The compliancepen test,by control code.
SOC 2 Type 2, ISO 27001, PCI DSS 11.4, HIPAA. Each framework, mapped row by row to the specific Swarm behavior that satisfies it. Full audit trail, validated proof-of-concept, and a dedicated read-only Auditor Clerk role: every artifact your external reviewer asks for, before they ask.
01 / Trust Services Criteria · Security · Availability
SOC 2 Type 2. Receipts, not assurance.
02 / Annex A · Information Security Controls (2022 revision)
ISO 27001 / 27002. Receipts, not assurance.
03 / Requirement 11 · External and internal penetration testing
PCI DSS v4.0. Receipts, not assurance.
04 / Administrative & technical safeguards · 45 CFR 164
HIPAA Security Rule. Receipts, not assurance.
Questions
What buyers ask. Receipts attached.
The questions every engineering and security lead asks before they fund an engagement. Read the answers here, before the kickoff call.
- 01Does a Swarm engagement satisfy SOC 2 CC4 and CC7?
Yes. The full audit trail satisfies the evidentiary requirement for system monitoring (CC7.1) and detect-and-respond (CC7.2). The 30-day free retest satisfies the re-assessment intent in CC7.5. CC4 monitoring is satisfied by running the engagement on a release cadence rather than annually.
- 02Does Swarm satisfy PCI DSS 11.4 evidentiary requirements?
Yes. PCI DSS 11.4 requires external (11.4.3) and internal (11.4.2) penetration testing with documented methodology (11.4.1), correction of exploitable findings (11.4.4), and re-testing after remediation (11.4.5). The full audit trail documents methodology, structured findings carry CVSS plus validated PoC, and the 30-day retest closes the loop. Run the engagement against the cardholder-data environment with explicit scope authorization.
- 03Does Swarm map to ISO 27001 Annex A.8.29?
Yes. ISO 27001:2022 Annex A.8.29 (Security testing in development and acceptance) and ISO 27002 8.29 require documented security testing with traceable methodology. A Swarm engagement produces the structured report and full audit trail your ISO 27001 auditor needs, plus the activity logs aligned with A.8.15.
- 04Does Swarm sign BAAs for HIPAA?
Yes. Email compliance@swarmsec.ai before running an engagement against any surface that processes protected health information. The BAA covers the data Swarm processes during the engagement. HIPAA Security Rule 45 CFR 164.308(a)(8) requires a periodic technical evaluation; a Swarm engagement satisfies it.
- 05What does the auditor receive?
A structured engagement report with executive summary, CVSS-scored findings, remediation guidance, and exploit chain analysis; the full audit trail covering every specialist action; validated proof-of-concept on every Critical and High; and dashboard access via the read-only Auditor Clerk role. See /sample-report for the deliverable.
- 06How does the free retest interact with my compliance period?
The 30-day free retest re-runs the validated proof-of-concept exploits against your patched environment and produces a diff report. Closed findings ship with a retest timestamp; remaining findings stay open. This satisfies the re-assessment intent in SOC 2 CC7.5 and the retest requirement in PCI DSS 11.4.5 within the compliance period that contains the original engagement.
- 07Is Swarm itself SOC 2 and ISO 27001 compliant?
Yes. Swarm operates SOC 2 Type 2 compliant and ISO 27001 compliant against the controls. The more relevant question for buyers is whether a Swarm engagement satisfies your own SOC 2 Type 2 pen test requirement. It does, mapped to the controls listed above.
- 08How long are engagement deliverables retained?
Deliverables (report, findings, full audit trail) are retained for the lifetime of your account, with deletion-on-request. Long retention is useful for multi-year SOC 2 Type 2 periods where auditors compare year-over-year findings.