The short answer: at least once a year, and more often when compliance frameworks, environmental changes, or your risk profile call for it.
The longer answer is more useful, because the right cadence for a SaaS company shipping daily is not the right cadence for a regional bank running quarterly releases. This post lays out a framework for setting pen test frequency based on three drivers: compliance requirements, change-driven triggers, and risk. It also covers the most common mistake, which is treating annual testing as enough when it almost never is.
The Three Drivers of Pen Test Frequency
Every reasonable testing cadence comes from three inputs.
Most companies stop at compliance. The ones that take security seriously layer change-driven testing and risk-based testing on top.
Pen Test Frequency by Compliance Framework
If you are subject to one or more of these frameworks, this is your baseline.
| Framework | Minimum Frequency | Key Notes |
|---|---|---|
| PCI-DSS 4.0 / 4.0.1 | Annual, plus after any significant change | Requirement 11.4. Segmentation testing annually for all entities (11.4.5) and every six months for service providers (11.4.6). Documented methodology and retesting required. |
| SOC 2 (Type I and II) | Annual (practice, not explicit mandate) | Trust Services Criteria do not specify frequency. Auditors expect annual testing inside the audit window. |
| HIPAA | Annual (practice, not explicit mandate) | Security Rule requires risk analysis and reasonable safeguards. Annual testing is the established practice for handling PHI. |
| ISO/IEC 27001:2022 | Annual (practice, not explicit mandate) | Annex A controls point to regular vulnerability and technical compliance reviews. Reinforced by the three-year recertification cycle. |
| CMMC | Annual | Required at Level 2 and above for contractors handling Controlled Unclassified Information (CUI). |
| FedRAMP | Annual | Required for authorized cloud service offerings, with results submitted to the sponsoring agency. |
| NIST CSF / NIST 800-53 | Organization-defined (annual is the floor) | Control CA-8 governs pen testing. Quarterly testing is common for high-impact systems. |
Requirements in Detail
Change-Driven Testing
Calendars are not the only trigger. The most common phrase across compliance frameworks is "and after any significant change," which is left vague on purpose. Frameworks expect you to define what counts as significant for your environment and document it.
In practice, run a fresh pen test when any of the following happen:
A working rule: if a change would alter the diagram you showed your last pen tester, the new state should be tested.
Risk-Based Testing for Companies Without Compliance Pressure
If no compliance framework forces your hand, frequency comes from risk. Four questions drive cadence:
A reasonable starting framework:
Companies under fast-changing conditions, including SaaS startups in active development and regulated firms scaling quickly, often outgrow annual testing within their first 18 months.
The Annual Test Gap
The most common cadence is once a year. It is also the cadence most likely to leave you exposed.
If you test in January and finish remediation by March, you have about nine months until the next test. In those nine months your developers ship features, your infrastructure shifts, new vulnerabilities are published in the libraries you depend on, and threat actors learn new techniques. By December, the environment your pen tester signed off on is gone.
The annual pen test gives you confidence at the moment of the test and decreasing confidence every week after. By the time the next test runs, the report is mostly historical.
This is one of the reasons Penetration Testing as a Service (PTaaS) has become more common. It replaces the annual snapshot with continuous coverage so the gap stops growing.
How to Build a Testing Cadence That Fits Your Business
Three steps.
Review the cadence annually. As your environment, customer base, and regulatory exposure change, the right cadence changes with it.
How APT Helps You Find the Right Cadence
APT Security Management offers pen testing through a prepaid token model. You buy tokens, then spend them on testing as you need it. The same balance covers other services if you need to draw from it. Tokens are valid for 12 months from purchase.
For companies that prefer a defined engagement with a fixed price, APT also offers flat-rate Penetration Testing as a Service (PTaaS) packages with set scope and deliverables. Both options include manual testing by OSCP- and CISSP-certified testers, retesting on remediated findings, and audit-ready reporting for SOC 2, PCI-DSS, HIPAA, and ISO 27001.
A 30-minute consultation will tell you what cadence makes sense for your environment. We look at your compliance requirements, your release cycle, and your current testing posture, and recommend the cadence that fits, not the one that maximizes your invoice.
Frequently Asked Questions
Set the right testing cadence for your environment
Book a free 30-minute consultation. We will look at your compliance requirements, your release cycle, and your current pen testing posture, and recommend a cadence that fits.

