The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Establish security risk context
|
|
Confirm strategic and organisational contexts and identify stakeholders and their expectations. Completed |
Evidence:
|
Identify current and relevant security risk criteria from the security plan. Completed |
Evidence:
|
Obtain information and resources to conduct the risk analysis. Completed |
Evidence:
|
Identify security risk
|
|
Identify and record potential sources of security risk from the perspective of all stakeholders. Completed |
Evidence:
|
Use specified methodology and tools to identify risks. Completed |
Evidence:
|
Consult stakeholders during the risk identification process to finalise a list of risks. Completed |
Evidence:
|
Analyse security risk
|
|
Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring. Completed |
Evidence:
|
Determine potential consequences of each risk including critical lead time for recovery. Completed |
Evidence:
|
Determine, document and communicate risk ratings and include a rationale for each. Completed |
Evidence:
|
Evaluate security risk
|
|
Assess risks against the organisation’s security risk criteria. Completed |
Evidence:
|
Prioritise risks for treatment. Completed |
Evidence:
|
Monitor risks until treatment measures have been implemented. Completed |
Evidence:
|
Compile security risk register
|
|
Develop a security risk register that records identified risks, their nature and source. Completed |
Evidence:
|
Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register. Completed |
Evidence:
|
Record risk ratings for identified risks in register. Completed |
Evidence:
|
Compile and maintain the security risk register to reflect changes in circumstances. Completed |
Evidence:
|
Refer risk register to management for decisions on action and treatment of risks. Completed |
Evidence:
|
Establish security risk context
|
|
Confirm strategic and organisational contexts and identify stakeholders and their expectations. Completed |
Evidence:
|
Identify current and relevant security risk criteria from the security plan. Completed |
Evidence:
|
Obtain information and resources to conduct the risk analysis. Completed |
Evidence:
|
Identify security risk
|
|
Identify and record potential sources of security risk from the perspective of all stakeholders. Completed |
Evidence:
|
Use specified methodology and tools to identify risks. Completed |
Evidence:
|
Consult stakeholders during the risk identification process to finalise a list of risks. Completed |
Evidence:
|
Analyse security risk
|
|
Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring. Completed |
Evidence:
|
Determine potential consequences of each risk including critical lead time for recovery. Completed |
Evidence:
|
Determine, document and communicate risk ratings and include a rationale for each. Completed |
Evidence:
|
Evaluate security risk
|
|
Assess risks against the organisation’s security risk criteria. Completed |
Evidence:
|
Prioritise risks for treatment. Completed |
Evidence:
|
Monitor risks until treatment measures have been implemented. Completed |
Evidence:
|
Compile security risk register
|
|
Develop a security risk register that records identified risks, their nature and source. Completed |
Evidence:
|
Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register. Completed |
Evidence:
|
Record risk ratings for identified risks in register. Completed |
Evidence:
|
Compile and maintain the security risk register to reflect changes in circumstances. Completed |
Evidence:
|
Refer risk register to management for decisions on action and treatment of risks. Completed |
Evidence:
|