Skip to main content
QuantLab Logo

MOFU Compliance Guide · 2026

SOC 2 Pentest Prep: A SaaS Founder's Guide for 2026

The honest founder's guide to a SOC 2-aligned penetration test. What auditors actually want, how to scope without overpaying, the remediation window every Type II requires, and the 14 mistakes that cost founders three audit cycles.

By Bill Beltz, founder of QUANT LAB USA INC · Published May 12, 2026

Quick answer

SOC 2 expects an annual penetration test against your production application plus any in-scope infrastructure. Auditors map it to Trust Services Criteria CC4.1 and CC7.1. Run the engagement 30 to 60 days before the Type I audit date or in the first quarter of the Type II observation period. Plan $15K to $35K, a 2 to 3-week engagement, and a documented remediation cycle. Cheap vulnerability scans will fail audit.

A SOC 2 pentest is not a real attacker simulation. It is an evidence-production exercise wrapped around a real engagement. The auditor needs three things: a scope that matches your system description, a methodology document, and a closed remediation loop. Everything else — the depth of testing, the chained findings, the business logic flaws — that is what makes you actually more secure. The auditor does not see it.

This guide separates the two concerns: what you need to satisfy SOC 2, and what you should actually do to harden the product. I have worked with SaaS founders going through both SOC 2 Type I and Type II audits and watched the same scoping mistakes happen at every stage. Here is the playbook.

What the auditor actually wants

Auditors do not read the pentest report cover to cover. They look for five specific artifacts.

  1. Methodology document. What standard was followed (OWASP, NIST 800-115, MITRE ATT&CK). What testing types were performed. Hours logged.
  2. Scope statement. Which production assets were tested. The scope must match (or be a defensible subset of) the system description in the SOC 2 report.
  3. Findings summary. Severity counts and short titles. Auditors look for a structured severity rubric (Critical, High, Medium, Low, Informational).
  4. Remediation evidence. For each Critical and High, a documented owner, due date, and verification — typically the retest result.
  5. Date of test and date of retest. The interval matters. A 9-month gap between finding and verification is a red flag.

Scoping a SOC 2-aligned pentest

Scope is the most expensive variable in a SOC 2 pentest. Over-scope and you spend $50K on assets the auditor does not care about. Under-scope and the auditor flags it during fieldwork. Here is the minimum viable scope for a typical Series A SaaS:

  • Production web application with authentication flow
  • Production API (REST or GraphQL) with the same auth
  • One representative tenant on each role tier (admin, member, viewer)
  • Authentication infrastructure (SSO, OAuth, MFA paths)
  • Public-facing infrastructure (the production domain plus subdomains)

For more on what a web app pentest entails, see the service page. For SOC 2, you will also want the general pentest service overview.

SOC 2 pentest cost ranges by stage

SaaS profileSOC 2 pentest rangeAudit timing
Pre-seed, single web app, Type I$10K to $18K4 to 6 weeks pre-audit
Series A, web + API, Type I$15K to $25K6 to 8 weeks pre-audit
Series A, web + API + AD, Type II$25K to $45KQ1 of observation period
Series B, multi-app + mobile + infra, Type II$45K to $85KQ1 + retest in Q4

Run the numbers for your own profile with the pentest cost calculator. For deeper pricing breakdown see the 2026 pentest cost guide.

