6.4.2 Review performance and correctness of applied security controls in accordance with standards , procedures , directions , policies, regulations , and laws (statutes), and apply corrections as required.6.4.3 Assess the performance of security administration measurement technologies.6.4.4 Assess system and network vulnerabilities.