← HomeBlog

2026-05-14 · Pentest process

What Does a Pentest Include for a SaaS Company?

A penetration test for a SaaS company is a structured, expert-led simulation of a real attack against your product, covering your APIs, authentication, user data handling, and cloud infrastructure. Unlike a vulnerability scan, a pentest involves human testers actively trying to break in, chain vulnerabilities together, and report exactly what a real attacker could do.


TL;DR
A SaaS pentest typically covers: API security, authentication and session management, authorization and multi-tenant isolation, cloud infrastructure, and business logic flaws. At Faultline, active testing runs 3 to 10 business days by tier, plus about 2 days for reporting, with a prioritized report and reproduction steps. Most startups need one before SOC 2, Series A due diligence, or signing enterprise contracts.


At Faultline: package timelines

Faultline uses three fixed tiers. These are business days of active testing, plus about 2 days for the report.

TierActive testingScope (summary)
Essentials3 to 5 business days1 web app or API (up to 50 endpoints)
Growth5 to 8 business daysUp to 3 surfaces, trust boundaries, business logic deep-dive
Comprehensive7 to 10 business daysFull external infrastructure, cloud config review, full retest included

Retest: a full retest of all findings is included in Comprehensive. For Essentials and Growth, you can add a full retest for +20% of the base price. See our FAQ on retesting.


What Areas Does a SaaS Pentest Actually Cover?

The scope of a pentest depends on what you ask for, but a thorough SaaS pentest typically includes these core areas:

API Security

Your APIs are the primary attack surface of any SaaS product. Testers look for broken authentication, missing rate limiting, insecure direct object references (IDOR), improper input validation, and verbose error messages that leak internal structure. This includes REST, GraphQL, and any webhook endpoints.

Authentication & Session Management

How users log in, how tokens are issued and validated, how sessions expire, and how password resets work. Common findings include weak JWT implementations, tokens that don't expire, missing MFA enforcement, and account enumeration vulnerabilities.

Authorization & Multi-Tenant Isolation

This is where SaaS products most commonly fail. Testers verify that one tenant cannot access another tenant's data, for example through horizontal privilege escalation (user A accessing user B's records), vertical privilege escalation (a standard user accessing admin functions), and broken object-level authorization in API endpoints.

Cloud Infrastructure & Configuration

Misconfigured S3 buckets, overly permissive IAM roles, publicly exposed admin interfaces, insecure storage of secrets, and logging gaps. Testers review your cloud environment for the configurations that attackers scan for automatically.

Business Logic Flaws

Vulnerabilities that scanners can't find because they require understanding how your product is supposed to work. Examples: bypassing subscription limits, manipulating pricing at checkout, exploiting invite flows to gain unauthorized access, or abusing free tier functionality.

Third-Party Integrations

OAuth flows, webhooks, and any third-party services your product connects to. Testers check for token leakage, misconfigured redirect URIs, and insecure handling of data from external sources.


What's the Difference Between a Pentest and a Vulnerability Scan?

A vulnerability scan is automated software that checks your systems against a database of known vulnerabilities. It's fast, cheap, and produces a long list of findings. Most of those need human judgment to see whether they're actually exploitable in your environment.

A penetration test is a human-led exercise. A skilled tester uses tools plus judgment to actively attempt exploitation, chain multiple lower-severity issues into a critical finding, and test for logic flaws that no scanner can detect. The output isn't just a list, it's a narrative of what an attacker could actually do, with proof-of-concept evidence.

For SaaS companies handling customer data, a pentest is what auditors, enterprise buyers, and investors mean when they ask "have you had a security assessment done?"


What Does the Pentest Process Look Like?

A typical SaaS pentest runs in four stages:

1. Scoping (24 hours)
You define what's in scope: which environments, which user roles, which integrations. You decide whether testers get credentials (gray-box) or start with no access (black-box). Most SaaS startups benefit most from gray-box testing. It produces more thorough results in less time.

Fill out this short scoping form. You get a fixed-price proposal within 24 hours. No call required.

2. Testing (3 to 10 days)
Testers work through your application methodically, documenting every finding with reproduction steps and screenshots. Every finding gets a real proof-of-concept. Critical findings are reported immediately.

3. Reporting (within 2 days of testing)
Executive summary, technical findings with CVSS scores and CWE references, actionable remediation guidance per finding, and a full attack narrative. We walk through every finding with your team and respond to questions within one business day.

