SOC 2 Penetration Testing Report: What Auditors Require (2026)
SOC 2 does not specify exactly what your penetration test report must contain, but auditors have clear expectations. If your pentest report is missing key elements, it can fail your SOC 2 audit or trigger a finding against your security program - even if the test itself was thorough.
This guide explains what a SOC 2 penetration testing report needs to include, how to structure it for auditor review, and the common mistakes that cause SOC 2 reports to be questioned.
Why SOC 2 Pentest Reports Are Different
SOC 2 is a compliance framework based on Trust Services Criteria (TSC). It is not prescriptive like PCI DSS. There is no official checklist.
Your auditor evaluates whether your penetration testing program demonstrates proper security control testing. The report needs to show:
- What was in scope
- Who performed the test and when
- What methodology was used
- What findings were discovered
- What was done or planned in response
SOC 2 Scope and What Must Be Tested
Scope should map to your SOC 2 system description. Your report scope section should state:
- All systems tested
- Systems in SOC 2 boundary excluded and why
- Cloud environments tested
- Internal vs external test scope
- Black box, gray box, or white box
Methodology Requirements for SOC 2 Pentest Reports
Include:
- Named testing framework (OWASP, PTES, NIST SP 800-115)
- Categories of testing
- Tools used with versions
- Testing window and hours
- After-hours testing pre-approval
Tester Qualification Documentation
- Testing firm name and contact
- Tester certifications (OSCP, CISSP, CEH)
- Years of experience
- Independent third party status
Findings Documentation for SOC 2
For each finding:
- Finding title and description
- Affected system mapping to SOC 2 boundary
- Severity with CVSS score
- Which TSC criteria affected (CC6, CC7, CC9)
- Remediation status
- Planned remediation date
See our pentest report example for sample findings documentation.
Remediation Response Documentation
Show:
- Date findings communicated
- Remediation status at report delivery
- Expected remediation dates
- Retest results if available
Annual vs One-Time Pentest for SOC 2
SOC 2 Type 2 covers 12 months. Plan testing within the examination period.
Common SOC 2 Pentest Report Failures
- Scope not matching SOC 2 boundary
- No remediation documentation
- Missing tester qualifications
- No retest evidence
- Outdated testing
Generate SOC 2 Ready Pentest Reports Faster
PentestReportAI generates compliance-ready pentest reports with proper SOC 2 structure, TSC mapping, and remediation tracking - all processed locally on your machine.
Try it free - 2 credits, no card required