NTISthis.com

Evidence Guide: PSPSEC006 - Implement security risk treatments

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

PSPSEC006 - Implement security risk treatments

What evidence can you provide to prove your understanding of each of the following citeria?

Confirm risk decisions

  1. Confirm management decisions determining acceptable and unacceptable levels of risks.
  2. Note and monitor low level risks accepted by the organisation, to detect changed circumstances.
  3. Refer unacceptable high-level risks for development of formal management plans.
  4. Note for treatment all major or significant risks determined as unacceptable.
Confirm management decisions determining acceptable and unacceptable levels of risks.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Note and monitor low level risks accepted by the organisation, to detect changed circumstances.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Refer unacceptable high-level risks for development of formal management plans.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Note for treatment all major or significant risks determined as unacceptable.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify risk treatments

  1. Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk.
  2. Select treatments to reduce the likelihood and/or consequences of the risk.
  3. Include continuity plans in treatments where appropriate.
  4. Document treatments and submit for approval.
Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select treatments to reduce the likelihood and/or consequences of the risk.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Include continuity plans in treatments where appropriate.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document treatments and submit for approval.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement countermeasures

  1. Develop and implement a treatment plan.
  2. Apply countermeasures in accordance with the implementation strategy detailed in the security plan.
  3. Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements.
Develop and implement a treatment plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Apply countermeasures in accordance with the implementation strategy detailed in the security plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor and review security risk management process

  1. Implement strategies to monitor risk environment.
  2. Evaluate risk treatments against the objectives of the security plan.
  3. Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area.
  4. Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel.
Implement strategies to monitor risk environment.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate risk treatments against the objectives of the security plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Confirm risk decisions

  1. Confirm management decisions determining acceptable and unacceptable levels of risks.
  2. Note and monitor low level risks accepted by the organisation, to detect changed circumstances.
  3. Refer unacceptable high-level risks for development of formal management plans.
  4. Note for treatment all major or significant risks determined as unacceptable.
Confirm management decisions determining acceptable and unacceptable levels of risks.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Note and monitor low level risks accepted by the organisation, to detect changed circumstances.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Refer unacceptable high-level risks for development of formal management plans.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Note for treatment all major or significant risks determined as unacceptable.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify risk treatments

  1. Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk.
  2. Select treatments to reduce the likelihood and/or consequences of the risk.
  3. Include continuity plans in treatments where appropriate.
  4. Document treatments and submit for approval.
Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select treatments to reduce the likelihood and/or consequences of the risk.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Include continuity plans in treatments where appropriate.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document treatments and submit for approval.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement countermeasures

  1. Develop and implement a treatment plan.
  2. Apply countermeasures in accordance with the implementation strategy detailed in the security plan.
  3. Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements.
Develop and implement a treatment plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Apply countermeasures in accordance with the implementation strategy detailed in the security plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor and review security risk management process

  1. Implement strategies to monitor risk environment.
  2. Evaluate risk treatments against the objectives of the security plan.
  3. Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area.
  4. Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel.
Implement strategies to monitor risk environment.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate risk treatments against the objectives of the security plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Confirm risk decisions

1.1 Confirm management decisions determining acceptable and unacceptable levels of risks.

1.2 Note and monitor low level risks accepted by the organisation, to detect changed circumstances.

1.3 Refer unacceptable high-level risks for development of formal management plans.

1.4 Note for treatment all major or significant risks determined as unacceptable.

2. Identify risk treatments

2.1 Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk.

2.2 Select treatments to reduce the likelihood and/or consequences of the risk.

2.3 Include continuity plans in treatments where appropriate.

2.4 Document treatments and submit for approval.

3. Implement countermeasures

3.1 Develop and implement a treatment plan.

3.2 Apply countermeasures in accordance with the implementation strategy detailed in the security plan.

3.3 Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements.

4. Monitor and review security risk management process

4.1 Implement strategies to monitor risk environment.

4.2 Evaluate risk treatments against the objectives of the security plan.

4.3 Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area.

4.4 Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel.

Required Skills and Knowledge

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Confirm risk decisions

1.1 Confirm management decisions determining acceptable and unacceptable levels of risks.

1.2 Note and monitor low level risks accepted by the organisation, to detect changed circumstances.

1.3 Refer unacceptable high-level risks for development of formal management plans.

1.4 Note for treatment all major or significant risks determined as unacceptable.

2. Identify risk treatments

2.1 Ensure treatments are consistent with the security plan, are cost effective and address levels and types of risk and the importance of the function or resource at risk.

2.2 Select treatments to reduce the likelihood and/or consequences of the risk.

2.3 Include continuity plans in treatments where appropriate.

2.4 Document treatments and submit for approval.

3. Implement countermeasures

3.1 Develop and implement a treatment plan.

3.2 Apply countermeasures in accordance with the implementation strategy detailed in the security plan.

3.3 Implement countermeasures in accordance with timeframe, budgetary requirements and legal requirements.

4. Monitor and review security risk management process

4.1 Implement strategies to monitor risk environment.

4.2 Evaluate risk treatments against the objectives of the security plan.

4.3 Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work/area.

4.4 Convey recommendations for re-examination of security risk or improved risk treatments to the appropriate personnel.

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.

applying legislation, regulations and policies relating to government security management

reading and analysing the organisation’s security plan

communicating with diverse stakeholders

using computer technology to gather and analyse information, and prepare formal reports

representing mathematical information in format to suit the purpose

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the depth of knowledge demonstrated must be appropriate to the job context of the candidate.

legislation, regulations, policies, procedures and guidelines relating to government security management including WHS

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control and protective security policies

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

risk analysis terminology and techniques

the organisation’s security plan

the organisation’s assets and security environment

risk management: principles and guidelines

AS/NZS ISO 31000:2009