SOC 2 Type I Point-in-time security control testing to identify the effectiveness of the controls and whether they are appropriate.
SOC 2 Type II Ongoing or regular security control testing over a period of 12-months to determine the effectiveness of the controls and ensure they fulfill the requirements of AICPA's Trust Services Criteria. SOC 2 Type II testing is more comprehensive and valuable to assess your organization's long-term commitment and strategy regarding proactive security measures.
COSO Principle 16 "The entity selects, develops, and performs ongoing and/or separate evaluations to ascertain whether the components of internal control are present and functioning."
CC4.1 Focus Point "Management uses a variety of different types of ongoing and separate evaluations, including penetration testing, independent certifications made against established specifications (for example, ISO certifications), and internal audit assessments."
Requirement SOC 2 includes a requirement to perform regular penetration testing to assess the security of systems and applications. This testing aims to simulate real-world attacks and assess an organization`s ability to detect and respond to security threats.
Scope BreachLock penetration testing typically covers various areas, including network infrastructure, web applications, APIs, and other systems that store or process customer data. It helps ensure that security controls are effective and up to date.
Vulnerability Identification BreachLock penetration testers attempt to identify vulnerabilities, such as misconfigured security settings, software vulnerabilities, or weak authentication mechanisms for validation, prioritization, and remediation.
Prioritization and Remediation After the penetration testing is completed, the BreachLock Platform will prioritize those assets and associated vulnerabilities that are at highest risk by providing remediation recommendations to strengthen security controls and meet SOC 2 requirements.
Reporting and Certification BreachLock offers industry vetted SOC 2 compliance reports and certifications acceptable by SOC 2 auditors and regulators, all downloadable directly within our Platform.
Ongoing Testing SOC 2 compliance is not a one-time event. Penetration testing should be conducted regularly to ensure that security controls remain effective and that new vulnerabilities are promptly addressed.