Agency|Insights
Audit Insights & PreparationAudit Insights & Preparation

Does SOC 2 Require Penetration Testing?

Having advised dozens of companies through their SOC 2 audits, penetration testing is one of the most frequent questions we get at Agency.

Agency Team
Agency Team
·14 min read
Hand-drawn illustration of magnifying glass, shield, and network representing SOC 2 penetration testing

Having advised dozens of companies through their SOC 2 audits, penetration testing is one of the most frequent questions we get at Agency. The short answer surprises most people — and the nuance matters more than you might think.

SOC 2 does not explicitly require penetration testing — the AICPA's Trust Service Criteria do not use the words "penetration test" anywhere in the framework. However, in our experience, most SOC 2 auditors expect penetration testing as evidence supporting several criteria, particularly CC4.1 (monitoring activities) and CC7.1 (identification of changes to system components that may introduce vulnerabilities). In practice, the question is not whether penetration testing is technically required by the standard but whether your auditor will accept your SOC 2 engagement without it. What we consistently see is that the vast majority of auditors expect penetration testing, and companies that skip it face a higher risk of receiving observations or exceptions related to their vulnerability management and security assessment practices.

This guide clarifies the relationship between SOC 2 and penetration testing: which Trust Service Criteria relate to pen testing, what auditors actually expect, the difference between vulnerability scanning and penetration testing, how to scope a pen test for SOC 2 purposes, frequency expectations, and how to handle the cost and logistics of penetration testing within a SOC 2 compliance program.

The Short Answer

Penetration testing is not a stated requirement in the SOC 2 Trust Service Criteria. The AICPA framework uses principles-based language that describes control objectives without prescribing specific testing methodologies. However, penetration testing is widely considered an industry best practice for assessing the effectiveness of security controls, and most auditors treat it as expected evidence for several criteria. In our experience, companies that skip penetration testing should be prepared to explain to their auditor how they assess the effectiveness of their security controls through alternative means — and should understand that many auditors will not consider the explanation sufficient.

What the Trust Service Criteria Actually Say

CriterionRelevant LanguageConnection to Penetration Testing
CC4.1The entity selects, develops, and performs ongoing and/or separate evaluations to ascertain whether the components of internal control are present and functioningPenetration testing serves as a "separate evaluation" that assesses whether security controls are functioning effectively
CC7.1To meet its objectives, the entity uses detection and monitoring procedures to identify changes to configurations that result in the introduction of new vulnerabilities and susceptibilities to newly discovered vulnerabilitiesPenetration testing identifies vulnerabilities that automated scanning may miss, particularly application-layer and logic-based vulnerabilities
CC7.2The entity monitors system components and the operation of those components for anomalies that are indicative of malicious acts, natural disasters, and errorsPenetration test results validate that monitoring and detection controls would identify attack patterns
CC3.2The entity identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis for determining how the risks should be managedPenetration test findings feed into the risk assessment by identifying real vulnerabilities that create organizational risk

Vulnerability Scanning vs Penetration Testing

Key Differences

DimensionVulnerability ScanningPenetration Testing
ApproachAutomated tools scan systems for known vulnerabilities using signature databasesHuman testers actively attempt to exploit vulnerabilities using manual techniques and automated tools
DepthIdentifies known vulnerability signatures; limited to the tool's databaseTests for logic flaws, chained vulnerabilities, business logic errors, and attack paths that automated tools cannot detect
FrequencyWeekly or monthly (continuous is possible)Annually at minimum; some organizations test semi-annually or quarterly
OutputList of identified vulnerabilities with severity ratings based on CVSS scoresDetailed report of exploitation attempts, successful penetrations, attack paths, and business impact assessment
Cost$2,000-$10,000 annually for tooling$5,000-$50,000+ per engagement depending on scope
SOC 2 relevanceExpected as a continuous control (CC7.1); demonstrates ongoing vulnerability identificationExpected as a periodic assessment (CC4.1); demonstrates deeper security evaluation
What it missesApplication logic flaws, chained attack paths, authentication bypass, authorization issuesNothing by design, but scope limitations may exclude certain systems or attack types

Do You Need Both?

