Assessor Resource

PSPSEC005
Undertake government security risk analysis

Assessment tool

Version 1.0
Issue Date: March 2024


This unit describes the skills required to analyse risk against an organisation's operational environment. It includes establishing the security risk context and compiling a security risk register by identifying, analysing and evaluating risk against a security plan.

This unit applies to those working at an operational level, in specialist or generalist roles across all areas within an organisation.

The skills and knowledge described in this unit must be applied within the legislative, regulatory and policy environment in which they are carried out. Organisational policies and procedures must be consulted and adhered to, particularly those related to the security plan.

Those undertaking this unit would generally work independently and as part of a team using support resources as required. They would perform complex tasks in a range of familiar and unfamiliar contexts.

No licensing, legislative or certification requirements apply to unit at the time of publication.

You may want to include more information here about the target group and the purpose of the assessments (eg formative, summative, recognition)



Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Establish security risk context

1.1 Confirm strategic and organisational contexts and identify stakeholders and their expectations.

1.2 Identify current and relevant security risk criteria from the security plan.

1.3 Obtain information and resources to conduct the risk analysis.

2. Identify security risk

2.1 Identify and record potential sources of security risk from the perspective of all stakeholders.

2.2 Use specified methodology and tools to identify risks.

2.3 Consult stakeholders during the risk identification process to finalise a list of risks.

3. Analyse security risk

3.1 Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring.

3.2 Determine potential consequences of each risk including critical lead time for recovery.

3.3 Determine, document and communicate risk ratings and include a rationale for each.

4. Evaluate security risk

4.1 Assess risks against the organisation’s security risk criteria.

4.2 Prioritise risks for treatment.

4.3 Monitor risks until treatment measures have been implemented.

5. Compile security risk register

5.1 Develop a security risk register that records identified risks, their nature and source.

5.2 Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register.

5.3 Record risk ratings for identified risks in register.

5.4 Compile and maintain the security risk register to reflect changes in circumstances.

5.5 Refer risk register to management for decisions on action and treatment of risks.

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.

applying legislation, regulations and policies relating to government security management

analysing the organisation’s security plan

researching and critically analysing the operational environment and drawing conclusions

using effective communication with diverse stakeholders involving listening, questioning, paraphrasing, clarifying, summarising

writing formal and highly complex reports

representing mathematical information in diverse formats

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the depth of knowledge demonstrated must be appropriate to the job context of the candidate.

legislation, regulations, policies, procedures and guidelines relating to government security management including WHS

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control and protective security policies

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

risk analysis terminology and techniques

the organisation’s security plan

the organisation’s assets and security environment

risk management: principles and guidelines

AS/NZS ISO 31000:2009

Assessment of this unit requires a workplace environment or one that closely resembles normal work practice and replicates the range of conditions likely to be encountered when undertaking security risk analysis.

Assessors must satisfy the NVR/AQTF mandatory competency requirements for assessors.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assingnment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Establish security risk context

1.1 Confirm strategic and organisational contexts and identify stakeholders and their expectations.

1.2 Identify current and relevant security risk criteria from the security plan.

1.3 Obtain information and resources to conduct the risk analysis.

2. Identify security risk

2.1 Identify and record potential sources of security risk from the perspective of all stakeholders.

2.2 Use specified methodology and tools to identify risks.

2.3 Consult stakeholders during the risk identification process to finalise a list of risks.

3. Analyse security risk

3.1 Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring.

3.2 Determine potential consequences of each risk including critical lead time for recovery.

3.3 Determine, document and communicate risk ratings and include a rationale for each.

4. Evaluate security risk

4.1 Assess risks against the organisation’s security risk criteria.

4.2 Prioritise risks for treatment.

4.3 Monitor risks until treatment measures have been implemented.

5. Compile security risk register

5.1 Develop a security risk register that records identified risks, their nature and source.

5.2 Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register.

5.3 Record risk ratings for identified risks in register.

5.4 Compile and maintain the security risk register to reflect changes in circumstances.

5.5 Refer risk register to management for decisions on action and treatment of risks.

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.

applying legislation, regulations and policies relating to government security management

analysing the organisation’s security plan

researching and critically analysing the operational environment and drawing conclusions

using effective communication with diverse stakeholders involving listening, questioning, paraphrasing, clarifying, summarising

writing formal and highly complex reports

representing mathematical information in diverse formats

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the depth of knowledge demonstrated must be appropriate to the job context of the candidate.

legislation, regulations, policies, procedures and guidelines relating to government security management including WHS

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control and protective security policies

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

risk analysis terminology and techniques

the organisation’s security plan

the organisation’s assets and security environment

risk management: principles and guidelines

AS/NZS ISO 31000:2009

Assessment of this unit requires a workplace environment or one that closely resembles normal work practice and replicates the range of conditions likely to be encountered when undertaking security risk analysis.

Assessors must satisfy the NVR/AQTF mandatory competency requirements for assessors.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Confirm strategic and organisational contexts and identify stakeholders and their expectations. 
Identify current and relevant security risk criteria from the security plan. 
Obtain information and resources to conduct the risk analysis. 
Identify and record potential sources of security risk from the perspective of all stakeholders. 
Use specified methodology and tools to identify risks. 
Consult stakeholders during the risk identification process to finalise a list of risks. 
Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring. 
Determine potential consequences of each risk including critical lead time for recovery. 
Determine, document and communicate risk ratings and include a rationale for each. 
Assess risks against the organisation’s security risk criteria. 
Prioritise risks for treatment. 
Monitor risks until treatment measures have been implemented. 
Develop a security risk register that records identified risks, their nature and source. 
Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register. 
Record risk ratings for identified risks in register. 
Compile and maintain the security risk register to reflect changes in circumstances. 
Refer risk register to management for decisions on action and treatment of risks. 
Confirm strategic and organisational contexts and identify stakeholders and their expectations. 
Identify current and relevant security risk criteria from the security plan. 
Obtain information and resources to conduct the risk analysis. 
Identify and record potential sources of security risk from the perspective of all stakeholders. 
Use specified methodology and tools to identify risks. 
Consult stakeholders during the risk identification process to finalise a list of risks. 
Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring. 
Determine potential consequences of each risk including critical lead time for recovery. 
Determine, document and communicate risk ratings and include a rationale for each. 
Assess risks against the organisation’s security risk criteria. 
Prioritise risks for treatment. 
Monitor risks until treatment measures have been implemented. 
Develop a security risk register that records identified risks, their nature and source. 
Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register. 
Record risk ratings for identified risks in register. 
Compile and maintain the security risk register to reflect changes in circumstances. 
Refer risk register to management for decisions on action and treatment of risks. 

Forms

Assessment Cover Sheet

PSPSEC005 - Undertake government security risk analysis
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

PSPSEC005 - Undertake government security risk analysis

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: