DarkPoint Security provides SOC 2 penetration testing services designed to help organizations demonstrate the effectiveness of their security controls to auditors and stakeholders. Our security assessments map directly to the AICPA Trust Service Criteria, giving your auditor the evidence needed to evaluate your control environment during Type I and Type II examinations.
SOC 2 (System and Organization Controls 2) is an auditing framework developed by the American Institute of Certified Public Accountants (AICPA) that evaluates how organizations manage and protect customer data. The framework is built around five Trust Service Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. Of these, Security is the only mandatory criterion and forms the foundation of every SOC 2 examination. Organizations select additional criteria based on the nature of their services, customer expectations, and contractual obligations.
SOC 2 reports come in two types. A Type I report evaluates whether an organization's controls are suitably designed at a specific point in time. A Type II report goes further by assessing both the design and operating effectiveness of those controls over an observation period, typically six to twelve months. Type II reports are considered significantly more rigorous and are the standard expectation for enterprise customers conducting vendor due diligence. Most organizations pursuing SOC 2 compliance ultimately aim for a Type II report, as it provides the strongest assurance that security controls are functioning consistently.
SOC 2 compliance is particularly relevant for SaaS providers, cloud service providers, managed service providers, data centres, and any technology organization that stores, processes, or transmits customer data. In Canada, where organizations must also consider obligations under PIPEDA (Personal Information Protection and Electronic Documents Act), SOC 2 provides a recognized framework for demonstrating that appropriate safeguards are in place to protect personal information. For Canadian businesses serving clients in the United States or handling cross-border data, a SOC 2 report has become a baseline expectation in procurement and vendor risk management processes.
While the AICPA Trust Service Criteria do not explicitly require penetration testing by name, several criteria establish control objectives that penetration testing directly supports. Most SOC 2 auditors consider penetration testing an essential component of a mature security program and expect to see it as evidence of control effectiveness, particularly for the Security criterion.
For SOC 2 Type II engagements, penetration testing results conducted within the observation period provide your auditor with direct evidence that security controls were tested and validated during the reporting window. Timing your SOC 2 penetration testing to fall within this period is critical for maximizing the value of the assessment.
DarkPoint Security aligns our penetration testing services to the SOC 2 Trust Service Criteria, ensuring that every engagement produces findings and documentation that map directly to the control objectives your auditor will evaluate. Our SOC 2 security assessment methodology covers the full scope of your technology environment.
Our reports are written with SOC 2 auditors in mind. Each finding includes a mapping to the relevant Trust Service Criteria, severity classification based on exploitability and business impact, exploitation evidence, and actionable remediation guidance. For Canadian organizations subject to PIPEDA, our assessments also consider whether identified vulnerabilities could result in unauthorized access to personal information, helping you address both SOC 2 and Canadian privacy obligations simultaneously.
DarkPoint Security follows a structured methodology designed to produce thorough results that support your SOC 2 compliance objectives and provide maximum value to your audit process:
DarkPoint Security offers the full range of penetration testing services needed to support SOC 2 compliance: