The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Protect assets from security threats
|
|
Assets are stored and accessed in accordance with organisational policies, procedures and guidelines Completed |
Evidence:
|
Assets are regularly checked to ensure security Completed |
Evidence:
|
Suspicious activity is investigated and dealt with in accordance with organisational policy and procedures Completed |
Evidence:
|
Expert advice is obtained as required in accordance with organisational policy and procedures Completed |
Evidence:
|
Implement access restrictions
|
|
Access is restricted to authorised personnel Completed |
Evidence:
|
Potential threats are identified Completed |
Evidence:
|
Breaches are identified and reported to appropriate personnel in accordance with organisational policy and procedures Completed |
Evidence:
|
Action is taken to deal with a breach in accordance with legislation, policy and guidelines Completed |
Evidence:
|
Advise third parties of security requirements
|
|
The needs, expectations, attitudes, and current level of knowledge of third parties are confirmed Completed |
Evidence:
|
Risks related to possible confrontations are identified and managed in accordance with organisational risk management and procedures Completed |
Evidence:
|
Third parties are advised of the organisation's security requirements Completed |
Evidence:
|
Advice is provided that is current, timely and meets the specific needs of the parties in its range, depth and form of presentation Completed |
Evidence:
|
Feedback is obtained on the party's level of understanding, and additional information or explanation is used to clarify requirements if needed Completed |
Evidence:
|
Minimise security risk
|
|
Changes in circumstance are identified and reported to appropriate personnel in accordance with organisational policy and procedures Completed |
Evidence:
|
Documentation is completed in accordance with organisational policies, procedures and guidelines Completed |
Evidence:
|
Actions are taken to reduce the likelihood of breaches reoccurring in accordance with the organisation's security plan Completed |
Evidence:
|