Skip to main content
QuantLab Logo

TOFU Security Primer · 2026

Red Team vs Penetration Test vs Security Audit: When You Need Each

Plain-English breakdown of every offensive and assessment engagement on the menu in 2026. What each tells you, what each costs, and which order to buy them in.

By Bill Beltz, founder of QUANT LAB USA INC · Published May 12, 2026

Quick answer: which security engagement do I actually need?

If you have never had a security engagement, start with a penetration test. If you need a compliance attestation, schedule a security audit aligned to your framework (SOC 2, ISO, HIPAA, PCI). If you have a mature blue team and want to test detection coverage, run a purple team or a red team. Vulnerability scans run continuously in the background regardless. The sequence for most companies is: scans then pentest then audit then tabletop then purple team then red team.

The security industry has too many words for too many things. Vendors mix them deliberately because the more elaborate the name, the higher the quote. This guide is the plain-English distinction we use with clients, with honest pricing and decision logic.

Background: What is penetration testing? and What is a red team?

Side-by-side: every engagement type at a glance

EngagementWhat it testsTypical costDuration
Vulnerability scanKnown CVEs and misconfigurations$500 to $5KHours to days
Penetration testExploitable weaknesses in defined scope$8K to $50K1 to 3 weeks
Security audit (SOC 2, ISO)Controls and evidence alignment$15K to $80K3 to 6 months
Tabletop exercisePlan and people response$5K to $20K1 day
Purple teamDetection coverage by ATT&CK technique$30K to $80K2 to 6 weeks
Red teamEnd-to-end defense vs an adversary objective$40K to $400K4 to 12+ weeks
Adversary emulationDefense vs a specific named threat actor$80K to $250K6 to 12 weeks

Vulnerability scan: the cheap continuous baseline

A vulnerability scan is automated. A tool like Tenable, Qualys, Nuclei, or Burp Suite Scanner crawls a target list and flags known CVEs, missing patches, misconfigurations, and SSL issues. The output is a list of findings with severity scores.

Use case: continuous monitoring of your external attack surface and internal systems. SOC 2 and PCI both expect quarterly authenticated scans at minimum.

What it does not tell you: whether the findings are exploitable in your context, whether they chain into impact, whether your business logic has flaws. Scans are necessary but insufficient.

More detail: Pen Test vs Vulnerability Scan.

Penetration test: the foundation everyone needs

A penetration test is human-driven. A senior tester or team attempts to exploit weaknesses in your defined target — web app, network, AD, mobile — chains them into business impact, and reports findings with remediation guidance. The deliverable is an executive summary, a technical findings report, and (usually) a retest after fixes.

Use case: annual compliance evidence (SOC 2, HIPAA, PCI), pre-release validation of new features, due diligence for fundraising or acquisitions, cyber insurance renewals.

What it does not tell you: whether your detection and response would catch a real adversary, whether your assumed-breach posture is solid, whether your incident response process actually works. Pentests are about finding holes, not testing the alarm system.

Pricing detail: Penetration Test Cost 2026. Our methodology: Penetration Testing service.

Security audit: the controls and evidence review

A security audit is a paper-and-evidence engagement against a framework — SOC 2, ISO 27001, HIPAA, PCI-DSS, CIS Controls. The auditor reviews policies, samples evidence, and tests that controls are operating as designed. Auditors do not exploit anything; they verify.

Use case: compliance attestation that you can hand to customers and prospects. SOC 2 Type II is the most common in SaaS.

What it does not tell you: whether your defenses would actually withstand attack. Plenty of SOC 2 Type II companies have failed pentests within a month of signing the audit report. Audits attest to controls, not to security outcomes.

Background: What is SOC 2?

Tabletop exercise: testing the plan, not the tech

A tabletop is a facilitated discussion. The incident response team (engineering, legal, communications, leadership) walks through a realistic scenario and works through how each team would respond. The facilitator throws curveballs — the CEO is unreachable, the press calls, a customer demands an update.

Use case: validate your incident response plan, train new team members, satisfy cyber insurance requirements. Most carriers require an annual tabletop.

Why teams skip it: it is awkward. Senior leadership has to admit they do not know what to do. That is exactly why you do it — once on paper, not once for real.

Purple team: cooperative detection testing

A purple team is offensive and defensive working side-by-side. The offensive testers (red) execute ATT&CK techniques in a controlled manner while the defenders (blue) watch their tooling and report what fired. Techniques that fired no alerts get tuned in real time. The deliverable is a detection coverage matrix.

Use case: mature security programs measuring SOC efficacy, tuning SIEM/EDR coverage against specific threat models, training the blue team.

Prerequisites: a real blue team that can participate. Without that, a purple team is just an expensive pentest.

See our MITRE ATT&CK Assessment service for the deeper methodology and our MITRE ATT&CK framework explainer.

Red team: end-to-end adversary simulation

A red team is objective-driven, stealth-emphasizing, and tests the entire defense — technology, people, and process. The engagement defines an objective (steal customer data, gain domain admin, deploy ransomware in a test environment) and the team uses any technique available to achieve it without being detected.

Use case: measure end-to-end defense maturity, test incident response under realistic conditions, find chained vulnerabilities that single-target pentests miss, executive-level risk demonstration.

Prerequisites: mature pentest history, functional blue team, executive sponsorship for the engagement scope. Red teams against weak programs are a waste — you will get owned trivially and learn nothing you would not have learned from a pentest.

Adversary emulation: red team against a named actor

Adversary emulation is red team that follows the documented TTPs of a specific named threat actor — APT29, FIN7, Conti, Lazarus. The testers use only the techniques that actor is known to use, in roughly the order and tempo that actor uses them. The result is a defense readiness assessment against the threats most relevant to your industry.

