NTISthis.com

Evidence Guide: CPPSEC5004A - Prepare security risk management plan

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

CPPSEC5004A - Prepare security risk management plan

What evidence can you provide to prove your understanding of each of the following citeria?

Evaluate security risks.

  1. Security risks are identified and consequences interpreted in accordance with client, organisational and legislative requirements and relevant standards.
  2. Acceptable and unacceptable risks are clearly distinguished and confirmed.
  3. High priority risks are emphasised and specified to ensure the development of appropriate controls.
  4. Existing controls are evaluated to determine impact on risk occurrence and required modifications identified.
Security risks are identified and consequences interpreted in accordance with client, organisational and legislative requirements and relevant standards.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Acceptable and unacceptable risks are clearly distinguished and confirmed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

High priority risks are emphasised and specified to ensure the development of appropriate controls.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Existing controls are evaluated to determine impact on risk occurrence and required modifications identified.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Develop action plans.

  1. Action plans are developed identifying key tasks, activities and resources to achieve security risk management objectives.
  2. Type of risk associated with security context is identified and appropriate controls incorporated into planning processes.
  3. Communication and reporting arrangements for maintaining currency of action plans are established.
  4. Contingency arrangements for actions are developed and incorporated into plans.
Action plans are developed identifying key tasks, activities and resources to achieve security risk management objectives.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Type of risk associated with security context is identified and appropriate controls incorporated into planning processes.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Communication and reporting arrangements for maintaining currency of action plans are established.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Contingency arrangements for actions are developed and incorporated into plans.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design treatment options.

  1. Operating environment monitored to confirm potential and real risks, threats and required treatments.
  2. Treatment options are selected in line with available organisational practices, and implications researched, clarified and approved by relevant persons.
  3. Feasible treatment options are documented and costed to ensure compatibility with nature of risk and client requirements.
  4. Treatment options are linked to whole or part of security risks and verified with clients for suitability to security context.
  5. Tests on treatment options are conducted to determine applicability in the field, and results statistically analysed to confirm effectiveness of treatments.
Operating environment monitored to confirm potential and real risks, threats and required treatments.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Treatment options are selected in line with available organisational practices, and implications researched, clarified and approved by relevant persons.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Feasible treatment options are documented and costed to ensure compatibility with nature of risk and client requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Treatment options are linked to whole or part of security risks and verified with clients for suitability to security context.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Tests on treatment options are conducted to determine applicability in the field, and results statistically analysed to confirm effectiveness of treatments.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Develop security risk management plan.

  1. Management requirements are identified and accounted for in development of security risk management plan.
  2. Procedures for monitoring and review of security risk management activities are developed to ensure continuous improvement.
  3. Security risk management plan is developed incorporating all relevant information in line with appropriate format and relevant standards.
  4. Plan is finalised and presented to client for review and approval in accordance with organisational procedures.
Management requirements are identified and accounted for in development of security risk management plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Procedures for monitoring and review of security risk management activities are developed to ensure continuous improvement.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security risk management plan is developed incorporating all relevant information in line with appropriate format and relevant standards.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Plan is finalised and presented to client for review and approval in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of:

identifying and evaluating security risks and control measures in compliance with client, organisational and legislative requirements

designing and developing effective action plans which incorporate strategies for treating risks, contingency arrangements, key tasks and resources, and communication and reporting

designing and testing risk treatment options which are compatible with nature of risk and client requirements, and conducting an analysis of the results to confirm effectiveness of treatments

developing a comprehensive risk management plan in an appropriate format which incorporates a broad range of relevant information, considers implementation issues, and incorporates continuous improvement mechanisms based on the principles of AS/NZS 4360:2004.

Context of and specific resources for assessment

Context of assessment includes:

a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement.

Resource implications for assessment include:

access to a registered provider of assessment services

access to a suitable venue and equipment

access to plain English version of relevant statutes and procedures

assessment instruments including personal planner and assessment record book

work schedules, organisational policies and duty statements.

Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

Method of assessment

This unit of competency should be assessed using questioning of underpinning knowledge and skills.

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge.

Oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical.

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff.

Required Skills and Knowledge

This section describes the skills and knowledge and their level required for this unit.

