Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

PSPSEC006 Mapping and Delivery Guide
Implement security risk treatments

Version 1.0
Issue Date: April 2024


Qualification -
Unit of Competency PSPSEC006 - Implement security risk treatments
Description
Employability Skills
Learning Outcomes and Application This unit describes the skills required to confirm risk decisions, identify risk treatments, implement countermeasures and monitor and review the security risk management process.This unit applies to those working in a security role where they will be required to confirm, identify, implement and review risk.The skills and knowledge described in this unit must be applied within the legislative, regulatory and policy environment in which they are carried out. Organisational policies and procedures must be consulted and adhered to, particularly those related to the security plan.Those undertaking this unit would generally work independently and as part of a team using support resources as required. They would perform complex tasks in a range of familiar and unfamiliar contexts.No licensing, legislative or certification requirements apply to unit at the time of publication.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.

Assessment of this unit requires a workplace environment or one that closely resembles normal work practice and replicates the range of conditions likely to be encountered when implementing security risk treatments.

Assessors must satisfy the NVR/AQTF mandatory competency requirements for assessors.

Prerequisites/co-requisites
Competency Field Security
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Confirm risk decisions
  • Confirm management decisions determining acceptable and unacceptable levels of risks.
  • Note and monitor low level risks accepted by the organisation, to detect changed circumstances.
  • Refer unacceptable high-level risks for development of formal management plans.
  • Note for treatment all major or significant risks determined as unacceptable.
       
Element: Identify risk treatments
  • Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk.
  • Select treatments to reduce the likelihood and/or consequences of the risk.
  • Include continuity plans in treatments where appropriate.
  • Document treatments and submit for approval.
       
Element: Implement countermeasures
  • Develop and implement a treatment plan.
  • Apply countermeasures in accordance with the implementation strategy detailed in the security plan.
  • Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements.
       
Element: Monitor and review security risk management process
  • Implement strategies to monitor risk environment.
  • Evaluate risk treatments against the objectives of the security plan.
  • Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area.
  • Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel.
       
Element: Confirm risk decisions
  • Confirm management decisions determining acceptable and unacceptable levels of risks.
  • Note and monitor low level risks accepted by the organisation, to detect changed circumstances.
  • Refer unacceptable high-level risks for development of formal management plans.
  • Note for treatment all major or significant risks determined as unacceptable.
       
Element: Identify risk treatments
  • Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk.
  • Select treatments to reduce the likelihood and/or consequences of the risk.
  • Include continuity plans in treatments where appropriate.
  • Document treatments and submit for approval.
       
Element: Implement countermeasures
  • Develop and implement a treatment plan.
  • Apply countermeasures in accordance with the implementation strategy detailed in the security plan.
  • Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements.
       
Element: Monitor and review security risk management process
  • Implement strategies to monitor risk environment.
  • Evaluate risk treatments against the objectives of the security plan.
  • Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area.
  • Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel.
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Confirm risk decisions

1.1 Confirm management decisions determining acceptable and unacceptable levels of risks.

1.2 Note and monitor low level risks accepted by the organisation, to detect changed circumstances.

1.3 Refer unacceptable high-level risks for development of formal management plans.

1.4 Note for treatment all major or significant risks determined as unacceptable.

2. Identify risk treatments

2.1 Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk.

2.2 Select treatments to reduce the likelihood and/or consequences of the risk.

2.3 Include continuity plans in treatments where appropriate.

2.4 Document treatments and submit for approval.

3. Implement countermeasures

3.1 Develop and implement a treatment plan.

3.2 Apply countermeasures in accordance with the implementation strategy detailed in the security plan.

3.3 Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements.

4. Monitor and review security risk management process

4.1 Implement strategies to monitor risk environment.

4.2 Evaluate risk treatments against the objectives of the security plan.

4.3 Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area.

4.4 Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel.

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.

applying legislation, regulations and policies relating to government security management

reading and analysing the organisation’s security plan

communicating with diverse stakeholders

using computer technology to gather and analyse information, and prepare formal reports

representing mathematical information in format to suit the purpose

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the depth of knowledge demonstrated must be appropriate to the job context of the candidate.

legislation, regulations, policies, procedures and guidelines relating to government security management including WHS

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control and protective security policies

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

risk analysis terminology and techniques

the organisation’s security plan

the organisation’s assets and security environment

risk management: principles and guidelines

AS/NZS ISO 31000:2009


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Confirm risk decisions

1.1 Confirm management decisions determining acceptable and unacceptable levels of risks.

1.2 Note and monitor low level risks accepted by the organisation, to detect changed circumstances.

1.3 Refer unacceptable high-level risks for development of formal management plans.

1.4 Note for treatment all major or significant risks determined as unacceptable.

2. Identify risk treatments

2.1 Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk.

2.2 Select treatments to reduce the likelihood and/or consequences of the risk.

2.3 Include continuity plans in treatments where appropriate.

2.4 Document treatments and submit for approval.

3. Implement countermeasures

3.1 Develop and implement a treatment plan.

3.2 Apply countermeasures in accordance with the implementation strategy detailed in the security plan.

3.3 Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements.

4. Monitor and review security risk management process

4.1 Implement strategies to monitor risk environment.

4.2 Evaluate risk treatments against the objectives of the security plan.

4.3 Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area.

4.4 Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Confirm management decisions determining acceptable and unacceptable levels of risks. 
Note and monitor low level risks accepted by the organisation, to detect changed circumstances. 
Refer unacceptable high-level risks for development of formal management plans. 
Note for treatment all major or significant risks determined as unacceptable. 
Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk. 
Select treatments to reduce the likelihood and/or consequences of the risk. 
Include continuity plans in treatments where appropriate. 
Document treatments and submit for approval. 
Develop and implement a treatment plan. 
Apply countermeasures in accordance with the implementation strategy detailed in the security plan. 
Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements. 
Implement strategies to monitor risk environment. 
Evaluate risk treatments against the objectives of the security plan. 
Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area. 
Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel. 
Confirm management decisions determining acceptable and unacceptable levels of risks. 
Note and monitor low level risks accepted by the organisation, to detect changed circumstances. 
Refer unacceptable high-level risks for development of formal management plans. 
Note for treatment all major or significant risks determined as unacceptable. 
Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk. 
Select treatments to reduce the likelihood and/or consequences of the risk. 
Include continuity plans in treatments where appropriate. 
Document treatments and submit for approval. 
Develop and implement a treatment plan. 
Apply countermeasures in accordance with the implementation strategy detailed in the security plan. 
Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements. 
Implement strategies to monitor risk environment. 
Evaluate risk treatments against the objectives of the security plan. 
Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area. 
Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel. 

Forms

Assessment Cover Sheet

PSPSEC006 - Implement security risk treatments
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

PSPSEC006 - Implement security risk treatments

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: