ModernPentestModernPentest

SOC 2 Reports

Generate auditor-ready SOC 2 compliance reports

SOC 2 Reports

ModernPentest generates SOC 2-ready reports that auditors accept. This guide explains how to generate reports, understand each section, and interpret your compliance status.

Why SOC 2 Matters

SOC 2 compliance is often required for:

  • Enterprise sales - 60% of companies prefer SOC 2-certified vendors
  • Investor requirements - VCs increasingly require SOC 2 for portfolio companies
  • Customer trust - Demonstrates your commitment to security
  • Competitive advantage - Unblock deals that competitors can't close

Penetration Testing in SOC 2

SOC 2 Trust Services Criteria requires penetration testing:

CC4.1 - Monitoring Activities

The entity continuously monitors the system, including penetration testing, to identify changes that may significantly affect internal control effectiveness.

CC7.1 - Vulnerability Management

The entity has implemented vulnerability management procedures to identify, evaluate, and address vulnerabilities in a timely manner.

ModernPentest satisfies both requirements with continuous automated testing and comprehensive reporting.

Generating a SOC 2 Report

  1. Navigate to Reports in the dashboard
  2. Click Generate SOC 2 Report
  3. Select the application(s) to include
  4. Choose the date range (typically your audit period)
  5. Click Generate

Screenshot: SOC 2 report generation

Reports typically generate within 2-3 minutes. You'll receive an email notification when ready.

Understanding Your SOC 2 Report

Once generated, your report contains seven detailed sections. Use the navigation bar at the top of the report to jump between sections.

Executive Summary

The executive summary provides a high-level overview of your security posture:

Executive Summary section

  • Compliance Status Badge - Overall PASS, FAIL, or CONDITIONAL_PASS status
  • Key Metrics Cards - Total pentests, applications tested, and findings count
  • Severity Distribution Chart - Donut chart showing Critical/High/Medium/Low breakdown
  • OWASP Categories Chart - Top vulnerability categories discovered
  • Compliance Statement - Narrative summary of your compliance posture

Testing Methodology

This section documents how testing was performed:

Testing Methodology section

  • Security Frameworks - Standards followed (NIST, OWASP, etc.)
  • Security Tools - Tools used (nmap, nuclei, sqlmap, etc.)
  • Coverage Gauges - Visual meters showing OWASP Top 10 and API Security coverage percentages
  • Testing Phases - Expandable accordion showing each phase (Reconnaissance, Scanning, Exploitation, etc.) with techniques used
  • Testing Schedule - Table of applications with their testing frequency (Daily/Weekly/Monthly)
  • Severity Classification - Criteria for Critical, High, Medium, and Low ratings
  • Validation Process - Automated and manual verification steps, including false positive rate
  • Limitations - Scope boundaries and testing constraints

Scope Definition

The scope section defines what was tested:

Scope Definition section

  • Testing Period - Start and end dates for the audit period
  • Applications Grid - Interactive table showing:
    • Application name
    • Environment (Production, Staging, Development)
    • Attack surfaces (Web, API, Mobile)
    • Number of pentests performed
    • Vulnerability counts by severity
  • Out of Scope Items - Systems or components excluded from testing
  • Scope Statement - Narrative defining the testing boundaries

Security Findings

The findings section provides detailed vulnerability information:

Security Findings section

  • Severity Summary Cards - Count of Critical, High, Medium, and Low findings
  • Findings Data Grid - Expandable table with:
    • Severity badge
    • Vulnerability title with OWASP and CWE references
    • Affected application and endpoint
    • Current status
    • Detection date

Click any row to expand and view:

  • Evidence Summary - Proof of the vulnerability
  • Business Impact - Potential consequences
  • Proof of Concept - Code block demonstrating the issue
  • Remediation Guidance - Steps to fix the vulnerability

Remediation Tracking

Track your team's progress on fixing vulnerabilities:

Remediation Tracking section

  • Key Metrics
    • Average Time to Fix (days)
    • Remediation Rate (percentage of resolved findings)
  • Status Distribution Chart - Pie chart showing:
    • Open (unaddressed)
    • In Remediation (work in progress)
    • Remediated (fix applied, awaiting verification)
    • Fixed (verified resolved)
    • Risk Accepted (acknowledged and accepted)
  • Progress Bar - Multi-colored bar showing remediation progress at a glance
  • Commentary - Narrative about your remediation commitment

Evidence Package

Auditors need evidence that testing occurred. This section provides:

Evidence Package section

  • Testing Frequency - How often pentests run
  • Total Pentests - Number of pentests during the audit period
  • False Positive Rate - Accuracy metric for findings
  • API Coverage (if applicable) - Endpoints tested vs. total endpoints
  • Recent Pentest Activity - Table of recent scans showing:
    • Status and application name
    • Target URL and scan type
    • Duration and timestamps
    • Vulnerability results by severity
  • Audit Trail - Complete logs are retained and available upon request

