The configuration audit is based on a technical evaluation of information system component’s
configuration to ensure that the security measures deployed comply with good security practices.
Configuration audits can be performed on any type of IT element (network equipment, operating
systems, software, applications, databases, etc.) using appropriate configuration analysis tools.