List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.
ELEMENTS | PERFORMANCE CRITERIA |
Elements describe the essential outcomes | Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section. |
1. Confirm risk decisions | 1.1 Confirm management decisions determining acceptable and unacceptable levels of risks. 1.2 Note and monitor low level risks accepted by the organisation, to detect changed circumstances. 1.3 Refer unacceptable high-level risks for development of formal management plans. 1.4 Note for treatment all major or significant risks determined as unacceptable. |
2. Identify risk treatments | 2.1 Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk. 2.2 Select treatments to reduce the likelihood and/or consequences of the risk. 2.3 Include continuity plans in treatments where appropriate. 2.4 Document treatments and submit for approval. |
3. Implement countermeasures | 3.1 Develop and implement a treatment plan. 3.2 Apply countermeasures in accordance with the implementation strategy detailed in the security plan. 3.3 Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements. |
4. Monitor and review security risk management process | 4.1 Implement strategies to monitor risk environment. 4.2 Evaluate risk treatments against the objectives of the security plan. 4.3 Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area. 4.4 Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel. |
Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.
applying legislation, regulations and policies relating to government security management
reading and analysing the organisation’s security plan
communicating with diverse stakeholders
using computer technology to gather and analyse information, and prepare formal reports
representing mathematical information in format to suit the purpose
Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the depth of knowledge demonstrated must be appropriate to the job context of the candidate.
legislation, regulations, policies, procedures and guidelines relating to government security management including WHS
Crimes Act 1914 and Criminal Code 1985
Freedom of Information Act 1982
Privacy Act 1988
fraud control and protective security policies
Australian Government Information Security Manual (ISM)
Protective Security Policy Framework
risk analysis terminology and techniques
the organisation’s security plan
the organisation’s assets and security environment
risk management: principles and guidelines
AS/NZS ISO 31000:2009
Assessment of this unit requires a workplace environment or one that closely resembles normal work practice and replicates the range of conditions likely to be encountered when implementing security risk treatments.
Assessors must satisfy the NVR/AQTF mandatory competency requirements for assessors.