We recommend both vulnerability scanning and penetration testing as complementary controls, and most auditors we work with expect both. Vulnerability scanning provides continuous identification of known vulnerabilities across your infrastructure, while penetration testing provides periodic deep assessment that validates the effectiveness of your security controls against real-world attack techniques. Companies that perform only vulnerability scanning may face auditor questions about how they assess application-layer security, business logic vulnerabilities, and attack chain risks that automated scanning does not cover.

ScenarioAuditor ExpectationWhat We Recommend
First SOC 2 audit (Type I)Vulnerability scanning in place; penetration test completed or scheduledComplete at least one penetration test before or concurrent with the Type I audit
SOC 2 Type II auditVulnerability scanning running throughout observation period; at least one penetration test during or shortly before the observation periodSchedule the penetration test early in the observation period to allow time for remediation
Annual SOC 2 renewalVulnerability scanning continuous; annual penetration testAlign the penetration test timing with the observation period for maximum evidence value

How Auditors Evaluate Penetration Testing

What Auditors Look For

Evidence ElementAuditor ExpectationCommon Deficiency
Test scopePenetration test covered all in-scope production systems and applicationsTest scope excluded critical systems or only covered infrastructure without application-layer testing
Test timingTest was conducted within or close to the observation periodTest was conducted more than 12 months ago and does not reflect the current environment
Tester qualificationsTest was performed by qualified security professionals (internal or external)Test was performed by unqualified staff or an automated-only approach was labeled as a penetration test
Findings documentationTest report includes methodology, findings with severity classification, and evidence of exploitation attemptsReport is a generic template with minimal detail about actual testing performed
Remediation evidenceCritical and high-severity findings have been remediated or have documented remediation plansFindings remain open without remediation plans or documented risk acceptance
Management responseManagement reviewed findings and approved remediation prioritiesNo evidence that management was involved in reviewing or responding to test results

What Auditors Do Not Typically Require

Not RequiredExplanation
Zero findingsAuditors expect penetration tests to identify findings — a test with zero findings may raise questions about test thoroughness
Specific testing methodologyMost auditors accept OWASP, PTES, or NIST SP 800-115 methodologies without requiring a specific one
Internal team testingExternal third-party testing is most common, but qualified internal security teams can perform testing if they demonstrate independence
Red team exercisesFull red team engagements are beyond what SOC 2 auditors expect; standard penetration testing is sufficient
Testing of every applicationTesting should cover in-scope systems; auditors understand that testing every system may not be practical for very large environments

Scoping a Penetration Test for SOC 2

What to Include in Scope

Scope ElementInclusion CriteriaSOC 2 Relevance
Production web applicationsAll customer-facing applications within the SOC 2 system boundaryApplication-layer vulnerabilities directly affect customer data security
Production APIsAll APIs that handle customer data or authenticationAPI security is critical for multi-tenant SaaS applications
Cloud infrastructureProduction cloud environment configurations and network architectureInfrastructure vulnerabilities can compromise all applications running on the environment
Authentication systemsLogin flows, MFA implementation, session managementAccess control effectiveness is central to SOC 2 Security criteria
Internal network (if applicable)Internal systems accessible from the corporate networkRelevant if the SOC 2 scope includes internal network components
Third-party integrationsIntegration points with subservice organizations and vendorsInsecure integrations can create data exposure paths

Scoping Decisions

DecisionOptionsOur Guidance for SOC 2
External vs internal testingExternal only, internal only, or bothAt minimum, external testing of production applications; add internal testing if the SOC 2 scope includes internal network
Black box vs gray box vs white boxVaries by information provided to testersGray box testing (providing testers with some architecture information and credentials) delivers the best balance of realism and thoroughness for SOC 2
Application vs infrastructureApplication-layer only, infrastructure only, or bothWe recommend both application and infrastructure testing; application-only testing misses infrastructure vulnerabilities and vice versa
Automated + manual vs automated onlyPure automated scanning or automated tools supplemented by manual testingAutomated tools supplemented by manual testing is the standard expectation; automated-only approaches are generally considered vulnerability scanning, not penetration testing