The 14 mistakes that cost founders three audit cycles

  1. Hiring a scan-only vendor. The Nessus output with a logo. Will not satisfy a real auditor.
  2. Scoping out the API. If the web app is in scope, the API the web app calls is in scope too. Auditors notice.
  3. Scoping out the admin panel. If employees access production through it, it is in scope.
  4. Testing one role only. Multi-tenant SaaS needs role-based testing. Test admin, member, and viewer at minimum.
  5. Running the pentest after the audit period starts. For Type II, the control needs to operate during the period.
  6. Treating the report as the deliverable. The deliverable is the remediation cycle. Findings without fix evidence will get flagged.
  7. Missing the retest. Most auditors want the retest within 60 to 90 days for Critical findings.
  8. Skipping the methodology document. The 2-page methodology is the artifact the auditor reads first.
  9. No documented severity rubric. Auditors want a structured Critical/High/Medium/Low scale, not a narrative.
  10. Mismatched system description. If the SOC 2 description says "all production services" but the pentest scope says "the marketing site," that is a flag.
  11. Letting the contract auto-renew without retest. A 12-month-old pentest is stale. Plan the cadence.
  12. Not aligning to ATT&CK. Auditors are increasingly looking for ATT&CK technique IDs in findings — it shows methodology depth.
  13. No documented exception process. Some findings cannot be fixed in the audit window. You need a documented exception with rationale, mitigation, and timeline.
  14. Wrong vendor for the stage. A Big-4 firm for a seed-stage SaaS is overkill and signals immaturity. A solo Fiverr tester for a Series B is the opposite signal.

Mid-post: free SOC 2 scoping call

Heading into a SOC 2 Type I or Type II? Free 30-minute call. We will help you scope to the minimum viable engagement that satisfies your auditor.

The remediation window that every Type II requires

Type II is about control operation over time. The auditor wants to see that when a finding lands, a process exists and runs. Here is the remediation cycle that satisfies every Type II auditor we have worked with:

  1. Critical: triage within 5 business days, fix and retest within 30 days.
  2. High: triage within 10 business days, fix and retest within 60 days.
  3. Medium: triage within 30 days, fix or document risk-accept within 90 days.
  4. Low: triage within 30 days, batch into the next quarterly release.
  5. Informational: document and close.

The remediation timeline lives in a ticket system (Jira, Linear) with owner, due date, and evidence link. The evidence is usually the retest result and a code review or infrastructure change PR. Without this loop, the control is theatre.

What to fix before the pentester arrives

You do not want the pentester to file 40 findings for issues you could have fixed yourself in a weekend. Quick pre-engagement hygiene that pays back:

  • Run the web app pentest checklist as a pre-engagement self-audit.
  • Enable security headers (CSP, HSTS, X-Frame-Options, Referrer-Policy).
  • Rotate or disable any test accounts in production.
  • Patch dependencies. Run `npm audit` or `pip-audit` and clear high-severity CVEs.
  • Enable MFA on every production admin account.
  • Audit RBAC: any cross-tenant data access should require a separate auth check, not just URL guessing.
  • Rate-limit auth endpoints, password reset, and resource enumeration.
  • Document the system architecture diagram for the pentester.

The vendor signals that matter for SOC 2

Not every pentest vendor is built for SOC 2 evidence production. Six questions to ask:

  • Will your report include an ATT&CK technique ID for each finding?
  • Will you include a written methodology that maps to NIST 800-115 or OWASP?
  • What is your turnaround on retest evidence?
  • What is your standard severity rubric?
  • Have you worked with my SOC 2 auditor before? (Vanta, Drata, Secureframe, Thoropass)
  • Do you offer a free executive summary suitable for sharing with prospects under NDA?

For comparison, see our breakdown of the best penetration testing companies in Georgia (2026).

Real-world example: Series A SaaS heading into Type II

A representative engagement: a 12-seat B2B SaaS with a single multi-tenant web app, REST API, and AWS infrastructure. SOC 2 Type II observation period starts in 90 days. Scope: web app, API, and AWS configuration review. Cost: $28K including report and retest. Timeline: 3-week engagement plus 60 days remediation window before the period starts. Findings: 1 critical (cross-tenant data leak via an unscoped list endpoint), 4 high, 11 medium. All criticals and highs closed within the remediation window. The Type II report came back clean a year later.

For more on how we work with SaaS founders, see our SaaS industry page. For an example of the kind of operations-platform engagement that often runs in parallel, see the regional medical billing case study.

Frequently asked questions

Is a penetration test required for SOC 2?

