Home SERVICES
All Services Red Team Operations Active Directory Cloud Security AI Red Teaming
ABOUT US
About Us Certifications FAQ
Process Industries Blog Request a Quote CONTACT
Request a Quote Get Help Now Ask a Question
Services / Compliance-Driven Assessments
Compliance-Driven Assessments

CREST-certified compliance penetration testing mapped to PCI-DSS, SOC 2 Type II, ISO 27001, HIPAA, PIPEDA, NIST CSF, and CIS Controls — with audit-ready deliverables your regulators and auditors will accept.

Request a Compliance Assessment → All Services
Overview

Security Testing That Satisfies Auditors and Protects the Business

Regulatory compliance and genuine security are not the same thing — but they do not have to be in conflict. Cyber Security Pentesting Inc. delivers compliance-driven penetration testing and gap analysis that satisfies the technical testing requirements of every major framework while simultaneously uncovering real attack paths that a checkbox audit would miss.

Principal consultant Arturs Stay brings 15 years of offensive security experience and CREST certification to every compliance engagement. All work is performed directly by the principal — no junior subcontractors, no templated scans delivered as reports. Each assessment is scoped precisely to your framework requirements, your environment, and your audit timeline.

Whether you are preparing for a first SOC 2 Type II audit, maintaining a PCI-DSS certification, responding to a regulator enquiry, or building an ISO 27001 ISMS, the deliverables from every engagement are formatted to satisfy your auditor while giving your security team the technical depth they need to actually remediate the findings.

7+
Frameworks covered
15 yrs
Offensive security experience
CREST
Certified principal
100%
Principal-led delivery
Frameworks Covered

Seven Compliance Frameworks. One Principal. Audit-Ready Results.

Each framework assessment is scoped to the specific technical control requirements — not a generic vulnerability scan dressed up with compliance language. Below is what we test, how we test it, and what the output looks like for each standard.

PCI-DSS v4.0
Payment Card Industry Data Security Standard
Requirement 11.3 — Penetration Testing

PCI-DSS v4.0 Requirement 11.3 mandates annual external and internal penetration testing of all systems that store, process, or transmit cardholder data (CHD), as well as segmentation verification to confirm that out-of-scope systems cannot reach the cardholder data environment (CDE).

Our PCI-DSS assessments cover:

  • External penetration test of all internet-facing CDE components
  • Internal penetration test simulating an insider or compromised-system scenario
  • Network segmentation verification — confirming CDE isolation from out-of-scope segments
  • Application-layer testing of all payment applications within scope
  • Written report formatted for your Qualified Security Assessor (QSA)
  • Remediation re-test to confirm findings are addressed before audit

All testing methodology aligns to the PCI Security Standards Council's Penetration Testing Guidance and the CREST methodology.

SOC 2 Type II
Service Organization Controls 2
Common Criteria & Trust Service Principles

SOC 2 Type II audits assess whether security controls were operating effectively over a defined observation period — typically 6 or 12 months. Penetration testing is increasingly required by SOC 2 auditors as evidence that the Common Criteria related to logical access, change management, and risk mitigation are functioning as intended.

Our SOC 2 assessment covers:

  • Common Criteria (CC) mapping — CC6 (Logical Access), CC7 (System Operations), CC8 (Change Management)
  • Trust Service Principles: Security, Availability, Confidentiality, Processing Integrity, Privacy
  • External and internal network penetration testing
  • Web application testing for customer-facing and internal systems
  • Access control and authentication control validation
  • Findings report formatted with SOC 2 criterion references for your auditor
ISO/IEC 27001:2022
Information Security Management System
Annex A Controls — Technical Testing

ISO 27001:2022 Annex A includes 93 controls across four themes: Organisational, People, Physical, and Technological. The Technological controls — particularly those relating to secure configuration, network security, application security, and vulnerability management — require active technical testing to provide genuine evidence of effectiveness.

Our ISO 27001 assessment covers:

  • Annex A.8 Technological Controls — network, endpoint, and application security
  • Clause 6.1.2 risk assessment — identifying and validating technical risks
  • Vulnerability assessment and penetration testing per control A.8.8
  • Technical gap analysis against all applicable Annex A controls
  • Findings mapped to specific control references for ISMS documentation
  • Evidence packages suitable for certification audit submissions
HIPAA / HITECH
Health Insurance Portability and Accountability Act
ePHI Technical Safeguards Assessment

HIPAA's Security Rule (45 CFR Part 164) requires covered entities and business associates to implement technical safeguards protecting electronic Protected Health Information (ePHI). While HIPAA does not mandate penetration testing by name, the Office for Civil Rights (OCR) expects risk assessments to include technical evaluation of safeguards — and breach investigations routinely cite absent penetration testing as evidence of inadequate safeguards.