4. Retest
After your team fixes the findings, a retest confirms the vulnerabilities have been resolved. You get an updated report confirming closure, ready to share with your auditor or enterprise customer. At Faultline, a full retest is included in the Comprehensive tier; for Essentials and Growth, you can add a full retest for +20% of the base price. See our FAQ.


How Long Does a SaaS Pentest Take?

Industry-typical engagements often run between 1 and 3 weeks of active testing, depending on scope. For Faultline, use the At Faultline: package timelines table at the top of this page.

The next table is a generic market snapshot (it is not Faultline's offer). Large consultancies or very wide scopes can push active testing well beyond our 7 to 10 day cap for Comprehensive, so do not read these rows as Faultline timelines.

For context, many teams see windows like the following:

ScopeTesting DurationBest For
Core product (API + auth)3 to 5 daysEarly-stage startups, first pentest
Full product + cloud infra5 to 10 daysSeries A+, SOC 2 preparation
Comprehensive (product + infra + integrations), typical at large firms10 to 15+ daysEnterprise-facing products, regulated industries

Add 1 to 2 weeks for reporting and remediation verification. From kickoff to final report, plan for 3 to 5 weeks total.


What Does a Pentest Report Include?

A professional pentest report contains:

  • Executive summary: a plain-language overview of overall risk posture, major findings, and recommended priorities. Written for non-technical stakeholders.
  • Methodology: what was tested, how, and what was out of scope, including PTES-aligned execution and OWASP WSTG test cases. Documents the approach for auditors.
  • Findings: each vulnerability with: title, severity, affected component, description, business impact, proof-of-concept evidence, and step-by-step remediation guidance.
  • Risk summary matrix: a visual breakdown of findings by severity.
  • Remediation roadmap: prioritized list of what to fix first based on exploitability and impact.

A pentest report from a reputable firm is a document you can share directly with SOC 2 auditors, enterprise security teams during procurement, and investors during due diligence.


What Should You Have Ready Before a Pentest?

The more prepared you are, the more value you'll get from your testing window. Before your pentest starts:

  • Provision test accounts at each user role level (free, paid, admin, super-admin)
  • Identify which environments are in scope: production, staging, or both
  • Share API documentation, Postman collections, or OpenAPI specs if available
  • Brief your engineering team so they don't mistake test traffic for a real attack
  • Confirm your logging and monitoring is active. Findings in your logs during testing are valuable data

When Do SaaS Startups Typically Need a Pentest?

The most common triggers are:

  • SOC 2 Type II: auditors expect evidence of penetration testing as part of your security program
  • Enterprise sales: large customers will ask for a pentest report in their security questionnaire
  • Series A/B fundraising: investors increasingly conduct technical due diligence that includes reviewing security posture
  • HIPAA or PCI-DSS compliance: PCI-DSS includes explicit penetration testing requirements for the cardholder data environment. HIPAA's Security Rule centers on a documented risk analysis and safeguards; pentesting is not worded like PCI, but it is a common, high-signal part of a serious HIPAA testing story for PHI in practice.
  • Post-incident: after a breach or near-miss, a pentest documents your current state and validates your remediation

Most SaaS companies should plan their first pentest by the time they have paying customers handling sensitive data, not after an incident forces the issue.


Frequently Asked Questions

Do I need to shut down my product during a pentest?
No. Testing is conducted against a scoped environment while your product stays live. Your engineering team is briefed beforehand so they can distinguish test traffic from a real incident.

What's the difference between black-box, gray-box, and white-box testing?
Black-box: testers start with no credentials and simulate an external attacker.
Gray-box: testers have standard user credentials and basic product knowledge, the most common and cost-effective approach for SaaS.
White-box: testers have full access including source code, most thorough, best for mature security programs.

Will a pentest find every vulnerability in my product?
No. A pentest finds what a skilled tester can discover within your agreed scope and time window. It's a point-in-time assessment, not a guarantee of security. Most companies pentest annually and after major product releases.

What happens if a critical vulnerability is found during testing?
Your tester flags it immediately before the engagement ends, so your team can begin remediation without waiting for the final report.

How is a SaaS pentest different from a network pentest?
A SaaS pentest targets your product surface: web, APIs, auth, tenants, and often cloud config. A network pentest emphasizes perimeter services, hosts, and segmentation. Most product-led companies need the former first; the Comprehensive tier adds external infrastructure testing when that matters for your scope.


For questions about pricing, timelines, and working with Faultline, visit our FAQ page.


Faultline Security specializes in penetration testing for SaaS companies and startups. Scope your engagement in 24 hours →