© Rithik Chatterjee 2021
R. ChatterjeeRed Hat and IT Securityhttps://doi.org/10.1007/978-1-4842-6434-8_6

6. Red Hat Security Auditing

Rithik Chatterjee1  
(1)
Pune, Maharashtra, India
 

This chapter aims to highlight the processes related to IT security auditing, its best practices, and auditing implementations in RHEL systems.

IT System Auditing

Information systems audit, also known as IT audit, can be defined as the systematic and independent evaluation of the IT infrastructure, operations, and policies of an organization. These may include management controls, data processing systems, storage and networking systems, accessibility controls, security policies, and all the interfaces associated with these systems. Information system audits are essential ...

Get Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.