The Security Liabilities of 3rd Party Libraries
Understand the security risks of using 3rd party code libraries, and how to mitigate these risks in a 3rd party dependant cyber environment.
Explore the importance of SOC 2® reports and penetration tests in enhancing your organization's cybersecurity.
TL;DR:
We get asked a lot about whether penetration testing is required to complete a SOC 2 report. The short version of the answer is “no” - there are no explicit requirements for penetration testing (or any controls) within a SOC 2 report. The longer version is nuanced but generally gets answered by asking a few questions:
Do you have any customer contracts requiring a penetration test? If yes, then it’s required. Granted, that one is easy, but other aspects of the decision aren’t quite as clear. Here are some additional considerations:
So, a penetration test isn’t required to complete a SOC 2 report, but it is highly advisable. Penetration testing is the most common requirement as the last component to close a deal with an enterprise customer (along with having a SOC 2 report).
A penetration test (or pentest for short) is a type of security test designed to identify vulnerabilities in your computer system, network, or application that an attacker could exploit. By having a third party perform a penetration test, you’ll get an overview of your overall security posture, including vulnerabilities identified, plus detailed replication and remediation suggestions so you can improve your security program.
Risk reduction is the ultimate goal of a penetration test, so it makes sense that it supports SOC 2 reports.
SOC 2 is an adjective that describes the compliance framework and the auditor’s report that details how you protect customer data, intending to help establish trust with your customers. A SOC 2 auditor evaluates the controls you have in place to protect the customer data you process and ensures you are doing what you say you will do.
The American Institute of Certified Public Accountants (AICPA) has developed a set of criteria (the trust services criteria) to evaluate an organization’s controls; they are organized into the following five categories:
Security is generally the only category that must be covered in a SOC 2 report, but ultimately the categories covered depend on the types of services you provide. The selected categories define the areas your security program will be audited against, but laws, regulations, and customer requirements determine your organization's requirements. You decide on the policies and procedures you implement to meet those requirements and should tailor your internal controls to your risks and the resources available. So, thinking about it like that, completing penetration tests is an example of a control that can be used to help meet certain requirements in various categories.
A SOC 2 report typically includes a control matrix that maps your controls against the applicable trust services criteria to visualize the key controls you identify as necessary to meet your commitments to the relevant criteria. Each report includes the common criteria (CC) relevant to all five trust services categories, plus any specific criteria for additional categories you select.
The common criteria are organized into nine categories:
Within the matrix, those nine categories outline the criteria you are required to evaluate and describe the controls you’ve implemented and consider necessary to meet your objectives. Below is an overview of the specific criteria that may be supported by performing a penetration test. Note: The criteria and requirements included below are not the complete set.
Risk Assessment
Monitoring Activities
Control Activities
Logical and Physical Access Controls
System Operations
The AICPA provides points of focus for each criterion meant to represent important characteristics of each, but each organization is unique, and the application of any individual control is not universal. So, it’s important to use your judgment when applying the trust services criteria to your organization. However, the illustration does demonstrate the coverage penetration testing can provide for your security program and its importance in achieving effective internal controls.
Admittedly, that was a long-winded way of saying that penetration tests aren’t required to complete a SOC 2 report, but they are a great tool in general on your quest to build a strong security program.
Thanks to our friends at MJD Advisors for partnering with us on this article. MJD Advisors is one of our amazing compliance partners who share our passion for improving security programs, while providing best practices, recommending efficient procedures, and reimagining compliance for your organization.
Security
Can be easily manipulated without detection if not properly secured.
Digitally signed and can be validated on the server. Manipulation can be detected.
Size
Limited to 4KB.
Can contain much more data, up to 8KB.
Dependency
Often used for session data on the server-side. The server needs to store the session map.
Contains all the necessary information in the token. Doesn’t need to store data on the server.
Storage Location
Browser cookie jar.
Local storage or client-side cookie.
The advantages and disadvantages of testing on staging compared to production. Which one provides more value.
Providing the quality of the biggest names in security without the price tag and complications.
Manual penetration testing
Full time Canadian hackers
Remediation support