Assessor Resource

ICAS6254A
Manage IT security

Assessment tool

Version 1.0
Issue Date: March 2024


This unit defines the competency required to manage data security, Enterprise Continuity, Incidents, Networks and telecommunications security, System and Application Security.

No licensing, legislative, regulatory or certification requirements apply to this unit at the time of publication.

You may want to include more information here about the target group and the purpose of the assessments (eg formative, summative, recognition)

Prerequisites

ICAI4249A

Implement and evaluate data security

ICAI4251A

Implement and evaluate network and telecommunication security

ICAI5250A

Develop, implement and evaluate system and application security

ICAI5252A

Develop, implement and evaluate an incident response plan


Employability Skills

This unit contains employability skills.




Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Overview of assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Evidence of the following is essential:

Manage data security

Manage enterprise continuity

Manage incidents

Manage networks and telecommunications security

Manage system and application security

Context of and specific resources for assessment

Assessment must ensure:

Specifying data policy and coordinate review

Direct contingency planning, operations, and programs to manage risk

Manage the necessary resources, including financial resources, to establish and maintain an effective network security and telecommunications program

Establish the IT system and application security engineering program

To demonstrate competency in this unit the following resources will be needed:

IT business specifications

Information on the security environment including relevant laws/legislation, existing organisational security policies, organisational expertise and knowledge

Possible security environment also includes the threats to security that are, or are held to be, present in the environment

Risk analysis tools/methodologies

IT security assurance specifications

Management related scenarios

Method of assessment

The following assessment method is appropriate for this unit:

The purpose of this unit is to define the standard of performance to be achieved in the workplace. In undertaking training and assessment activities related to this unit, consideration should be given to the implementation of appropriate diversity and accessibility practices in order to accommodate people who may have special needs. Additional guidance on these and related matters is provided in ICA05 Section 1.

Competency in this unit should to be assessed using summative assessment to ensure consistency of performance in a range of contexts. This unit can be assessed either in the workplace or in a simulated environment. However, simulated activities must closely reflect the workplace to enable full demonstration of competency.

Assessment will usually include observation of real or simulated work processes and procedures and/or performance in a project context as well as questioning on underpinning knowledge and skills. The questioning of team members, supervisors, subordinates, peers and clients where appropriate may provide valuable input to the assessment process. The interdependence of units for assessment purposes may vary with the particular project or scenario.

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended.

The breadth, depth and complexity involving analysis, design, planning, execution and evaluation across a range of technical and/or management functions including development of new criteria or applications or knowledge or procedures would be characteristic.

The demonstration of competency may also require application of a significant range of fundamental principles and complex techniques across a wise and often unpredictable variety of contexts in relation to either varied or highly specific functions. Contribution to the development of a broad plan, budget or strategy may be involved and accountability and responsibility for self and others in achieving the outcomes may also be characteristic.

Applications involve significant judgement in planning, design, technical or leadership/guidance functions related to products, services, operations or procedures would be common.

An individual demonstrating this competency would be able to:

Demonstrate understanding of specialised knowledge with depth in some areas

Analyse, diagnose, design and execute judgement across a broad range of technical or management functions

Generate ideas through the analysis of information and concepts at an abstract level

Demonstrate a command of wide-ranging, highly specialised technical, creative or conceptual skills

Demonstrate accountability for personal outputs within broad parameters

Demonstrate accountability for personal and group outcomes within broad parameters

Maintain knowledge of industry products and services


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assingnment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

Required skills

leading and mentoring people to achieve project outcomes

maintaining commitment of stakeholders and project teams

negotiating with stakeholders and team members using a range of communication styles to suit different audiences and purposes

responding to diversity, including gender and disability

using management tools applicable to complex activities

applying risk management techniques including risk sharing and transfer

managing finances

applying ethical decision making and problem solving

writing recommendations and preparing reports requiring precision of expression

applying workplace safety procedures in line with requirements

accessing/preparing information electronically or in hard copy

Required knowledge

legislation, organisational/jurisdictional policies and procedures that may impact on management:

codes of ethics/conduct

occupational health and safety and environment requirements

governance requirements

quality standards

risk management

procurement guidelines

budgetary framework

financial management requirements

human resources

public relations

equal employment opportunity, equity and diversity principles

management specifications and objectives

management tools and techniques suited to a range of complex projects activities

management systems

organisational and political context

critical analysis in a management context

cost schedule control systems to handle potential budget blow-outs

business and commercial issues related to the management

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Other groups may include:

internal, e.g.

legal department

HR

procurement

finance

external, e.g.

law enforcement agencies

vendors

public relations professionals

Related security teams may include:

technical support

security administration

incident response

Applicable network-based documentsmay include:

standards

procedures

directives

policies

regulations

laws

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Ensure that security classification and data management policies and guidance are issued and updated 
Specify policy and coordinate review and approval 
Report compliance of data security policies to management 
Implement appropriate changes and improvement actions as required 
Coordinate with corporate stakeholders to establish the enterprise continuity of operations program 
Acquire the necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program 
Define the enterprise continuity of operations organizational structure and staffing model 
Define emergency delegations of authority and orders of succession for key positions 
Direct contingency planning, operations, and programs to manage risk 
Define the scope of the enterprise continuity of operations program to address business continuity, business recovery, contingency planning, and disaster recovery and related activities 
Integrate enterprise concept of operations activities with related contingency planning activities 
Establish an enterprise continuity of operations performance measurement program 
Identify and prioritize critical business functions 
Implement appropriate changes and improvement actions as required 
Coordinate with stakeholders to establish the incident management program 
Establish relationships between the incident response team and other groups 
Acquire and manage the resources, including financial resources, for the incident management functions 
Ensure the coordination between the incident response team and the security administration and technical support teams 
Apply lessons learned from information security incidents to improve incident management processes and procedures 
Implement appropriate changes and improvement actions as required 
Establish a network security and telecommunications program in line with enterprise policy and security goals 
Manage the necessary resources, including financial resources, to establish and maintain an effective network security and telecommunications program 
Direct network security and telecommunications personnel 
Establish communications between the network security and telecommunications team and related security teams 
Integrate network security and telecommunications program activities with technical support, security administration, and incident response activities 
Establish a network security and telecommunications performance measurement program 
Ensure enterprise compliance with applicable network-based documents 
Ensure that network-based audits and management reviews are conducted to implement process improvement 
Implement appropriate improvement actions, as required 
Establish the IT system and application security engineering program 
Acquire the necessary resources, including financial resources, to support the integration of security in the SDLC 
Guide IT security personnel through the SDLC phases 
Define the scope of the IT security program as it applies to the application of SDLC 
Plan the IT security program components into the SDLC 

Forms

Assessment Cover Sheet

ICAS6254A - Manage IT security
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

ICAS6254A - Manage IT security

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: