NTISthis.com

Evidence Guide: PSPSEC012 - Develop security risk management plans

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

PSPSEC012 - Develop security risk management plans

What evidence can you provide to prove your understanding of each of the following citeria?

Identify counter-measures

  1. Review documented risks and threats and validate management decisions on acceptable and unacceptable risks.
  2. Determine treatment options and countermeasures to reduce the likelihood of occurrence or consequences of the risk.
  3. Propose treatments which include continuity plans where appropriate.
  4. Propose treatments which match the level and type of risk and importance of the function or resource.
  5. Conduct a cost-benefit analysis to determine countermeasures.
  6. Consult stakeholders on the cost-benefit analysis and determine and submit countermeasures for prioritising.
Review documented risks and threats and validate management decisions on acceptable and unacceptable risks.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine treatment options and countermeasures to reduce the likelihood of occurrence or consequences of the risk.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Propose treatments which include continuity plans where appropriate.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Propose treatments which match the level and type of risk and importance of the function or resource.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Conduct a cost-benefit analysis to determine countermeasures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Consult stakeholders on the cost-benefit analysis and determine and submit countermeasures for prioritising.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Develop security plan

  1. Prepare a security plan containing explanatory information on the importance of security and the organisation’s security objectives in achieving corporate and business objectives.
  2. Summarise the threat assessments undertaken, current exposure and current protective security arrangements in the plan.
  3. Outline security strategies for implementing, monitoring and evaluating countermeasures.
  4. Include timeframes and security budget for implementing countermeasures including assigned responsibilities and methodologies to be used.
  5. Submit security plan for approval and communicate to stakeholders.
Prepare a security plan containing explanatory information on the importance of security and the organisation’s security objectives in achieving corporate and business objectives.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Summarise the threat assessments undertaken, current exposure and current protective security arrangements in the plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Outline security strategies for implementing, monitoring and evaluating countermeasures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Include timeframes and security budget for implementing countermeasures including assigned responsibilities and methodologies to be used.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Submit security plan for approval and communicate to stakeholders.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify counter-measures

  1. Review documented risks and threats and validate management decisions on acceptable and unacceptable risks.
  2. Determine treatment options and countermeasures to reduce the likelihood of occurrence or consequences of the risk.
  3. Propose treatments which include continuity plans where appropriate.
  4. Propose treatments which match the level and type of risk and importance of the function or resource.
  5. Conduct a cost-benefit analysis to determine countermeasures.
  6. Consult stakeholders on the cost-benefit analysis and determine and submit countermeasures for prioritising.
Review documented risks and threats and validate management decisions on acceptable and unacceptable risks.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine treatment options and countermeasures to reduce the likelihood of occurrence or consequences of the risk.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Propose treatments which include continuity plans where appropriate.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Propose treatments which match the level and type of risk and importance of the function or resource.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Conduct a cost-benefit analysis to determine countermeasures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Consult stakeholders on the cost-benefit analysis and determine and submit countermeasures for prioritising.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Develop security plan

  1. Prepare a security plan containing explanatory information on the importance of security and the organisation’s security objectives in achieving corporate and business objectives.
  2. Summarise the threat assessments undertaken, current exposure and current protective security arrangements in the plan.
  3. Outline security strategies for implementing, monitoring and evaluating countermeasures.
  4. Include timeframes and security budget for implementing countermeasures including assigned responsibilities and methodologies to be used.
  5. Submit security plan for approval and communicate to stakeholders.
Prepare a security plan containing explanatory information on the importance of security and the organisation’s security objectives in achieving corporate and business objectives.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Summarise the threat assessments undertaken, current exposure and current protective security arrangements in the plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Outline security strategies for implementing, monitoring and evaluating countermeasures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Include timeframes and security budget for implementing countermeasures including assigned responsibilities and methodologies to be used.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Submit security plan for approval and communicate to stakeholders.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Identify counter-measures

1.1 Review documented risks and threats and validate management decisions on acceptable and unacceptable risks.

1.2 Determine treatment options and countermeasures to reduce the likelihood of occurrence or consequences of the risk.

1.3 Propose treatments which include continuity plans where appropriate.

1.4 Propose treatments which match the level and type of risk and importance of the function or resource.

1.5 Conduct a cost-benefit analysis to determine countermeasures.

1.6 Consult stakeholders on the cost-benefit analysis and determine and submit countermeasures for prioritising.

2. Develop security plan

2.1 Prepare a security plan containing explanatory information on the importance of security and the organisation’s security objectives in achieving corporate and business objectives.

2.2 Summarise the threat assessments undertaken, current exposure and current protective security arrangements in the plan.

2.3 Outline security strategies for implementing, monitoring and evaluating countermeasures.

2.4 Include timeframes and security budget for implementing countermeasures including assigned responsibilities and methodologies to be used.

2.5 Submit security plan for approval and communicate to stakeholders.

Required Skills and Knowledge

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Identify counter-measures

1.1 Review documented risks and threats and validate management decisions on acceptable and unacceptable risks.

1.2 Determine treatment options and countermeasures to reduce the likelihood of occurrence or consequences of the risk.

1.3 Propose treatments which include continuity plans where appropriate.

1.4 Propose treatments which match the level and type of risk and importance of the function or resource.

1.5 Conduct a cost-benefit analysis to determine countermeasures.

1.6 Consult stakeholders on the cost-benefit analysis and determine and submit countermeasures for prioritising.

2. Develop security plan

2.1 Prepare a security plan containing explanatory information on the importance of security and the organisation’s security objectives in achieving corporate and business objectives.

2.2 Summarise the threat assessments undertaken, current exposure and current protective security arrangements in the plan.

2.3 Outline security strategies for implementing, monitoring and evaluating countermeasures.

2.4 Include timeframes and security budget for implementing countermeasures including assigned responsibilities and methodologies to be used.

2.5 Submit security plan for approval and communicate to stakeholders.

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.

applying legislation, regulations and policies relating to security risk management plans

using evaluation, deductive reasoning, problem solving and decision making

communicating with diverse stakeholders involving presentation, listening, questioning, paraphrasing, clarifying, summarising

reading and analysing complex information in standards and security plans

writing reports requiring formal language and structure

representing numerical, graphical and statistical information in diverse formats

Operational knowledge of:

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control policy

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

Australian standards, quality assurance and certification requirements

international treaties and protocols

requires comprehensive knowledge of cross-jurisdictional protocols

organisation’s strategic objectives

national strategic objectives

formats for different types of reports

cost-benefit analysis techniques

equal employment opportunity, equity and diversity principles

public sector legislation, including WHS and environment, in the context of security risk assessment