SOC 2 Readiness Assessment

This section evaluates your readiness for SOC 2 certification:

SOC 2 Readiness Assessment

Readiness Score

Your overall readiness is displayed as a percentage (0-100%) with a status level:

StatusMeaning
ReadyYou meet the requirements for SOC 2 compliance
At RiskSome issues need attention before certification
Not ReadySignificant gaps must be addressed
Establishing BaselineInitial testing in progress, insufficient data

Score Breakdown (100 Points)

Your readiness score is calculated from four components:

ComponentPointsWhat It Measures
Critical SLA Score35Remediation of critical vulnerabilities within SLA timeline
High SLA Score25Remediation of high vulnerabilities within SLA timeline
Testing Frequency Score30Regular, consistent scanning cadence
Scan Coverage Score15All applications scanned within 90 days

Each component shows points earned, total available, and a progress bar.

Compliance Blockers

Critical issues that prevent certification are highlighted:

  • What triggers a blocker: Critical/high severity vulnerabilities exceeding SLA, or missing required testing
  • How to resolve: Address the listed issues and re-run your pentests

SLA Compliance

Track whether vulnerabilities are remediated within acceptable timeframes:

  • Critical Vulnerabilities - Count within SLA vs. exceeding SLA
  • High Vulnerabilities - Count within SLA vs. exceeding SLA
  • Fixed Within SLA - Verified remediations meeting timeline requirements

Trust Services Criteria

Detailed compliance cards for:

  • CC4.1 (Monitoring Activities) - Status, statement, and evidence checklist
  • CC7.1 (Vulnerability Management) - Status, statement, and evidence checklist

This section measures only CC4.1 and CC7.1 criteria. Full SOC 2 certification requires additional controls (access control, incident response, change management). Consider platforms like Vanta or Drata for complete compliance management.

Reading Your Report

Quick reference for interpreting report data:

Severity Levels

SeverityColorMeaning
CriticalRedImmediate exploitation risk, requires urgent action
HighOrangeSignificant risk, address within days
MediumAmberModerate risk, address within weeks
LowLime/GreenMinor risk, address as time permits

Compliance Status

StatusMeaning
PASSMeets all SOC 2 requirements
CONDITIONAL_PASSMeets requirements with noted exceptions
FAILDoes not meet requirements, action needed

Remediation Status

StatusMeaning
OpenVulnerability identified, not yet addressed
In ProgressActively being remediated
RemediatedFix applied, awaiting verification
FixedVerified resolved
Risk AcceptedAcknowledged and accepted by stakeholder

Sharing Your Report

Click the Share button in the report header to copy a shareable URL to your clipboard. Share this link with auditors or team members who need access.

PDF Download

Click Download PDF to generate a professional PDF document. This button is available once the report status is "completed."

PDF generation may take a moment for large reports with many findings.

Auditor FAQ

Common questions auditors ask and how ModernPentest addresses them:

"Is this automated testing acceptable?"

Yes. SOC 2 doesn't mandate manual penetration testing. Automated continuous testing often provides better coverage than annual manual assessments. Our methodology is documented and consistent.

"How do you ensure testing accuracy?"

We maintain a less than 5% false positive rate through:

  • AI-powered validation
  • Evidence-based findings
  • Proof-of-concept verification

"What vulnerabilities do you test for?"

Complete OWASP Top 10 (2021) and OWASP API Top 10 (2023) coverage, plus:

  • Platform-specific checks (Supabase, Firebase, Vercel)
  • Business logic vulnerabilities
  • Authentication and authorization flaws

"How often is testing performed?"

Configurable based on your needs:

  • Daily quick pentests for continuous monitoring
  • Weekly standard pentests for comprehensive coverage
  • On-demand deep pentests before releases

"Can you provide evidence of testing?"

Yes. Each report includes:

  • Detailed pentest logs
  • Request/response evidence
  • Screenshots where applicable
  • Timeline of all testing activities

Best Practices for Audits

  1. Test regularly during the audit period - Run at least weekly pentests
  2. Address findings promptly - Auditors look at remediation timelines
  3. Document risk acceptances - Explain any findings you've accepted
  4. Maintain consistent coverage - Test all applications in scope
  5. Generate reports early - Review before your audit window closes

Auditor Support

Need help with your audit? We offer:

  • Report Review - We can review your report format with your auditor
  • Custom Mapping - Adjust criteria mapping for your specific audit
  • Evidence Packages - Additional documentation if requested

Contact support@modernpentest.com for assistance.

Next Steps

Last updated: December 8, 2025

On this page