Setting up destructive software intended to breach brick-and-mortar POS hardware and software and accumulate card knowledge in the course of transactions The distinction between the differing types of SOC audits lies in the scope and duration with the assessment: Every time cardholder facts is accessed, the celebration must be logged. https://www.nathanlabsadvisory.com/nist-800-171.html