Use case: regulated industries (finance, healthcare, defense) wanting to validate readiness against industry-specific threats.

Cost premium: 30 to 80% over a generic red team because the methodology is more constrained and the research burden is real.

The buying sequence: scans then pentest then audit then tabletop then purple team then red team

For a typical SaaS maturing through Series A to Series C, the engagement sequence we recommend:

  1. Year 1: Continuous vulnerability scanning, annual web app pentest, SOC 2 Type I.
  2. Year 2: Continue scans, annual web + API pentest, SOC 2 Type II, first tabletop exercise.
  3. Year 3: Continue, add internal network pentest, AD pentest. Bring on a security hire or fractional CISO.
  4. Year 4: Add purple team to measure SOC efficacy. Mature the blue team capability.
  5. Year 5+: First red team engagement when the blue team can participate meaningfully. Adversary emulation when you have a credible threat model.

Skipping steps is expensive. Red teaming against a weak program wastes the budget and demoralizes the security team.

Compliance overlay: which engagement satisfies which framework

FrameworkPentestAuditRed Team
SOC 2 Type IIExpectedRequiredNot required
PCI-DSS 4.0Required (SAQ-D)RequiredNot required
HIPAAExpectedExpected (SRA)Not required
ISO 27001ExpectedRequiredNot required
FedRAMP ModerateRequiredRequiredRecommended at High
Cyber insurance renewalCommon requirementSometimesRare

FAQ

What is the difference between a red team and a pentest?

A penetration test is scope-bound and finding-focused: tell me every exploitable weakness in this defined target within these dates. A red team is objective-driven and stealth-focused: prove or disprove that this defined adversary could achieve this specific outcome (steal X data, ransom Y system) without being detected. Pentests find vulnerabilities; red teams test the entire defense, including detection and response.

What is a security audit?

A security audit is a documentation and controls review against a framework — SOC 2, ISO 27001, HIPAA, PCI-DSS, CIS Controls. The auditor verifies that policies, procedures, and evidence demonstrate the controls are operating as designed. Auditors test on paper and through sample evidence; they do not exploit anything. Most security audits are required for compliance, not security itself.

Do I need a red team or a pentest first?

Almost always a pentest first. Red teams test whether your defenses can detect and respond to a sophisticated adversary. If your basics are weak (unpatched systems, weak credentials, missing MFA), a red team will succeed trivially and tell you nothing. Mature your security posture through pentests and program work first, then engage a red team when you have a credible blue team to test.

What does a red team cost?

Single-objective, mid-stealth, 4-week red team: $40K to $80K. Multi-objective, high-stealth, 8-week red team with custom payloads: $80K to $150K. Full adversary emulation 12+ weeks with custom infrastructure: $150K to $400K+. Most red team engagements run smaller than that ceiling. See our pentest cost guide for the supporting math.

Is a vulnerability scan the same as a pentest?

No. A vulnerability scan is automated, runs against a target list, identifies known CVEs and misconfigurations, and produces a list of findings. A penetration test is human-driven, attempts to exploit the findings, chains them into impact, and validates which vulnerabilities are actually exploitable in your context. Scans cost hundreds; pentests cost thousands to tens of thousands. SOC 2 and PCI require pentests, not scans.

What is a tabletop exercise?

A tabletop is a discussion-based simulation of an incident. The team walks through a scenario (ransomware, breach, insider threat) and discusses how they would respond. It tests the plan and the people, not the technology. Tabletops are cheap ($5K to $20K facilitated) and required by most cyber insurance carriers.

What is a purple team engagement?

A purple team is a collaborative engagement where the offensive testers and the defenders work together in real time. The red side runs ATT&CK techniques while the blue side watches and adjusts detections. The deliverable is a coverage matrix showing which techniques your detection stack catches and which slip through. Useful when your blue team is mature enough to participate. Typical cost: $30K to $80K.

Which engagement does SOC 2 require?

SOC 2 does not explicitly require a penetration test, but every reputable auditor expects one as evidence under CC4.1 and CC7.1. SOC 2 does require a documented audit (the SOC 2 attestation itself). Red teams are not required for SOC 2 — they are optional maturity work.

What does HIPAA require?

HIPAA requires a Security Risk Analysis annually and 'regular' security evaluations. Auditors expect annual penetration testing and quarterly vulnerability scanning. Red teaming is not named explicitly and is not required.

How often should I do each?

Vulnerability scans: monthly external, quarterly internal. Pentests: annually at minimum, after major releases that touch auth or payments. Audits: per the compliance framework cycle (annual for SOC 2 Type II). Tabletops: annually. Red teams: every 18 to 36 months once the program is mature.

Can one engagement combine red team and pentest?

Yes. A combined engagement starts with a pentest (find and report vulnerabilities) then transitions into a red team (use those findings or others to achieve an objective stealth-style). This 'pen team' or 'long-form' engagement is more expensive than either alone but cheaper than buying them separately back-to-back. We run a handful of these per year.

What is adversary emulation?

Adversary emulation is a red team engagement where the testers mimic the TTPs (tactics, techniques, procedures) of a specific named threat actor — APT29, FIN7, Conti — using MITRE ATT&CK as the reference. The goal is to test how your defenses hold up against a real threat your industry faces. More expensive than generic red teaming; more useful for mature programs. See our MITRE ATT&CK Assessment service.

Pick the right engagement.

Free 30-minute scoping call. Tell us where your security program is today and we will tell you honestly which engagement gives you the most value next.

Or call Bill at (770) 652-1282
All blog postsUpdated May 12, 2026