SecurityWall Logo
Back to Blog
ISO 27001
February 28, 2026
7 min read

ISO 27001 Penetration Testing: Is a Pentest Required?

BK

Babar Khan Akhunzada

February 28, 2026

ISO 27001 Penetration Testing: Is a Pentest Required?

ISO 27001 doesn't spell out "conduct a penetration test." What it does require is a structured programme of security evaluation that, in practice, auditors universally expect a pentest to satisfy. If your certification audit is approaching and you're uncertain whether a vulnerability scan is sufficient or what scope, frequency, and evidence an auditor actually needs this guide answers all of it.

  1. Does ISO 27001 Require Penetration Testing?
  2. Which Annex A Controls Does a Pentest Satisfy?
  3. Answering the Questions Auditors and Teams Actually Ask
  4. ISO 27001 vs SOC 2 — Do You Need Both?
  5. What Evidence Should You Give Your Auditor?
  6. Get an ISO 27001-Scoped Pentest

Does ISO 27001 Require Penetration Testing?

ISO 27001 does not explicitly mandate penetration testing by name. The standard is deliberately outcome-focused it defines what you must achieve, not exactly how. What it does require is a systematic programme of security control evaluation, and penetration testing is the assessment method auditors most commonly expect to satisfy that requirement.

The specific obligation sits in Clause 9.1 (monitoring, measurement, analysis and evaluation) and Clause 10.2 (continual improvement) both of which require you to demonstrate that controls are not just implemented, but operating effectively. A documented, scoped penetration test with findings and remediation evidence is the most auditor-accepted way to prove that.

The practical reality in ISO 27001 certification and surveillance audits, the question "how do you evaluate the effectiveness of your technical security controls?" is almost always followed by a request for penetration test evidence. Auditors who accept a vulnerability scan alone as sufficient are increasingly rare and in regulated sectors (financial services, healthcare, cloud infrastructure), they are effectively nonexistent.

⚠ Common Mistake

A vulnerability scan satisfies control identification — it does not satisfy the evidence of effectiveness that auditors look for

Scans tell you what vulnerabilities exist. A pentest tells you whether an attacker could exploit them. Auditors want the latter.

Talk to Our Team

Which Annex A Controls Does a Pentest Satisfy?

ISO 27001:2022 reorganised Annex A from 114 controls across 14 domains to 93 controls across 4 themes. Several of these directly relate to penetration testing as an assessment or evidence mechanism:

A.8.8

Management of Technical Vulnerabilities

Requires timely identification of technical vulnerabilities and evaluation of exposure. A pentest directly satisfies this by identifying exploitable vulnerabilities under controlled conditions. Evidence: pentest report with dated findings and remediation status.

A.8.29

Security Testing in Development and Acceptance

Requires security testing of systems during development and before acceptance. Web application and API penetration testing directly satisfies this for software-producing organisations. Auditors expect evidence of pre-release testing for systems handling personal or sensitive data.

A.5.36

Compliance with Policies, Rules and Standards

Requires regular review of compliance with your information security policies. A pentest that validates whether implemented controls are effective — not just present — provides evidence that this review was conducted rigorously.

A.8.16

Monitoring Activities

Requires detection of anomalous behaviour and monitoring of security events. An assumed breach or detection-focused pentest that measures whether your SIEM and EDR actually detect attack techniques directly evidences this control — telling you whether your monitoring is real or theoretical.

A.8.7

Protection Against Malware

Requires implementation and evaluation of malware defences. A pentest that includes endpoint testing validates whether anti-malware controls would detect attacker tooling in practice — not just in vendor benchmarks.

Note: these are Annex A controls, not Clause requirements. They apply based on your Statement of Applicability (SoA) if you've marked any of the above as not applicable without strong justification, your auditor will challenge it.

Answering the Questions Auditors and Teams Actually Ask

"Is a vulnerability scan enough for ISO 27001, or do we need a full pentest?"

A vulnerability scan is not sufficient as a standalone assessment for ISO 27001 Annex A.8.8 or Clause 9.1. Scans identify known vulnerability signatures they don't test exploitability, don't find business logic flaws, and don't produce the evidence of active control evaluation that auditors expect. Most UKAS-accredited auditors explicitly differentiate between vulnerability assessment and penetration testing in their audit checklists. If you've submitted scan results and had them accepted, the auditor was lenient not that the scan was sufficient.

"How often do we need to pentest for ISO 27001?"

ISO 27001 doesn't specify a frequency it requires evaluation at "planned intervals" that you define, with justification. In practice, annual penetration testing is the accepted minimum across almost all sectors and audit bodies. The second trigger is change: a significant infrastructure change, new application, cloud migration, or major product release should prompt a re-scoped assessment. Annual plus change-triggered is the pattern auditors expect to see documented in your security evaluation programme.

"What scope does a pentest need for ISO 27001?"

The scope should map to your ISMS boundary the systems, applications, and infrastructure included in your ISO 27001 certification scope. If your certification covers your cloud infrastructure, SaaS application, and corporate network, all three should be covered by periodic assessment. Many organisations rotate scope by year web application one year, internal network the next provided the overall programme covers the full ISMS boundary within a reasonable cycle. Document the rationale for scope decisions; auditors will ask.

"Our ISO 27001 auditor rejected our pentest report what went wrong?"

The most common reasons: the report was dated outside the audit period, the methodology section described only automated scanning, there was no remediation evidence for critical findings, or the scope didn't match the ISMS boundary. A report that passes ISO 27001 audit scrutiny needs: a methodology section describing manual testing, CVSS-scored findings with proof-of-concept evidence, a remediation status section, and retest evidence for critical and high findings. A PDF of scanner output with a cover page does not meet this bar.

Have a specific auditor requirement you're not sure how to satisfy?

We scope ISO 27001 engagements to your ISMS boundary and audit body expectations before the engagement starts.

Talk to Our Team →

ISO 27001 vs SOC 2 — Do You Need Both?

This comes up constantly for organisations selling to both European and US enterprise customers. They serve different markets and different audit purposes and most organisations with international enterprise customers end up needing both. The good news is that a single well-scoped pentest can satisfy both simultaneously.

Framework Comparison ISO 27001 vs SOC 2
Factor ISO 27001 SOC 2
Primary market Europe, Middle East, APAC, international US enterprise customers
Framework type Management system certification Third-party audit report
Pentest required? Expected, not explicit Expected, not explicit
Pentest frequency Annual minimum Annual, within audit period
Retest required? For critical/high findings For critical/high findings
One pentest for both? ✓ Yes — one scoped pentest satisfies both if methodology references ISO 27001 Annex A and SOC 2 TSC simultaneously

The practical approach: a single well-scoped penetration test whose report references both ISO 27001 Annex A controls and SOC 2 Trust Services Criteria (CC4.1, CC7.1) produces evidence that satisfies both frameworks. The report needs to be written to support dual-framework evidence — not every provider structures reports this way, so confirm before engaging.

For a detailed breakdown of the SOC 2 pentest requirements specifically, see our SOC 2 penetration testing requirements guide.

What Evidence Should You Give Your Auditor?

When your ISO 27001 auditor asks for penetration testing evidence, the package they need has four components:

1

The pentest report — dated within the audit period

Must be dated within 12 months of the audit (closer is better). Must contain a methodology section describing manual testing — not just tool names. Must include CVSS-scored findings with proof-of-concept evidence. A report without PoC evidence is not demonstrating active testing.

2

Scope documentation mapping to your ISMS boundary

A statement of what was tested and why — mapping the pentest scope to the assets covered by your ISO 27001 certification. If your ISMS covers three applications and the pentest only covered one, you need documented rationale for the others.

3

Remediation evidence for critical and high findings

A log showing that critical and high findings were tracked, assigned, remediated, and closed — with dates. Auditors want to see that findings fed into your risk treatment process, not just sat in a report. A findings tracker or risk register entry satisfies this.

4

Retest report confirming critical/high findings are closed

After remediation, the provider retests critical and high findings and issues a retest report confirming closure. This is the evidence that your security evaluation process produced improvement — which is what Clause 10.2 (continual improvement) requires.

⚠ Audit Red Flag

A pentest report with no retest section tells your auditor findings were identified but not verified as resolved

Retest evidence is what closes the loop for Clause 10.2. Without it, your evidence package is incomplete regardless of how good the original report is.

Get a Compliant Assessment

Get an ISO 27001-Scoped Pentest

ISO 27001 Penetration Testing

Scoped to your ISMS boundary.
Evidence your auditor will accept.

SecurityWall's ISO 27001-aligned penetration tests are scoped to your certification boundary, structured around the relevant Annex A controls, and documented to satisfy UKAS-accredited and Big 4 audit requirements. Manual testing, CVSS-scored findings with PoC, remediation guidance, and retest included as standard. Reports written to support ISO 27001 and SOC 2 evidence simultaneously on request.

Scoped quote within 24 hours. Sample report available on request before you commit.

Related reading:

ISO 27001 Penetration Testing, ISO 27001 Annex A, ISO 27001 Compliance, Penetration Testing Requirements, ISMS Security Testing, ISO 27001 Audit Evidence, Annex A.8.8, Annex A.8.29, ISO 27001 vs SOC 2

Tags

ISO 27001Penetration TestingISO 27001 Annex AISO 27001 vs SOC 2
BK

About Babar Khan Akhunzada

Babar Khan Akhunzada is Founder of SecurityWall. He leads security strategy, offensive operations. Babar has been featured in 25-Under-25 and has been to BlackHat, OWASP, BSides premiere conferences as a speaker.