SOC 2 does not explicitly mandate a pentest, but the Trust Services Criteria CC4.1 and CC7.1 require monitoring and risk assessment that auditors universally interpret as requiring annual penetration testing. Every reputable Type II audit firm we have worked with asks for the pentest report as evidence. Plan on annual at minimum.

How soon before the SOC 2 audit should I do the pentest?

For Type I, do the pentest 30 to 60 days before the audit period start so you have time to remediate critical findings. For Type II, do the pentest in the first quarter of the observation period and a follow-up retest in the final quarter. Auditors want to see a finding-to-fix cycle, not a single point-in-time snapshot.

What scope does the auditor expect for SOC 2 pentests?

Production application, production API, and authentication infrastructure at a minimum. If you have an internal admin tool, employees with elevated production access, or a multi-tenant data plane, those become in-scope too. Auditors will read your system description and challenge you if the pentest scope is narrower than the system boundary.

What is the difference between SOC 2 Type I and Type II pentest expectations?

Type I is a point-in-time attestation; the auditor cares that controls exist on the audit date. A single annual pentest with remediation evidence is usually fine. Type II is an observation period (typically 6 to 12 months); the auditor expects evidence that the pentest control operated continuously. That usually means at least one full pentest within the period plus a retest of critical findings.

Will critical findings fail my SOC 2?

Not by themselves. SOC 2 is about control operation, not perfection. A critical finding becomes a problem if there is no remediation evidence, no documented owner, no timeline, or if the same critical finding appeared in last year's report. Auditors care about process maturity more than the count of findings.

Should I use the same pentest vendor every year?

Mixed evidence. Same vendor knows your environment and catches regressions. Different vendor brings fresh eyes and catches blind spots. Best practice: rotate every 2 to 3 years, or use one vendor for the primary annual pentest and a different vendor for a smaller targeted engagement (mobile, API, AD) on alternating years.

Can a vulnerability scan substitute for a pentest for SOC 2?

No. The auditor will ask for the methodology document. A scan-only report (Nessus, Qualys, Tenable.io) will be flagged. The control requires human-driven testing. Plan on an actual pentest from a vendor that does manual testing aligned to OWASP, NIST 800-115, or MITRE ATT&CK.

What does a SOC 2 pentest cost in 2026?

A typical Series A SaaS pentest for SOC 2 runs $15,000 to $35,000 in 2026. Scope drivers: number of user roles in the application, whether the API is in scope (it should be), and whether the auditor wants production AD testing. See our full breakdown in the pentest cost guide.

What happens if the pentest finds nothing?

Auditors are skeptical of zero-finding reports. They will ask for the test plan, hours logged, and methodology. A well-written zero-finding report (because the environment is genuinely well-built) will pass, but a templated zero-finding report from a scan-only vendor will be rejected. Quality of evidence matters more than the count.

Can I get a SOC 2 pentest in 2 weeks?

If you already have a vendor lined up, yes. A standard web app pentest fits in 2 to 3 weeks from kickoff to report. If you are starting from RFP today, plan on 6 to 10 weeks because vendor scheduling, contracting, and scoping take 4 to 8 weeks of lead time on top.

Do I need a pentest before SOC 2 Type I if I am pre-revenue?

Yes, if the product is in production. Pre-revenue does not exempt you from the control. If the product is still in private beta with under 5 customers, you may be able to satisfy the control with a smaller targeted engagement plus a documented program. Talk to your auditor before scoping.

Can QUANT LAB USA do our SOC 2 pentest?

Yes. We do SOC 2-aligned web app, API, and AD pentests for SaaS founders heading into Type I or Type II. Engagements include the methodology document the auditor wants, ATT&CK-mapped findings, a remediation review session, and a 30-day retest. We work with the major SOC 2 auditors (Vanta, Drata, Secureframe, Thoropass) and have seen what they ask for in evidence.

SOC 2 audit on the horizon.

Free scoping call. We will tell you the minimum viable engagement to satisfy your auditor and the realistic timeline to land your Type I or Type II.

Or call Bill directly at (770) 652-1282
All blog postsUpdated May 12, 2026