Required skills

access and use workplace information

active listening

adapt personal communication style to a variety of situations

analyse and evaluate information and data

coaching and mentoring to provide support to colleagues

collate numerical data

communicate in a clear and concise manner

design treatment options and tests

negotiation

numeracy skills to calculate resources and costings

planning

reading to interpret complex information

relate to people from a range of social, cultural and ethnic backgrounds and physical and mental abilities

solve problems to deal with complex and non routine difficulties

use technology to research, analyse and report information

writing to develop complex reports.

Required knowledge

applicable Occupational Health and Safety (OHS) licensing and legislative compliance requirements

application of the hierarchy of control

approved communication terminology and call signs

available support agencies and the types of services offered

basic methods for statistical analysis and presentation of statistical data

difference between negative and positive language

differences between written and spoken English

how to read and use body language to gain confidence of others

how to record information which may be used for legal purposes

how to safeguard confidential information

how to use business equipment to present information

negotiation techniques

OHS implications relating to use of guard dogs, apprehension or arrest of persons, use of firearms, use of restraints, handcuffs, batons and spray

organisational standards for the presentation and maintenance of written information

principles of AS/NZS 4360: 2004 Risk management

risk management principles and practices

sources of supply of security equipment or systems

tactical response measures

use of force guidelines.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Security risks may relate to:

biological hazards

chemical spills

client contact

electrical faults

explosives

financial viability

injury to personnel

noise, light, heat, smoke

persons carrying weapons

persons causing a public nuisance

persons demonstrating suspicious behaviour

persons suffering from emotional or physical distress

persons under the influence of intoxicating substances

persons with criminal intent

persons, vehicles and equipment in unsuitable locations

property or people

security systems

suspicious packages or substances

systems or process failures

terrorism

violence or physical threats.

Riskrelates to:

the chance of something happening that will have an impact on objectives.

Organisational requirements may relate to:

client service standards

implementation of OHS system

policies for ensuring privacy and confidentiality of information

procedures for archiving electronic and hard-copy records

procedures for recording, storing and destroying information

standard of language, literacy and numeracy required

use of organisational equipment and resources.

Legislative requirements may relate to:

anti-discrimination and diversity

Australian standards, codes of practice and regulations

award and enterprise agreements

duty of care

evidence collection

licensing arrangements and certification requirements

OHS issue resolution

relevant commonwealth, state and territory OHS legislation, codes of practice and regulations

roles and responsibilities of OHS representatives and committees

trade practices

use of force.

Relevant standards:

must include AS/NZS 4360: 2004 Risk management

may relate to:

AS2630-1983 Guide to the selection and application of intruder alarm systems for domestic and business premises

HB 167:2006 Security Risk Management

HB 436 Risk Management Guidelines - Companion to AS/NZS 4360

HB 231:2000 Information security risk management guidelines.

Controlsmay include:

communication

deployment of specialist expertise or equipment

development of procedures

monitoring and surveillance

physical attendance and security

staff ratios and resource deployment

training of personnel.

Type of risk may be:

intermediate

likely to occur

major

minor

physical

potentially avoidable

potentially unavoidable

property related

unlikely to occur.

Contingency arrangementsmay include:

approvals and licenses

availability of additional resources

background information

back-up

checklists and reporting

identification requirements

instructions.

Project planning requirementsmay include:

key outcomes

milestones

personnel involvement

resources

tasks

timelines.

Treatment optionsmay include:

controlled interruptions to normal operations

exercises

information collation and analysis

simulations

surveillance

verification requirements.

Relevant personsmay include:

authorities

client

managers

technical specialists.

Testsmay include:

alarms and other warning devices

exercises

inspections

interviews

rehearsals

simulations.

Management requirementsmay relate to:

adherence to organisational policies and procedures

allocation of suitable resources and expertise

feedback and monitoring arrangements

preparation of documentation and checklists

procedures to maximise safety of operatives

project planning

reporting procedures and timeframes

risk management timelines and objectives specified in action plans.

Relevant informationmay include

action plans

backup systems or processes

contingency plans

details and results of testing and relevant statistical analysis

identified assets

identified management requirements

implementation issues

operational issues

resource requirements including allocation and location of resources

review and monitoring procedures

risk assessment

supporting evidence

threat assessment

treatment options and strategies linked to risks and threats.

Formatmay relate to:

accuracy

common industry terminology

enclosures and attachments

length

sequence of coverage

style

use of abbreviations

use of appendices

use of plain English.