Today’s Lesson
Security for Legal SaaS — Episode 60: SOC 2, Penetration Testing and Security Certification
The Proof Problem
You have implemented access controls, encrypted data at rest and in transit, deployed audit logging, and built an incident response plan. Your system is genuinely secure. Now a prospective client — a 200-lawyer firm evaluating your contract management platform — asks a single question: "Can you prove it?"
This is where security certifications enter the picture. They are not security controls themselves. They are structured, externally validated evidence that your controls exist and work. For legal SaaS vendors, the right certification at the right time is often the difference between closing an enterprise deal and losing it to a competitor who can produce the paperwork.
SOC 2: The Industry Standard for SaaS
SOC 2 (System and Organisation Controls 2) is an auditing framework developed by the American Institute of Certified Public Accountants (AICPA) that evaluates a service organisation's controls over customer data.1 It is the dominant security certification for B2B SaaS vendors in North America and increasingly globally.
Trust Services Criteria
SOC 2 evaluates controls against five Trust Services Criteria (TSC):
| Criterion | Description | Required? |
|---|---|---|
| Security (CC series) | Protection against unauthorised access, both physical and logical | Yes — always included |
| Availability (A series) | System uptime and operational resilience | Optional |
| Processing Integrity (PI series) | Data processing is complete, valid, accurate, and timely | Optional |
| Confidentiality (C series) | Protection of information designated as confidential | Optional |
| Privacy (P series) | Collection, use, retention, and disposal of personal information | Optional |
Security is mandatory in every SOC 2 report. The other four criteria are selected based on the commitments you make to your customers. For legal SaaS, Confidentiality and Availability are typically expected alongside Security — law firms need assurance that their client data is protected and that the platform stays accessible.2
Type I vs. Type II
| SOC 2 Type I | SOC 2 Type II | |
|---|---|---|
| What it proves | Controls are properly designed at a specific point in time | Controls operated effectively over a period (typically 6–12 months) |
| Audit scope | Design review only | Design + operational effectiveness testing |
| Time required | Weeks to months of preparation | 6–12 month observation window after controls are in place |
| Enterprise acceptance | Acceptable for early-stage companies | Required by most enterprise procurement teams |
Key distinction: Type I says "on the day the auditor looked, our controls were properly designed." Type II says "for six months, someone watched us follow our own rules, and we actually did." Enterprise clients overwhelmingly prefer Type II because it demonstrates sustained discipline, not a one-day performance. According to Metomic, 78% of enterprise clients now require SOC 2 Type II from their service providers.3
Penetration Testing as Evidence
Penetration testing — or pentesting — is a controlled simulation of an attack against your application and infrastructure, conducted by a qualified security professional. While SOC 2 does not explicitly require penetration testing, it has become a de facto expectation.4
Why Auditors Want Pentest Results
SOC 2 Trust Services Criteria CC4.1 requires management to use "ongoing and separate evaluations" to assess the effectiveness of controls. Auditors evaluating vulnerability management and access control effectiveness routinely request penetration test evidence as part of this evaluation — it demonstrates that you didn't just build controls, you tested them against real attack techniques.5
For ISO 27001, Annex A 8.8 (management of technical vulnerabilities) and Annex A 5.36 (compliance with policies and standards) effectively require security testing, and auditors universally expect penetration testing as evidence.6
Pentest Scope and Frequency
| Component | Recommended Scope | Frequency |
|---|---|---|
| Web application | OWASP Top 10, business logic, authentication, authorisation | Annually + after major releases |
| API | Authentication, authorisation, injection, rate limiting | Annually + after major releases |
| Infrastructure | Network segmentation, cloud configuration, credential management | Annually |
| Social engineering | Phishing simulation, physical security (optional) | Annually |
What to Do with Findings
A penetration test that finds nothing is either excellent news or evidence of an inadequate test. What auditors want to see:
- Scoped engagement letter — defining what was tested and what was excluded
- Detailed findings report — each vulnerability classified by severity (Critical, High, Medium, Low, Informational)
- Remediation plan — documented timelines for fixing each finding
- Retest evidence — proof that Critical and High findings were fixed and verified
- Trend analysis — comparison with prior year's results showing improvement
ISO 27001: The International Standard
ISO/IEC 27001:2022 is the international standard for information security management systems (ISMS).7 Where SOC 2 evaluates specific controls, ISO 27001 evaluates whether you have a management system — a framework for continuously identifying, assessing, and treating information security risks.
