03. what we test
Typical SOC 2 pentest scope.
Scope follows your system description. Most SOC 2 pentests cover application, API, and network layers. Cloud configuration and admin access paths are commonly added.
Web application and API
Authenticated and unauthenticated paths. Authentication logic, session handling, authorization flaws, business logic, third-party integrations. OWASP WSTG aligned.
Admin consoles and internal tooling
Often the highest-risk surface in a SOC 2 scope. Internal tools frequently lack the same review cycle as the customer-facing product.
Network perimeter
Exposed services, port survey, TLS configuration, certificate hygiene. What an external attacker sees before they reach your application.
Cloud configuration
S3 / GCS / Blob storage permissions, IAM policy review, metadata-service exposure, logging gaps. Common finding in SaaS SOC 2 audits.
Secrets and credential exposure
Hardcoded secrets, exposed environment variables, leaked credentials in public repos, overprivileged service accounts. Each one is a CC6.1 finding.
Third-party integrations
OAuth flows, webhook trust, outbound API key storage and rotation. Third-party access is in scope for CC6.1 and often missed in vendor-led assessments.