SOC 2 Pentest Requirements: What Your Auditor Actually Expects | Lorikeet Security Skip to main content
Back to Blog

SOC 2 Pentest Requirements: What Your Auditor Actually Expects

If you are preparing for a SOC 2 audit, you have probably heard that you need a penetration test. You have also probably noticed that the SOC 2 standard itself is frustratingly vague about what that actually means. There is no checklist. No explicit requirement that says "conduct a penetration test annually." And yet, every auditor we have worked with expects one.

This post breaks down what SOC 2 actually says about security testing, what your auditor will look for in a pentest report, and how to avoid the scoping mistakes that trip up most companies the first time around.

SOC 2 Does Not Explicitly Require a Pentest. Your Auditor Will Anyway.

Let us get the uncomfortable truth out of the way: the AICPA Trust Service Criteria do not contain a line item that reads "you must conduct an annual penetration test." The framework is principles-based, not prescriptive. It tells you what outcomes to achieve, not exactly how to achieve them.

But in practice, penetration testing has become a de facto requirement. Auditors treat it as one of the primary ways to demonstrate that you are meeting the security criteria. If you show up to your SOC 2 Type II audit without a recent pentest report, expect a finding, a qualification, or at the very least, an awkward conversation.

The bottom line: SOC 2 is principles-based, and your auditor has latitude in how they evaluate your controls. A penetration test is one of the cleanest, most defensible ways to demonstrate that your security controls actually work. Skipping it is a gamble, and it is one that almost never pays off.

The Trust Service Criteria That Matter: CC7.1 and CC7.2

The two criteria most directly tied to penetration testing are CC7.1 and CC7.2 under the Common Criteria (Security) section.

CC7.1: Detection and Monitoring

CC7.1 requires the entity to "detect and monitor for vulnerabilities and threats to system components." This is where vulnerability scanning and penetration testing come in. Your organization needs to show that it actively identifies weaknesses in its environment, not just that it has firewalls and antivirus deployed. A penetration test provides direct evidence that you are identifying real, exploitable vulnerabilities in your systems.

CC7.2: Anomaly Detection and Response

CC7.2 requires the entity to "monitor system components for anomalies that are indicative of malicious acts, natural disasters, and errors." While this criterion leans more toward monitoring and incident detection, a penetration test can validate that your detection mechanisms are actually working. If a tester can exfiltrate data without triggering an alert, that is a finding your auditor cares about.

Beyond CC7, penetration testing also supports criteria related to risk assessment (CC3.2), change management (CC8.1), and logical access controls (CC6.1). A thorough pentest touches many areas of the Trust Service Criteria simultaneously, which is part of why auditors value it so highly.

What Auditors Actually Look for in a Pentest Report

Not all pentest reports are created equal, and auditors know the difference. Here is what they are evaluating when they review your report:

1. Scope That Matches Your SOC 2 Boundary

This is the single most common issue we see. Your pentest scope needs to align with the systems, applications, and infrastructure defined in your SOC 2 boundary. If your SOC 2 covers your SaaS platform, your API layer, and your AWS infrastructure, then your pentest needs to cover all three. Testing only the web application front end is not sufficient if your SOC 2 scope includes back-end services and cloud infrastructure.

2. Testing of Both Internal and External Surfaces

Auditors want to see that you are not just testing what is visible from the internet. External testing shows how an outsider could get in. Internal testing (or authenticated testing) shows what happens once someone has access. Both perspectives matter. If you only have an external, unauthenticated test, you are leaving a significant gap in your evidence.

3. Risk Ratings Using CVSS or a Similar Framework

Findings need to be rated by severity in a consistent, industry-recognized way. CVSS (Common Vulnerability Scoring System) is the most widely accepted standard. Your auditor wants to see Critical, High, Medium, Low, and Informational classifications with clear scoring methodology. A report that just lists findings without risk ratings will not satisfy most audit firms.

4. Evidence of Remediation or a Remediation Plan

A pentest that finds vulnerabilities is only half the story. Your auditor wants to see that you have either remediated the findings or have a documented, time-bound remediation plan. Ideally, you have a retest report showing that critical and high-severity findings have been fixed. If remediation is still in progress, a plan with owners and deadlines is the minimum expectation.

5. Report from a Qualified Third Party

Internal security assessments are valuable, but for SOC 2, auditors expect an independent, third-party penetration test. The testing firm should have qualified, certified testers (OSCP, GPEN, or equivalent credentials). Self-assessments do not carry the same weight and will likely be challenged during the audit.

Common Scoping Mistakes

Scoping is where most SOC 2 pentests go wrong. These are the mistakes we see most often, and any of them can result in audit findings or the auditor rejecting the pentest report entirely.

Pro tip: Before you kick off a pentest, send your SOC 2 system description to your testing provider. A good firm will map the pentest scope to your SOC 2 boundary and flag any gaps before testing starts. This avoids last-minute surprises during the audit.

Unauthenticated vs. Authenticated Testing

This is one of the most frequent questions we get from companies preparing for SOC 2: do we need unauthenticated testing, authenticated testing, or both?

Unauthenticated Testing

Simulates an external attacker with no credentials or prior access. Tests the attack surface visible from the internet: login pages, public APIs, network services, SSL/TLS configuration, and information disclosure. This is the baseline and answers the question: "What can someone with no access break into?"

Authenticated Testing

Simulates a user with valid credentials (standard user, admin, or both). Tests authorization controls, privilege escalation, business logic flaws, session management, and data access boundaries. This answers the more dangerous question: "What can someone with some access escalate to?"

For SOC 2, you almost certainly need both. Unauthenticated testing covers your external perimeter. Authenticated testing covers the controls that matter once someone is inside your application. Most SOC 2 auditors expect to see both perspectives in your report. If budget forces you to choose, authenticated testing generally provides more valuable findings for compliance purposes, but an unauthenticated baseline is still strongly recommended.

How Often Do You Need to Test?

The short answer: at least annually. SOC 2 Type II audits cover a period of time (typically 12 months), and your auditor will want to see a pentest that falls within that period. An annual test is the minimum expectation.

That said, auditors look favorably on organizations that test more frequently. Here is the general cadence we recommend:

What a Good SOC 2 Pentest Report Looks Like

Your pentest report is going directly to your auditor. It needs to be professional, thorough, and structured in a way that maps to what auditors are evaluating. Here is what a good SOC 2 pentest report includes:

If your pentest report is a two-page PDF with a vulnerability scanner output attached, that is not going to pass muster. Auditors expect a professional-grade deliverable that they can reference directly in their audit workpapers.

Lorikeet SOC 2 Pentest Pricing

We built our SOC 2 penetration testing service specifically for companies going through the audit process. Our reports are structured for auditor review, our scope is mapped to your SOC 2 boundary, and we include retesting to verify remediation.

Unauthenticated Testing

$3,999

External black-box testing from an attacker's perspective. Covers public-facing assets, APIs, and network perimeter. Includes auditor-ready report and one round of retesting.

Authenticated Testing

$5,999

Everything in unauthenticated plus authenticated application testing, authorization controls, business logic testing, and session management review. Two rounds of retesting included.

Both tiers include CVSS-rated findings, executive summaries, detailed remediation guidance, and a report format designed to satisfy SOC 2 auditors. We work directly with your team to align scope to your SOC 2 boundary before testing begins.

Get Your SOC 2 Pentest Sorted

Auditor-ready reports, scope aligned to your SOC 2 boundary, and retesting included. Let us take the pentest off your audit prep checklist.

View SOC 2 Pentest Details Book a Consultation
-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!