SOC2-CC7-PENTEST

Annual Penetration Testing

detectivehigh effectivenessAnnually

What this control does

Annual external penetration test of production infrastructure and applications by an independent third party.

Implementation guidance

Engage a qualified third-party firm annually for a black-box or grey-box pentest of your production environment. Scope must include web application, APIs, and network perimeter. Obtain a written report with findings and remediation guidance. Track and close critical/high findings before next audit.

Requirements satisfied

CC7.1

Why it matters

An annual external pentest by independent testers identifies vulnerabilities and misconfigurations that internal teams may miss or rationalize away, reducing the risk of exploitation by actual attackers before detection systems catch them. Without this systematic external perspective, organizations accumulate exploitable weaknesses in production applications and infrastructure that violate CC7's requirement to identify and remediate security gaps through detective controls.

Evidence to collect

  • Signed statement of work or contract with third-party pentest firm naming scope (production infrastructure, web apps, APIs, network perimeter), testing methodology (black-box or grey-box), and engagement dates within the past 12 months
  • Pentest final report with executive summary, detailed findings ranked by severity (critical/high/medium/low), proof-of-concept evidence, and remediation recommendations
  • Issue tracking evidence (Jira, GitHub, spreadsheet, etc.) showing critical and high findings from the pentest report linked to closure tickets with remediation dates and verification notes
  • Evidence of remediation verification—either retesting results from the pentest firm, or security team validation (screenshots, log excerpts, configuration reviews) confirming fixes before the next audit cycle

Testing procedure

Request the signed pentest engagement agreement and obtain the final report dated within the previous 12 months; verify scope explicitly covers production applications, APIs, and network perimeter at your primary data centers or cloud regions. Cross-reference all critical and high findings in the report against your issue tracking system to confirm they were assigned, remediated, and closed before the current audit period. For a sample of 3–5 remediated findings, request evidence of remediation (patched versions, configuration changes, or retesting confirmation) and verify closure dates fall before your next planned pentest or audit cutoff.

Common gotchas

Organizations often scope pentests too narrowly (e.g., excluding APIs or only testing staging environments), reducing their value; ensure the SOW explicitly names all production systems. Many teams fail to track pentest findings in their standard issue workflow, causing loss of visibility and accountability—embed pentest findings into Jira/Azure DevOps from day one so remediation is visible and prioritized alongside other work.