Frequency and Timing

How Often Should You Penetration Test

FrequencyWhen AppropriateAuditor Acceptance
AnnuallyStandard for most organizations; aligns with annual SOC 2 audit cyclesWidely accepted as the minimum frequency
Semi-annuallyOrganizations with high-risk environments, frequent application changes, or sensitive dataExceeds minimum expectations; demonstrates strong security posture
QuarterlyOrganizations in highly regulated industries or with rapidly changing applicationsExceeds expectations; typically only necessary for very high-risk environments
After major changesFollowing significant infrastructure changes, application rewrites, or architecture modificationsExpected as a supplement to scheduled testing; demonstrates risk-aware testing approach

Timing Relative to the SOC 2 Audit

Timing StrategyAdvantageDisadvantage
Early in the observation periodMaximum time to remediate findings before the auditFindings may be stale by end of observation period
Mid-observation periodBalanced between allowing remediation time and keeping results currentRemediation of critical findings may be rushed
Late in the observation periodResults are maximally current for the auditorLimited time to remediate findings; critical findings may appear as exceptions
Before the observation period beginsFindings drive remediation that improves controls before observation startsTest does not fall within the observation period and may need supplementation

What we recommend for most of our clients is to schedule the penetration test in the first half of the observation period. This provides evidence that falls within the observation window while allowing adequate time to remediate findings before the auditor evaluates your controls.

Cost and Logistics

Penetration Testing Cost Ranges

Test ScopeCost RangeDurationTypical Provider
Small web application (single app, limited API)$5,000-$12,0003-5 daysBoutique security firm
Standard SaaS application (web app + APIs + infrastructure)$12,000-$30,0005-10 daysMid-market security firm
Complex multi-application environment$25,000-$50,00010-20 daysEstablished security consultancy
Enterprise environment (multiple apps, internal network, cloud infrastructure)$40,000-$100,000+15-30+ daysLarge security firm

Selecting a Penetration Testing Vendor

Selection CriteriaWhat to EvaluateRed Flags
QualificationsCertifications (OSCP, GPEN, CREST) and demonstrated experienceNo verifiable certifications; inability to provide sample reports
MethodologyUses recognized methodologies (OWASP, PTES, NIST 800-115)No documented methodology; relies entirely on automated tools
Report qualityProvides detailed reports with reproducible findings, severity ratings, and remediation guidanceGeneric reports with only tool output; no manual testing evidence
Industry experienceExperience testing similar applications and environments to yoursNo experience with your technology stack or industry
Remediation supportProvides retesting after remediation to verify fixesNo retesting option; engagement ends with report delivery
CommunicationClear scoping process, rules of engagement, and status updates during testingVague scope definitions; no communication during the engagement

Alternatives and Compensating Controls

If You Cannot Perform Penetration Testing

AlternativeAuditor AcceptanceLimitations
Comprehensive vulnerability scanning with manual reviewMay be accepted for Type I; less likely for Type IIDoes not assess application logic flaws or chained attack paths
Bug bounty programSupplementary evidence; unlikely to replace formal penetration testingInconsistent coverage; no guaranteed testing of all in-scope systems
Security code reviewValuable complementary evidence; does not replace runtime testingIdentifies code-level issues but not deployment or configuration vulnerabilities
Automated application security testing (DAST/SAST)Supplementary evidence; unlikely to replace penetration testingAutomated tools miss logic flaws and complex attack chains

The strongest position is to perform a formal penetration test. If budget or timing constraints make a full engagement impossible before the first audit, we advise our clients to communicate proactively with their auditor about the planned testing schedule and the compensating controls in place. Some auditors will accept a scheduled penetration test with a defined completion date, particularly for Type I engagements where the assessment is point-in-time.

