6.3 Task Statements: Implement
6.3.1 perform Security administration processes and procedures in accordance with standards, procedures, directives, policies, regulation, and laws (statutes)
6.3.2 Establish a secure computing environment by applying, monitoring, controlling, and managing unauthorized changes in system configuration, software, and hardware.
6.3.3 Ensure that information system are assessed regularly for vulnerabilities, and that appropriate solutions to eliminate or otherwise mitigate identified vulnerabilities are implemented.