Our HIPAA assessment covers:

  • Identification and scoping of all ePHI systems and data flows
  • Technical safeguard testing — access controls, audit controls, transmission security
  • Network segmentation between ePHI systems and general corporate systems
  • Workstation and server vulnerability identification
  • Risk analysis documentation aligned to OCR guidance
  • Findings report structured for HIPAA risk management plan integration
PIPEDA / Bill C-27
Personal Information Protection and Electronic Documents Act
Canadian Privacy Compliance — Technical Safeguards

Canada's federal private sector privacy law, PIPEDA, and the forthcoming Consumer Privacy Protection Act (CPPA, Bill C-27) require organisations to protect personal information using security safeguards appropriate to the sensitivity of the data. The Office of the Privacy Commissioner of Canada (OPC) has cited insufficient technical safeguards in the majority of significant breach investigations it has concluded.

As a Toronto-based practice, we have direct experience with Canadian privacy obligations. Our PIPEDA assessment covers:

  • Mapping personal information flows and storage locations
  • Technical safeguard testing of all systems processing personal data
  • Access control and data minimisation control validation
  • Breach notification readiness assessment
  • Cross-border data transfer technical controls review
  • Findings aligned to OPC guidance and the 10 Fair Information Principles
NIST CSF 2.0
NIST Cybersecurity Framework
Framework Functions & Categories Mapping

The NIST Cybersecurity Framework 2.0 organises cybersecurity activities across six Functions: Govern, Identify, Protect, Detect, Respond, and Recover. Technical penetration testing directly validates the Protect and Detect functions, while findings inform the Identify (asset and risk) and Govern (risk management) functions.

Our NIST CSF assessment covers:

  • Protect (PR) — access control, data security, platform security, technology resilience
  • Detect (DE) — continuous monitoring, adverse event analysis
  • Identify (ID) — asset management and risk assessment validation
  • Penetration testing of prioritised attack surfaces per your CSF profile
  • Findings mapped to NIST CSF subcategories and Informative References
  • Current Profile to Target Profile gap analysis with remediation prioritisation
CIS Controls v8.1
Center for Internet Security Critical Security Controls
Implementation Groups 1, 2 & 3 Testing

The CIS Controls v8.1 provide a prioritised set of 18 controls mapped to three Implementation Groups (IGs) by organisational maturity and risk profile. IG1 covers essential cyber hygiene; IG2 adds controls for organisations with moderate risk exposure; IG3 applies to organisations facing sophisticated adversaries. Technical penetration testing is the most reliable way to validate whether CIS Controls are functioning as intended.

Our CIS Controls assessment covers:

  • IG1 baseline validation — inventory, patching, access control, email, browser defences
  • IG2 additions — data protection, secure configuration, audit log management, network monitoring
  • IG3 additions — penetration testing (CIS Control 18), application software security, incident response
  • Findings mapped to specific CIS Control and Sub-Control references
  • Implementation Group gap analysis with prioritised remediation roadmap
Deliverables

Audit-Ready Reports Designed for Multiple Audiences

Compliance deliverables serve three distinct audiences simultaneously: your auditor needs evidence of testing and control effectiveness; your security team needs technical findings they can act on; your board and executive committee needs risk context. Every engagement produces all three.

Audit-Ready Technical Report
Full technical findings with framework control references, CVSS risk ratings, proof-of-concept evidence, and reproduction steps. Formatted so your QSA, external auditor, or ISO 27001 certification body can rely on it directly — without requesting additional documentation.
Prioritised Remediation Roadmap
Findings ranked by risk, exploitability, and compliance impact. Each item includes the specific control it violates, the technical remediation guidance, and an estimated effort level — so your engineering and security teams can plan sprints and allocate resources without ambiguity.
Board-Level Executive Summary
A non-technical, visually clear summary of overall security posture, compliance readiness status, top-three risks, and remediation investment required. Written for audit committees, boards of directors, and C-suite audiences who need risk context without technical jargon.
Evidence Package
Raw evidence artefacts supporting each finding: screenshots, network captures, tool output logs, and testing methodology documentation. Provides your auditor with independently verifiable proof that testing occurred and was conducted to the required scope and depth.
Remediation Re-Test
Included re-test of remediated findings before your audit date. We verify that patches, configuration changes, and compensating controls have addressed the original findings — and issue a remediation confirmation letter you can present to your auditor or certifying body.
Attestation Letter
A signed attestation letter on company letterhead confirming that penetration testing was performed, the scope it covered, the methodology used, and the date of testing. Required by PCI-DSS QSAs, SOC 2 auditors, and ISO 27001 certification bodies as documentation of testing activities.
Who This Is For

Organisations With Compliance Obligations and Genuine Security Goals

Compliance-driven penetration testing is relevant to a wide range of organisations — not just enterprises. If any of the following describes your situation, this service is built for you.

  • Organisations preparing for a first PCI-DSS assessment or Level 1 merchant audit, where Requirement 11.3 penetration testing must be completed before the QSA's on-site review.
  • SaaS and technology companies seeking SOC 2 Type II certification for the first time, where enterprise customers require evidence of penetration testing as part of vendor security due diligence.
  • Organisations pursuing ISO 27001 certification whose registrar has requested evidence of technical control testing against Annex A Technological Controls.
  • Healthcare providers, health-tech platforms, and business associates under HIPAA/HITECH obligations, particularly those that have received an OCR complaint or are preparing for an audit.
  • Canadian organisations subject to PIPEDA — including financial services, retail, and any business collecting personal information — or those preparing for obligations under the forthcoming CPPA (Bill C-27).
  • Enterprises using NIST CSF as their internal security framework who need penetration testing to validate Protect and Detect function controls before a board or executive security review.
  • Organisations responding to cyber insurance requirements, where insurers increasingly require documented annual penetration testing as a condition of coverage or renewal.
  • Organisations that have received a security questionnaire from a major enterprise customer requiring proof of penetration testing conducted by a CREST-certified assessor.
  • Companies that have previously completed a compliance audit and received a finding related to insufficient penetration testing or vulnerability management.
  • Organisations under regulatory review or responding to a breach investigation, where independent penetration testing provides evidence of security program maturity to regulators.
Frequently Asked Questions

Common Questions About Compliance Penetration Testing

What is included in a PCI-DSS penetration test?
PCI-DSS Requirement 11.3 mandates annual external and internal penetration testing of all cardholder data environment (CDE) systems, plus segmentation verification to confirm that out-of-scope systems cannot reach the CDE. Our assessment covers all of these elements and produces a written report formatted for your Qualified Security Assessor. We test application-layer vulnerabilities as required by v4.0, not just network-layer exposures.
Do you provide reports that auditors will accept?
Yes. Every compliance engagement produces an audit-ready report that maps findings to the specific control language of the relevant framework. Reports include the executive summary, testing methodology, scope documentation, technical findings with evidence, risk ratings, and a prioritised remediation roadmap. We have direct experience with what QSAs and ISO 27001 certification bodies require — and we structure deliverables accordingly. If your auditor has a specific report template or checklist, we can accommodate it.
How long does a compliance penetration test take?
Timelines depend on scope. A focused PCI-DSS CDE assessment for a small merchant environment may take 5–10 business days of testing with report delivery within 15 business days. A full ISO 27001 Annex A assessment across a complex hybrid environment typically runs 2–4 weeks of testing. We provide a precise scope, timeline, and cost estimate during the initial scoping call — before you commit to anything.
Can you test for PIPEDA compliance specifically in Canada?
Yes. As a Toronto-based practice, we have direct experience with PIPEDA and the emerging Canadian privacy landscape including Bill C-27 (Consumer Privacy Protection Act). Our PIPEDA assessment evaluates the technical safeguards protecting personal information: access controls, encryption in transit and at rest, data retention controls, privilege management, and breach detection capabilities. Findings are aligned to the OPC's 10 Fair Information Principles and presented in a format suitable for demonstrating accountability to the Office of the Privacy Commissioner.
What is the difference between a gap analysis and a penetration test for compliance?
A gap analysis reviews your policies, configurations, documentation, and declared controls against a framework's requirements — it identifies what is missing or inadequate based on review and interview. A penetration test actively attempts to exploit those gaps and others — it produces empirical evidence of exploitability, not theoretical risk. Most compliance frameworks benefit from both; many require both. We can deliver a combined engagement: gap analysis to identify control weaknesses, followed by penetration testing to validate which weaknesses are exploitable, all in a single scope.
Do you provide retesting after remediation?
Yes. All compliance engagements include a remediation re-test of critical and high-severity findings within 90 days of the original report delivery. We verify that the remediation has addressed the finding and issue a written remediation confirmation that you can present to your auditor. Additional re-test rounds are available if required by your audit timeline.
Official Standard References

Primary Sources for Each Framework

All assessments are conducted against the current version of each standard. The links below point to the official regulatory and standards body publications our work references.

Ready to Satisfy Your Next Audit?

Discuss your compliance timeline, framework requirements, and scope with Arturs Stay directly. No sales team, no junior staff — principal-led from the first conversation to the final report.

Request a Compliance Assessment →