Auditing the deployed policy entails the monitoring, reporting, and logging of events that occur in the network.

Combining these three areas creates an effective method of auditing the completed and distributed policy.