NTISthis.com

Evidence Guide: PSPSEC005 - Undertake government security risk analysis

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

PSPSEC005 - Undertake government security risk analysis

What evidence can you provide to prove your understanding of each of the following citeria?

Establish security risk context

  1. Confirm strategic and organisational contexts and identify stakeholders and their expectations.
  2. Identify current and relevant security risk criteria from the security plan.
  3. Obtain information and resources to conduct the risk analysis.
Confirm strategic and organisational contexts and identify stakeholders and their expectations.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify current and relevant security risk criteria from the security plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain information and resources to conduct the risk analysis.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify security risk

  1. Identify and record potential sources of security risk from the perspective of all stakeholders.
  2. Use specified methodology and tools to identify risks.
  3. Consult stakeholders during the risk identification process to finalise a list of risks.
Identify and record potential sources of security risk from the perspective of all stakeholders.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Use specified methodology and tools to identify risks.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Consult stakeholders during the risk identification process to finalise a list of risks.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse security risk

  1. Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring.
  2. Determine potential consequences of each risk including critical lead time for recovery.
  3. Determine, document and communicate risk ratings and include a rationale for each.
Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine potential consequences of each risk including critical lead time for recovery.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine, document and communicate risk ratings and include a rationale for each.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate security risk

  1. Assess risks against the organisation’s security risk criteria.
  2. Prioritise risks for treatment.
  3. Monitor risks until treatment measures have been implemented.
Assess risks against the organisation’s security risk criteria.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Prioritise risks for treatment.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor risks until treatment measures have been implemented.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Compile security risk register

  1. Develop a security risk register that records identified risks, their nature and source.
  2. Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register.
  3. Record risk ratings for identified risks in register.
  4. Compile and maintain the security risk register to reflect changes in circumstances.
  5. Refer risk register to management for decisions on action and treatment of risks.
Develop a security risk register that records identified risks, their nature and source.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record risk ratings for identified risks in register.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Compile and maintain the security risk register to reflect changes in circumstances.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Refer risk register to management for decisions on action and treatment of risks.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Establish security risk context

  1. Confirm strategic and organisational contexts and identify stakeholders and their expectations.
  2. Identify current and relevant security risk criteria from the security plan.
  3. Obtain information and resources to conduct the risk analysis.
Confirm strategic and organisational contexts and identify stakeholders and their expectations.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify current and relevant security risk criteria from the security plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain information and resources to conduct the risk analysis.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify security risk

  1. Identify and record potential sources of security risk from the perspective of all stakeholders.
  2. Use specified methodology and tools to identify risks.
  3. Consult stakeholders during the risk identification process to finalise a list of risks.
Identify and record potential sources of security risk from the perspective of all stakeholders.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Use specified methodology and tools to identify risks.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Consult stakeholders during the risk identification process to finalise a list of risks.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse security risk

  1. Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring.
  2. Determine potential consequences of each risk including critical lead time for recovery.
  3. Determine, document and communicate risk ratings and include a rationale for each.
Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine potential consequences of each risk including critical lead time for recovery.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine, document and communicate risk ratings and include a rationale for each.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate security risk

  1. Assess risks against the organisation’s security risk criteria.
  2. Prioritise risks for treatment.
  3. Monitor risks until treatment measures have been implemented.
Assess risks against the organisation’s security risk criteria.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Prioritise risks for treatment.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor risks until treatment measures have been implemented.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Compile security risk register

  1. Develop a security risk register that records identified risks, their nature and source.
  2. Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register.
  3. Record risk ratings for identified risks in register.
  4. Compile and maintain the security risk register to reflect changes in circumstances.
  5. Refer risk register to management for decisions on action and treatment of risks.
Develop a security risk register that records identified risks, their nature and source.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record risk ratings for identified risks in register.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Compile and maintain the security risk register to reflect changes in circumstances.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Refer risk register to management for decisions on action and treatment of risks.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Establish security risk context

1.1 Confirm strategic and organisational contexts and identify stakeholders and their expectations.

1.2 Identify current and relevant security risk criteria from the security plan.

1.3 Obtain information and resources to conduct the risk analysis.

2. Identify security risk

2.1 Identify and record potential sources of security risk from the perspective of all stakeholders.

2.2 Use specified methodology and tools to identify risks.

2.3 Consult stakeholders during the risk identification process to finalise a list of risks.

3. Analyse security risk

3.1 Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring.

3.2 Determine potential consequences of each risk including critical lead time for recovery.

3.3 Determine, document and communicate risk ratings and include a rationale for each.

4. Evaluate security risk

4.1 Assess risks against the organisation’s security risk criteria.

4.2 Prioritise risks for treatment.

4.3 Monitor risks until treatment measures have been implemented.

5. Compile security risk register

5.1 Develop a security risk register that records identified risks, their nature and source.

5.2 Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register.

5.3 Record risk ratings for identified risks in register.

5.4 Compile and maintain the security risk register to reflect changes in circumstances.

5.5 Refer risk register to management for decisions on action and treatment of risks.

Required Skills and Knowledge

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Establish security risk context

1.1 Confirm strategic and organisational contexts and identify stakeholders and their expectations.

1.2 Identify current and relevant security risk criteria from the security plan.

1.3 Obtain information and resources to conduct the risk analysis.

2. Identify security risk

2.1 Identify and record potential sources of security risk from the perspective of all stakeholders.

2.2 Use specified methodology and tools to identify risks.

2.3 Consult stakeholders during the risk identification process to finalise a list of risks.

3. Analyse security risk

3.1 Identify threat assessments, current exposure and current security arrangements to estimate the likelihood of each risk event occurring.

3.2 Determine potential consequences of each risk including critical lead time for recovery.

3.3 Determine, document and communicate risk ratings and include a rationale for each.

4. Evaluate security risk

4.1 Assess risks against the organisation’s security risk criteria.

4.2 Prioritise risks for treatment.

4.3 Monitor risks until treatment measures have been implemented.

5. Compile security risk register

5.1 Develop a security risk register that records identified risks, their nature and source.

5.2 Identify the consequences and likelihood of risks, and the adequacy of existing controls in the register.

5.3 Record risk ratings for identified risks in register.

5.4 Compile and maintain the security risk register to reflect changes in circumstances.

5.5 Refer risk register to management for decisions on action and treatment of risks.

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.

applying legislation, regulations and policies relating to government security management

analysing the organisation’s security plan

researching and critically analysing the operational environment and drawing conclusions

using effective communication with diverse stakeholders involving listening, questioning, paraphrasing, clarifying, summarising

writing formal and highly complex reports

representing mathematical information in diverse formats

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the depth of knowledge demonstrated must be appropriate to the job context of the candidate.

legislation, regulations, policies, procedures and guidelines relating to government security management including WHS

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control and protective security policies

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

risk analysis terminology and techniques

the organisation’s security plan

the organisation’s assets and security environment

risk management: principles and guidelines

AS/NZS ISO 31000:2009