Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

PSPSEC013 Mapping and Delivery Guide
Implement and monitor security risk management plans

Version 1.0
Issue Date: April 2024


Qualification -
Unit of Competency PSPSEC013 - Implement and monitor security risk management plans
Description
Employability Skills
Learning Outcomes and Application This unit describes the skills required to implement and monitor a security risk management plan. It includes implementing the plan, monitoring the risk environment and evaluating the plan.This unit applies to those working in a security role with some responsibility for addressing organisational risk.The skills and knowledge described in this unit must be applied within the legislative, regulatory and policy environment in which they are carried out. Organisational policies and procedures must be consulted and adhered to, particularly those related to implementing risk management plans.Those undertaking this unit would work autonomously, occasionally accessing and evaluating support from a broad range of sources, while performing complex tasks in a range of contexts.No licensing, legislative or certification requirements apply to unit at the time of publication.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.

Assessment of this unit requires evidence gathered over time in a workplace environment or one that closely resembles normal work practice and replicates the diverse conditions likely to be encountered when implementing risk management plans.

Assessors must satisfy the NVR/AQTF mandatory competency requirements for assessors

Prerequisites/co-requisites
Competency Field Security
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Implement security plan
  • Implement countermeasures and treat security risks.
  • Follow and meet timeframes and budgetary requirements.
  • Comply with legal, government and organisational policy requirements.
  • Document and monitor residual risks.
       
Element: Monitor the risk environment
  • Determine and document strategies to monitor the risk environment.
  • Monitor security risks, types and sources of threats to detect changing circumstances that may alter risk management priorities.
  • Conduct monitoring on a regular basis.
  • Monitor organisational changes to identify circumstances where re-examination of the security environment becomes necessary.
  • Document and act upon results of monitoring.
       
Element: Evaluate security plan
  • Monitor risk treatments to gauge extent and effectiveness of implementation.
  • Evaluate treatments against the objectives of the security plan.
  • Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work area.
  • Identify and address weaknesses in the security plan.
  • Review the plan on an ongoing basis, to detect exceptional incidents, breaches, and changes in circumstances.
  • Update the plan to reflect current circumstances.
       
Element: Implement security plan
  • Implement countermeasures and treat security risks.
  • Follow and meet timeframes and budgetary requirements.
  • Comply with legal, government and organisational policy requirements.
  • Document and monitor residual risks.
       
Element: Monitor the risk environment
  • Determine and document strategies to monitor the risk environment.
  • Monitor security risks, types and sources of threats to detect changing circumstances that may alter risk management priorities.
  • Conduct monitoring on a regular basis.
  • Monitor organisational changes to identify circumstances where re-examination of the security environment becomes necessary.
  • Document and act upon results of monitoring.
       
Element: Evaluate security plan
  • Monitor risk treatments to gauge extent and effectiveness of implementation.
  • Evaluate treatments against the objectives of the security plan.
  • Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work area.
  • Identify and address weaknesses in the security plan.
  • Review the plan on an ongoing basis, to detect exceptional incidents, breaches, and changes in circumstances.
  • Update the plan to reflect current circumstances.
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Implement security plan

1.1 Implement countermeasures and treat security risks.

1.2 Follow and meet timeframes and budgetary requirements.

1.3 Comply with legal, government and organisational policy requirements.

1.4 Document and monitor residual risks.

2. Monitor the risk environment

2.1 Determine and document strategies to monitor the risk environment.

2.2 Monitor security risks, types and sources of threats to detect changing circumstances that may alter risk management priorities.

2.3 Conduct monitoring on a regular basis.

2.4 Monitor organisational changes to identify circumstances where re-examination of the security environment becomes necessary.

2.5 Document and act upon results of monitoring.

3. Evaluate security plan

3.1 Monitor risk treatments to gauge extent and effectiveness of implementation.

3.2 Evaluate treatments against the objectives of the security plan.

3.3 Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work area.

3.4 Identify and address weaknesses in the security plan.

3.5 Review the plan on an ongoing basis, to detect exceptional incidents, breaches, and changes in circumstances.

3.6 Update the plan to reflect current circumstances.

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.

applying legislation, regulations and policies relating to security risk management

auditing in the context of security risk management

communicating with diverse stakeholders involving presentation, listening, questioning, paraphrasing, clarifying, summarising

reading and analysing complex information in standards and security plans

writing reports requiring formal language and structure

representing numerical, graphical and statistical information in diverse formats

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the depth of knowledge demonstrated must be appropriate to the job context of the candidate.

Operational knowledge of:

public service Acts

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control policy

protective security policy

Complex knowledge of:

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

Australian standards, quality assurance and certification requirements

organisation’s strategic objectives and security plan

national strategic objectives

security constraints

equal employment opportunity, equity and diversity principles

public sector legislation, including WHS and environment, in the context of implementation and monitoring of security risk management plans


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Implement security plan

1.1 Implement countermeasures and treat security risks.

1.2 Follow and meet timeframes and budgetary requirements.

1.3 Comply with legal, government and organisational policy requirements.

1.4 Document and monitor residual risks.

2. Monitor the risk environment

2.1 Determine and document strategies to monitor the risk environment.

2.2 Monitor security risks, types and sources of threats to detect changing circumstances that may alter risk management priorities.

2.3 Conduct monitoring on a regular basis.

2.4 Monitor organisational changes to identify circumstances where re-examination of the security environment becomes necessary.

2.5 Document and act upon results of monitoring.

3. Evaluate security plan

3.1 Monitor risk treatments to gauge extent and effectiveness of implementation.

3.2 Evaluate treatments against the objectives of the security plan.

3.3 Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work area.

3.4 Identify and address weaknesses in the security plan.

3.5 Review the plan on an ongoing basis, to detect exceptional incidents, breaches, and changes in circumstances.

3.6 Update the plan to reflect current circumstances.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Implement countermeasures and treat security risks. 
Follow and meet timeframes and budgetary requirements. 
Comply with legal, government and organisational policy requirements. 
Document and monitor residual risks. 
Determine and document strategies to monitor the risk environment. 
Monitor security risks, types and sources of threats to detect changing circumstances that may alter risk management priorities. 
Conduct monitoring on a regular basis. 
Monitor organisational changes to identify circumstances where re-examination of the security environment becomes necessary. 
Document and act upon results of monitoring. 
Monitor risk treatments to gauge extent and effectiveness of implementation. 
Evaluate treatments against the objectives of the security plan. 
Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work area. 
Identify and address weaknesses in the security plan. 
Review the plan on an ongoing basis, to detect exceptional incidents, breaches, and changes in circumstances. 
Update the plan to reflect current circumstances. 
Implement countermeasures and treat security risks. 
Follow and meet timeframes and budgetary requirements. 
Comply with legal, government and organisational policy requirements. 
Document and monitor residual risks. 
Determine and document strategies to monitor the risk environment. 
Monitor security risks, types and sources of threats to detect changing circumstances that may alter risk management priorities. 
Conduct monitoring on a regular basis. 
Monitor organisational changes to identify circumstances where re-examination of the security environment becomes necessary. 
Document and act upon results of monitoring. 
Monitor risk treatments to gauge extent and effectiveness of implementation. 
Evaluate treatments against the objectives of the security plan. 
Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work area. 
Identify and address weaknesses in the security plan. 
Review the plan on an ongoing basis, to detect exceptional incidents, breaches, and changes in circumstances. 
Update the plan to reflect current circumstances. 

Forms

Assessment Cover Sheet

PSPSEC013 - Implement and monitor security risk management plans
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

PSPSEC013 - Implement and monitor security risk management plans

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: