SOC 2 evidence eight weeks out, no current pentest.
The problem
Annual SOC 2 Type II audit window opened in eight weeks. The auditor's control list expected a current penetration test report against the production environment. The prior year's report was stale and the previous vendor had moved off the work.
What we found
A cross-tenant authorization gap in the core ledger API: a low-privileged role on one tenant could enumerate transaction metadata across other tenants by guessing the resource path. Two medium-severity findings on session handling and a verbose error path that leaked internal identifiers. No critical findings in the cloud account.
Outcome
Report delivered with SOC 2 trust-criteria mapping in week three. Engineering closed the cross-tenant issue inside one sprint; the retest the following week confirmed the fix. The auditor accepted the report at field-work kickoff with no evidence asks. SOC 2 control closed on first pass.