Also, the awkward moment in a SOC 2 audit is not when you show your policies, it’s when the auditor asks what you did to prove those controls work in real life. A written process for patching or access reviews is a start, but auditors often want independent validation that your environment is not wide open to known issues.
A practical benchmark is that many organizations run vulnerability scans monthly and a penetration test annually. That cadence is not a SOC 2 rule, but it is common because it creates regular, time-stamped evidence and shows you are checking for exposure across the year, not only before the audit.
Next, pick testing that matches what you actually run in production and what your customers can touch. If you do one thing, do an external vulnerability scan of internet-facing assets, then show how you triage and fix the findings.
A simple decision guide:
If you ship weekly or deploy often, run authenticated vulnerability scans at least monthly and after major changes
If you are early-stage with a small stack, start with quarterly scans and a clear remediation workflow, then increase frequency as you grow
If you handle sensitive customer data or have a complex network, budget for an annual third-party penetration test plus periodic targeted tests after big releases
If you’re short on time, scan the external perimeter first (domains, cloud IPs, VPN endpoints) and document the remediation for the top findings
But evidence is not the raw report dump, it’s the story of how you detect issues, decide priority, and confirm fixes. Auditors are usually looking for a trail that is repeatable and tied to your risk process, not a one-off test.
Include these items in your audit packet:
Scope statement showing what assets were tested (for example, production web app and API, corporate endpoints, cloud accounts)
Dates and frequency (for example, monthly scan schedule, annual pen test window)
Tool or provider name and whether the scan was authenticated (logged in) or unauthenticated
Triage record that shows severity, owner, and target fix date (a ticket list is fine)
Remediation proof for 2 to 5 representative findings (before and after screenshots, patch version, or configuration change record)
Retest evidence showing the issue is closed or risk accepted with approval
Here’s the catch: a common mistake is to present a pen test as a checkbox and ignore follow-up. The fix is to show the closed loop, even if you only remediate the critical and high issues within 7 to 30 days and schedule the rest.
So by the end of this section, you can choose a testing set that fits your reality and still satisfies audit scrutiny: a regular vulnerability scan cadence, an annual pen test when it makes sense, and clear remediation evidence. You’ll also be able to present the results as support for SOC 2 criteria by showing monitoring, response, and continuous improvement rather than only handing over reports.