List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.
ELEMENTS | PERFORMANCE CRITERIA |
Elements describe the essential outcomes | Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section. |
1. Establish security risk context | 1.1 Confirm strategic and organisational contexts and identify stakeholders and their expectations. 1.2 Identify current and relevant security risk criteria from the security plan. 1.3 Obtain information and resources to conduct the risk analysis. |
2. Identify security risk | 2.1 Identify and record potential sources of security risk from the perspective of all stakeholders. 2.2 Use specified methodology and tools to identify risks. 2.3 Consult stakeholders during the risk identification process to finalise a list of risks. |
3. Analyse security risk | 3.1 Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring. 3.2 Determine potential consequences of each risk including critical lead time for recovery. 3.3 Determine, document and communicate risk ratings and include a rationale for each. |
4. Evaluate security risk | 4.1 Assess risks against the organisation’s security risk criteria. 4.2 Prioritise risks for treatment. 4.3 Monitor risks until treatment measures have been implemented. |
5. Compile security risk register | 5.1 Develop a security risk register that records identified risks, their nature and source. 5.2 Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register. 5.3 Record risk ratings for identified risks in register. 5.4 Compile and maintain the security risk register to reflect changes in circumstances. 5.5 Refer risk register to management for decisions on action and treatment of risks. |
Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.
applying legislation, regulations and policies relating to government security management
analysing the organisation’s security plan
researching and critically analysing the operational environment and drawing conclusions
using effective communication with diverse stakeholders involving listening, questioning, paraphrasing, clarifying, summarising
writing formal and highly complex reports
representing mathematical information in diverse formats
Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the depth of knowledge demonstrated must be appropriate to the job context of the candidate.
legislation, regulations, policies, procedures and guidelines relating to government security management including WHS
Crimes Act 1914 and Criminal Code 1985
Freedom of Information Act 1982
Privacy Act 1988
fraud control and protective security policies
Australian Government Information Security Manual (ISM)
Protective Security Policy Framework
risk analysis terminology and techniques
the organisation’s security plan
the organisation’s assets and security environment
risk management: principles and guidelines
AS/NZS ISO 31000:2009
Assessment of this unit requires a workplace environment or one that closely resembles normal work practice and replicates the range of conditions likely to be encountered when undertaking security risk analysis.
Assessors must satisfy the NVR/AQTF mandatory competency requirements for assessors.