7.3.6 Mitigate network security vulnerabilities in response to problems identified in vulnerability reports.
7.3.7 Provide real-time network intrusion response.
7.3.8 Ensure that messages are confidential and free from tampering and repudiation.
7.3.9 Defend network communications from tampering and/or eavesdropping
7.3.10 compile data into measures for analysis and reporting.