem by bringing everything under a single engagement. Lorikeet Security handles the security testing and remediation guidance. Accorp Partners CPA LLC handles the formal audit and attestation. We work together with a shared timeline, shared context, and a single point of contact for the client.

What Lorikeet Handles

What Accorp Partners CPA Handles

What We Do Together


Typical Timeline

Every SOC 2 engagement is different, but here is a representative timeline for a growing company going through the process for the first time:

Phase Timeline Key Activities
Readiness Assessment Weeks 1-3 Evaluate current controls, identify gaps, define scope and trust service criteria
Gap Remediation Weeks 3-10 Implement missing controls, update policies, configure monitoring, deploy security tooling
Penetration Testing Weeks 8-10 Manual pentest of applications and infrastructure, vulnerability scanning, findings delivered in real-time
Remediation + Retesting Weeks 10-12 Fix pentest findings, verify fixes, prepare evidence packages
Audit (Type I) Weeks 12-14 Formal audit of controls at a point in time, evidence review, personnel interviews
Report Delivery Weeks 14-16 Final SOC 2 report issued by Accorp Partners CPA

For SOC 2 Type II, add the observation period between the remediation phase and the final audit. The observation period is typically 3 to 12 months, during which the auditor evaluates the ongoing effectiveness of your controls.

Note that the penetration testing phase overlaps with the later stages of gap remediation. This is intentional. By testing while remediation is still in progress, we can identify issues that need to be addressed before the audit starts, rather than discovering them during the audit itself.


DIY SOC 2 vs. Lorikeet + Accorp Package

Most companies that attempt SOC 2 on their own end up spending more time and money than they expected. Here is a side-by-side comparison:

DIY / Fragmented Vendors Lorikeet + Accorp Package
Vendors to Manage 3-5 separate firms (pentest, audit, consulting, scanning, tooling) One coordinated engagement
Timeline 6-12+ months (delays from vendor coordination) 3-4 months for Type I (coordinated schedule)
Project Management You coordinate everything Single point of contact manages the process
Pentest Findings PDF report delivered weeks after testing Real-time findings via PTaaS portal
Audit Surprises Common; pentest and audit are disconnected Rare; security testing feeds directly into audit prep
Remediation Support Generic recommendations from separate consultant Specific technical guidance from the team that found the issues
Pricing Transparency Opaque; each vendor quotes separately Transparent; bundled pricing published at /pricing
Ongoing Monitoring Separate tool or not included ASM platform available from $476/month
Repeat Audits Start over with vendor coordination each year Ongoing relationship; renewals are streamlined

Compliance Automation with Vanta

As a Vanta MSP Partner, Lorikeet Security also integrates compliance automation into the process. Vanta continuously monitors your infrastructure and SaaS tools against SOC 2 requirements, automatically collecting evidence and flagging control gaps. This is not a replacement for manual security testing or a formal audit, but it dramatically reduces the manual effort involved in evidence collection and ongoing compliance maintenance.

When Vanta is part of the engagement, the readiness assessment is faster because we already have visibility into your current control status. Gap remediation is more targeted because we can see exactly which controls are passing and which are failing. And audit preparation is smoother because the auditor has access to continuous evidence rather than point-in-time snapshots.


Beyond SOC 2: ISO 27001 and PCI-DSS

The same coordinated approach applies to other compliance frameworks. Through our partnership with Accorp Partners CPA LLC and Anchorpoint Partners, we also deliver:

The efficiency of bundling: SOC 2, ISO 27001, and PCI-DSS share significant overlap in their control requirements. Companies that pursue multiple frameworks through a coordinated package avoid duplicating work across security testing, policy development, and evidence collection. The same pentest report can satisfy requirements for all three frameworks when scoped correctly from the start.


Who This Is For

Our SOC 2 compliance package is designed for companies that:

If any of that resonates, we should talk. You can book a consultation to discuss your specific situation, review our transparent pricing, or explore our full service offerings.

Get SOC 2 compliant without the vendor chaos

One engagement. One timeline. Penetration testing, remediation, and audit all coordinated through a single point of contact. Book a consultation to get started.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!