SOC 2 Penetration Testing Requirements: What Auditors Actually Expect and How to Exceed Them | Lorikeet Security Skip to main content
Back to Blog

SOC 2 Penetration Testing Requirements: What Auditors Actually Expect and How to Exceed Them

Lorikeet Security Team April 7, 2026 10 min read

TL;DR: SOC 2 does not explicitly require penetration testing by name, but multiple Trust Services Criteria are best satisfied by it — and nearly every auditor expects to see a recent pentest report. The minimum that satisfies most auditors is an annual external and web application penetration test with a formal report, remediation evidence, and retesting of critical findings. The organizations that sail through audits go further: they map pentest findings directly to Trust Services Criteria, maintain remediation timelines with ticket-level traceability, and demonstrate a continuous testing cadence rather than a once-a-year checkbox.

Pentest Requirements Across Compliance Frameworks

Framework Pentest Requirement Frequency Scope Specificity
SOC 2 Implied by TSC CC4.1, CC7.1, CC7.2 Annual (auditor expectation) Must cover in-scope systems in system description
ISO 27001 Required by Annex A.12.6.1, A.18.2.3 Annual or after significant changes ISMS scope — all systems in the certification boundary
PCI DSS v4.0 Explicitly required (Req 11.4) Annual + after significant changes Cardholder data environment and segmentation controls
HIPAA Implied by Security Rule risk analysis Annual (best practice) Systems handling ePHI
FedRAMP Explicitly required Annual Entire cloud service offering boundary

The Trust Services Criteria That Drive Pentest Requirements

SOC 2 is organized around five Trust Services Categories: Security, Availability, Processing Integrity, Confidentiality, and Privacy. Security is mandatory for every SOC 2 engagement; the others are selected based on the organization's service commitments. Penetration testing maps most directly to the Security category, but it also provides evidence for Confidentiality and Availability controls.

The criteria most commonly satisfied by penetration testing include:


What Auditors Actually Review in Your Pentest Report

Having conducted hundreds of penetration tests that were subsequently reviewed by SOC 2 auditors, we can identify the specific elements auditors look for — and what causes them to request additional evidence or issue management letter comments.

Scope Alignment

The auditor compares the scope of the penetration test against the system description in your SOC 2 report. If your system description lists a web application, API, and cloud infrastructure as in-scope components, but your pentest only tested the web application, the auditor will note the gap. Every component in the system description should be covered by some form of security testing — and the pentest is the primary evidence for application-layer and network-layer controls.

Timing and Currency

The pentest must fall within the examination period for a Type II report. A test conducted 14 months ago does not satisfy an auditor reviewing your current audit period. Best practice is to schedule the penetration test early enough in the audit period that remediation and retesting can be completed before the examination window closes — typically within the first six months of a 12-month audit period.

Remediation Evidence

A pentest report showing critical and high-severity findings is not a problem — findings are expected. What auditors care about is remediation. They want to see that critical and high-severity findings were addressed within a defined timeline, that remediation was tracked in a ticketing system (Jira, Linear, Asana) with assignees and due dates, and that retesting confirmed the fixes were effective. Unresolved critical findings within the audit period will almost certainly result in an exception in the auditor's report.


Scope Requirements: What to Include

The minimum scope that satisfies most SOC 2 auditors includes external network penetration testing of internet-facing infrastructure, web application penetration testing of customer-facing applications, and API security testing for any APIs referenced in the system description. Organizations with more mature security programs — or those pursuing SOC 2+ — should also include internal network testing, cloud configuration review, and social engineering assessments.

A common mistake is scoping the penetration test to a production environment but maintaining a staging environment with weaker controls that has access to production data. Auditors are increasingly aware of this gap and may ask about non-production environment security, especially if your system description references development or staging infrastructure.

Cloud Infrastructure Considerations

For organizations running on AWS, GCP, or Azure, the penetration test scope should include cloud configuration review — IAM policies, security group rules, storage bucket permissions, encryption configuration, and logging settings. A web application penetration test alone does not satisfy the infrastructure security controls in your SOC 2. Cloud-specific testing requires the pentester to understand the shared responsibility model and test your half of it, not the cloud provider's.


Going Beyond Checkbox Compliance

The organizations that get the most value from SOC 2 penetration testing treat it as a security improvement exercise rather than a compliance checkbox. This means several things in practice:


Evidence Collection Best Practices

Prepare your pentest evidence before the auditor asks for it. The evidence package should include the signed statement of work defining the engagement scope, the full penetration test report with methodology, findings, and severity ratings, remediation tickets showing assignment, timeline, and completion status, retest results confirming remediation effectiveness, and a risk acceptance document for any findings that were not remediated with justification and compensating controls.

Store this evidence in your GRC platform (Drata, Vanta, Secureframe, or equivalent) and link it to the specific Trust Services Criteria it supports. When the auditor requests pentest evidence, you should be able to provide a complete package within hours, not days. The speed and organization of your evidence response signals the maturity of your security program.

For SOC 2-ready penetration testing that maps findings directly to Trust Services Criteria and includes remediation retesting — schedule a consultation with Lorikeet Security. We work with your auditor's timeline to ensure testing and remediation fall within your examination period.

SOC 2-Ready Penetration Testing

Lorikeet Security delivers penetration test reports that auditors accept without follow-up questions. Our reports map findings to Trust Services Criteria, include remediation guidance, and we provide retesting within the same engagement — no additional cost.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!