Key Takeaways

  • We consistently see that SOC 2 auditors treat penetration testing as expected evidence for CC4.1 (monitoring activities) and CC7.1 (vulnerability identification), even though the Trust Service Criteria do not explicitly require it — companies that skip penetration testing face a higher risk of audit observations
  • What we recommend is treating penetration testing and vulnerability scanning as complementary, not interchangeable — vulnerability scanning identifies known vulnerabilities through automated tools, while penetration testing uses human testers to identify logic flaws, chained attack paths, and application-level vulnerabilities that scanners miss
  • Annual penetration testing is the standard minimum frequency for SOC 2, and we advise scheduling the test in the first half of the observation period to provide current evidence while allowing time for remediation of findings
  • In our experience, the right SOC 2 penetration test scope should include production web applications, APIs, cloud infrastructure, and authentication systems — gray box testing (providing testers with some architecture information) delivers the best balance of thoroughness and realism
  • Cost ranges from $5,000-$30,000 for most startup and growth-stage SaaS companies, with scope and application complexity as the primary cost drivers
  • Auditors evaluate penetration test evidence on five dimensions: scope coverage, test timing, tester qualifications, findings documentation, and remediation evidence — we advise our clients to ensure all five are addressed before presenting the evidence
  • We help our clients select penetration testing vendors, define appropriate scope for SOC 2 purposes, and integrate test findings into the broader compliance evidence program

Frequently Asked Questions

Will my auditor accept vulnerability scanning instead of penetration testing?

What we tell clients is to plan for needing both. Most auditors will not accept vulnerability scanning as a complete substitute for penetration testing. Vulnerability scanning is an automated process that identifies known vulnerability signatures, while penetration testing involves human testers actively attempting to exploit vulnerabilities — they assess fundamentally different aspects of your security posture. Some auditors may accept vulnerability scanning alone for a Type I audit if you can demonstrate a scheduled penetration test, but for Type II audits most auditors expect at least one penetration test during or close to the observation period. The advice we give is to discuss this with your auditor early in the engagement to set clear expectations.

How do I handle penetration test findings that reveal serious vulnerabilities?

The advice we give is to remediate critical and high-severity findings as quickly as possible, ideally before the SOC 2 audit fieldwork evaluates the relevant controls. Document the finding, your remediation plan, the remediation implementation, and verification testing that confirms the fix is effective. Auditors do not expect zero findings from penetration tests — in fact, a test with no findings may raise questions about the test's thoroughness. What auditors do expect, and what we coach our clients to demonstrate, is evidence that your organization identified the findings, assessed their risk, implemented remediation for critical and high-severity items, and verified the remediation was effective. Medium and low-severity findings should have documented remediation plans with target dates, even if remediation is not yet complete at the time of the audit.

Can our internal security team perform the penetration test?

What we tell clients is that internal penetration testing is acceptable to some auditors, provided the testers can demonstrate independence from the systems being tested and possess appropriate qualifications (OSCP, GPEN, or equivalent experience). The key concern is objectivity — if the same team that built and maintains the application also tests it, the auditor may question whether the testing was sufficiently rigorous and independent. In our experience, external third-party testing is more common and less likely to raise auditor questions about independence. If budget constraints make external testing prohibitive for the first audit, we recommend internal testing with documented methodology and qualified testers over no testing at all.

When should I schedule the penetration test relative to my SOC 2 audit?

The advice we give for Type II audits is to schedule the penetration test in the first half of the observation period. This ensures the test results fall within the observation window (satisfying the auditor's evidence timing requirements) while providing adequate time to remediate any critical or high-severity findings before the auditor evaluates your controls. For Type I audits, we recommend scheduling the test before or concurrent with the audit engagement. What we consistently warn clients about is scheduling the test immediately before the audit begins — a test that reveals significant vulnerabilities just days before audit fieldwork starts creates a difficult situation where findings may appear as exceptions because there was no time for remediation.

Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Get expert insights on cybersecurity compliance delivered to your inbox.