| Aspect | SOC 2 | ISO 27001 |
|---|---|---|
| Developed by | AICPA (US) | ISO/IEC (International) |
| Focus | Control effectiveness | Management system maturity |
| Output | Attestation report (not a certification) | Certification (pass/fail) |
| Validity | Report covers a specific period | Certificate valid for 3 years (annual surveillance audits) |
| Geographic preference | North America, increasingly global | Europe, Asia-Pacific, global |
| Cost | $30K–$150K+ depending on scope and firm | $20K–$100K+ for initial certification |
For legal SaaS vendors selling to both US and European law firms, having both SOC 2 Type II and ISO 27001 certification covers the broadest market — SOC 2 for North American enterprise procurement and ISO 27001 for European and Asia-Pacific clients.8
Cyber Essentials (UK)
Cyber Essentials is a UK government-backed certification scheme managed by the National Cyber Security Centre (NCSC).9 It covers five basic technical controls: firewalls, secure configuration, user access control, malware protection, and security update management. Cyber Essentials Plus adds external vulnerability testing.
For legal SaaS vendors targeting UK law firms, Cyber Essentials is increasingly a minimum requirement — particularly for firms that handle government or public sector work, where Cyber Essentials certification is mandatory for suppliers.
Choosing the Right Certification at the Right Time
| Stage | Recommended Certification | Rationale |
|---|---|---|
| Pre-revenue / MVP | None — focus on building secure foundations | Premature certification wastes resources |
| First paying clients | SOC 2 Type I or Cyber Essentials | Demonstrates intent; satisfies initial due diligence |
| Growth / 10+ clients | SOC 2 Type II | Enterprise procurement teams require it |
| Enterprise / international | SOC 2 Type II + ISO 27001 | Covers global markets; often required in RFPs |
| UK public sector | Add Cyber Essentials Plus | Mandatory for government suppliers |
The enterprise sales inflection point: There is a specific moment in every legal SaaS company's growth where the absence of SOC 2 Type II starts costing deals. It typically arrives when you land your first Am Law 200 firm or Magic Circle prospect. Their procurement team will not proceed without it. Plan your certification timeline 12–18 months ahead of when you expect to need it.
What's Next
Episode 61 covers Customer Trust and Security Reviews — how to handle the security questionnaires, trust centres, and DPA negotiations that come after (or sometimes before) your certification is in place.
Sources & Further Reading
Sources & references
- AICPA, SOC 2 — SOC for Service Organizations — Trust Services Criteria framework overview.
- Cloud Security Alliance, The 5 SOC 2 Trust Services Criteria Explained — detailed breakdown of each criterion.
- Metomic, SOC 2 Type II: A Complete Guide & Checklist — Type I vs. Type II comparison and enterprise requirements.
- Blaze InfoSec, SOC 2 Penetration Testing Requirements Explained — when and why pentesting is expected for SOC 2.
- Q-Sec, SOC 2 Penetration Testing: What Auditors Actually Expect — auditor expectations and evidence requirements.
- Pentest Testing, ISO 27001 Penetration Testing Audit Evidence Guide — ISO 27001 pentest evidence requirements.
- ISO, ISO/IEC 27001 — Information Security Management — standard overview.
- Bright Defense, SOC 2 Trust Services Criteria: A Practical View — selecting criteria for SaaS compliance.
- NCSC, Cyber Essentials — UK government certification scheme.
- Cherry Bekaert, SOC 2 Trust Services Criteria Guide — practical audit preparation guide.
- Netragard, SOC 2 Penetration Testing Requirements for 2026 — updated pentest requirements and methodology.