Q-Sec Blog

SOC 2 Penetration Testing: What Auditors Actually Expect

Written by Q-Sec Security Operations Center | 22 Mar, 2026

SOC 2 is the dominant trust and security certification for technology service providers, SaaS companies, and cloud platforms — particularly those serving enterprise customers in the US and increasingly in the EU. Unlike PCI DSS, SOC 2 does not explicitly require penetration testing. But if you're pursuing SOC 2 Type II — and especially if your customers are asking about your security posture — penetration testing has become a de facto expectation that auditors and enterprise procurement teams take seriously.

What SOC 2 Actually Says About Security Testing

SOC 2 is built around the AICPA's Trust Service Criteria (TSC). The Security category — CC6 and CC7 — includes controls around logical and physical access, system monitoring, and vulnerability management:

  • CC6.1 requires logical access controls, including mechanisms to prevent unauthorized access to systems.
  • CC6.6 requires security measures against threats from outside the system boundaries.
  • CC7.1 requires monitoring for indicators of compromise and detection of configuration vulnerabilities.
  • CC7.2 requires the evaluation of security events and determination of whether they constitute security incidents.

Penetration testing doesn't map directly to a single SOC 2 control. Instead, it provides evidence across multiple criteria — demonstrating that access controls actually prevent unauthorized access (not just that policies say they should), and that monitoring systems detect real attacks (not just theoretical ones).

Why Penetration Testing Has Become Expected for SOC 2

Three trends have driven the shift from penetration testing as an optional SOC 2 activity to an increasingly expected one:

1. Enterprise Customer Requirements

Large enterprise customers conducting vendor security assessments now routinely ask for penetration test reports as part of security due diligence questionnaires. Many organizations pursuing SOC 2 are doing so specifically to close enterprise deals — and those deals may require a recent pentest report alongside the SOC 2 attestation.

2. SOC 2 Auditor Expectations

While AICPA does not mandate penetration testing, individual SOC 2 auditors increasingly ask about it when evaluating vulnerability management controls. Organizations that cannot demonstrate how they verify their security controls are effective may find their SOC 2 report qualified with weaknesses in vulnerability management.

3. Cyber Insurance

Cyber insurers use SOC 2 certification as one signal of security maturity, but they also ask separately about penetration testing. A SOC 2 attestation without an underlying penetration test can result in higher premiums or exclusions for certain attack vectors.

SOC 2 Type I vs Type II: When to Pentest

For SOC 2 Type I (point-in-time attestation of control design), penetration testing supports the design evaluation but is less critical — Type I asks whether controls are designed appropriately, not whether they work under attack.

For SOC 2 Type II (attestation of control effectiveness over an observation period, typically 6–12 months), penetration testing is much more relevant. Auditors evaluating whether access controls and monitoring have been effective over the period will find a penetration test conducted during that period to be strong supporting evidence.

Best practice: conduct a penetration test before your SOC 2 Type II observation period begins, remediate critical findings, and include the test evidence in your control documentation. This gives auditors clean evidence of both testing and remediation.

Which Trust Service Criteria Does Penetration Testing Support?

Criteria Control Intent How Penetration Testing Supports It
CC6.1 Logical access controls prevent unauthorized access Pentest verifies controls cannot be bypassed
CC6.6 Network and infrastructure controls block external threats External pentest validates perimeter security
CC7.1 Vulnerability management process identifies and remediates weaknesses Pentest provides manual vulnerability evidence beyond automated scans
CC7.2 Security events are detected and evaluated Pentest may reveal gaps in detection and logging

 

SOC 2 Scope for Penetration Testing

SOC 2 testing scope should align with your defined system boundary — the set of infrastructure, software, and data covered by your SOC 2 report. This typically includes:

  • Cloud infrastructure (AWS, Azure, GCP environments in scope)
  • SaaS application(s) covered by the SOC 2 report
  • APIs used by customers or third-party integrations
  • Identity and access management systems
  • Development and CI/CD pipelines (if in scope for your SOC 2)

If you're unsure what falls within your SOC 2 system boundary, Q-Sec's compliance consulting team can help you define it before the penetration test — which also helps manage cost and scope creep.

SOC 2 and ISO 27001: Common Ground

Many technology companies pursue both SOC 2 and ISO 27001 — SOC 2 for North American market access and ISO 27001 for European enterprise customers. A penetration test conducted for one framework can satisfy both, provided the scope and methodology are aligned.

Q-Sec can structure a single engagement that generates evidence for SOC 2 (vulnerability management controls), ISO 27001 (Annex A control verification), and — if applicable — NIS2 or DORA requirements. See our guide on ISO 27001 penetration testing for details on multi-framework scoping.

Frequently Asked Questions

Will a SOC 2 auditor ask for a penetration test report?

Not always — but increasingly, yes. Auditors evaluating vulnerability management and access control effectiveness as part of SOC 2 Type II often request penetration test evidence. Whether it is formally required depends on the auditor and the controls you have mapped. If you operate in competitive markets where enterprise customers conduct vendor due diligence, having a recent pentest report is important regardless of auditor expectations.

How recent does the penetration test need to be for SOC 2?

No formal age requirement exists in SOC 2 standards. In practice, a test conducted within the observation period (or shortly before it) is most useful for SOC 2 Type II. Enterprise customers conducting vendor assessments typically expect a test within the past 12 months.

Can Q-Sec help with the full SOC 2 journey?

Yes. Q-Sec provides penetration testing aligned to SOC 2 Trust Service Criteria and compliance consulting for organizations preparing for their first SOC 2 audit or maintaining continuous readiness. Our Managed SIEM and SOC-as-a-Service provide the ongoing monitoring controls that SOC 2 Type II auditors evaluate throughout the observation period.

SOC 2 ready? Q-Sec delivers penetration testing and compliance consulting that supports your full Trust Service Criteria program. Contact team@q-sec.com