© Rithik Chatterjee 2021
R. ChatterjeeRed Hat and IT Securityhttps://doi.org/10.1007/978-1-4842-6434-8_6

6. Red Hat Security Auditing

Rithik Chatterjee1  
Pune, Maharashtra, India

This chapter aims to highlight the processes related to IT security auditing, its best practices, and auditing implementations in RHEL systems.

IT System Auditing

Information systems audit, also known as IT audit, can be defined as the systematic and independent evaluation of the IT infrastructure, operations, and policies of an organization. These may include management controls, data processing systems, storage and networking systems, accessibility controls, security policies, and all the interfaces associated with these systems. Information system audits are essential ...

Get Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.