Skip to Content
Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing
book

Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing

by Rithik Chatterjee
November 2020
Intermediate to advanced
244 pages
4h 29m
English
Apress
Content preview from Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing
© Rithik Chatterjee 2021
R. ChatterjeeRed Hat and IT Securityhttps://doi.org/10.1007/978-1-4842-6434-8_6

6. Red Hat Security Auditing

Rithik Chatterjee1  
(1)
Pune, Maharashtra, India
 

This chapter aims to highlight the processes related to IT security auditing, its best practices, and auditing implementations in RHEL systems.

IT System Auditing

Information systems audit, also known as IT audit, can be defined as the systematic and independent evaluation of the IT infrastructure, operations, and policies of an organization. These may include management controls, data processing systems, storage and networking systems, accessibility controls, security policies, and all the interfaces associated with these systems. Information system audits are essential ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7 (EX200 and EX300)

Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7 (EX200 and EX300)

Sander van Vugt
Red Hat Enterprise Linux 8 Administration

Red Hat Enterprise Linux 8 Administration

Miguel Pérez Colino, Pablo Iranzo Gómez, Scott McCarty

Publisher Resources

ISBN: 9781484264348Purchase LinkPublisher Website