Create a timeline and delegate jobs (compliance automation software will make this activity a lot less time consuming) The distinction between the differing types of SOC audits lies in the scope and period of the evaluation: Prerequisite 8 now goes over and above just demanding a novel ID for Everyone https://www.nathanlabsadvisory.com/blog/tag/vulnerability-assessment/