Security auditing has been a standard practice in the industry to ensure the accountability and transparency of a system. However, with the emerging technologies (e.g., cloud/edge computing, Internet of Things, Software-Defined Networks, and Network Functions Virtualization), the requirements and challenges of security auditing have been rapidly evolving mainly due to their design complexities, large-scale deployments, and dynamic nature.