NTISthis.com

Evidence Guide: PSPSEC503A - Implement and monitor security risk management plans

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

PSPSEC503A - Implement and monitor security risk management plans

What evidence can you provide to prove your understanding of each of the following citeria?

Implement security plan

  1. Security risks are treated/countermeasures are implemented in accordance with the security plan
  2. Security plan is implemented to meet timeframe and budgetary requirements
  3. Countermeasures are implemented in compliance with legal requirements, government and organisational policy
  4. Residual risks are documented and monitored
Security risks are treated/countermeasures are implemented in accordance with the security plan

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security plan is implemented to meet timeframe and budgetary requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Countermeasures are implemented in compliance with legal requirements, government and organisational policy

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Residual risks are documented and monitored

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor the risk environment

  1. Strategies to monitor the risk environment are determined and documented
  2. Security risks, and the type/s and source/s of threats are monitored to detect changing circumstances that may alter risk management priorities
  3. Monitoring is conducted on a regular basis in accordance with organisational policy and procedures
  4. Changes to the organisation are monitored to identify circumstances where re-examination of the security environment becomes necessary
  5. Results of monitoring are documented and acted on
Strategies to monitor the risk environment are determined and documented

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security risks, and the type/s and source/s of threats are monitored to detect changing circumstances that may alter risk management priorities

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitoring is conducted on a regular basis in accordance with organisational policy and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Changes to the organisation are monitored to identify circumstances where re-examination of the security environment becomes necessary

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Results of monitoring are documented and acted on

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate security plan

  1. Risk treatments are monitored to gauge whether they are being implemented properly and fully
  2. Treatments are evaluated against the objectives of the security plan to ensure they remain effective and/or necessary
  3. Feedback is obtained from stakeholders on the adequacy and need for current security measures affecting their work area
  4. Weaknesses in the security plan are identified and addressed in accordance with organisational policy and procedures
  5. Security plan is reviewed on an on-going basis, as a result of incidents, breaches, and changes in circumstances
  6. Security plan is updated in accordance with organisational policies, procedures and guidelines to reflect current circumstances
Risk treatments are monitored to gauge whether they are being implemented properly and fully

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Treatments are evaluated against the objectives of the security plan to ensure they remain effective and/or necessary

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Feedback is obtained from stakeholders on the adequacy and need for current security measures affecting their work area

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Weaknesses in the security plan are identified and addressed in accordance with organisational policy and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security plan is reviewed on an on-going basis, as a result of incidents, breaches, and changes in circumstances

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security plan is updated in accordance with organisational policies, procedures and guidelines to reflect current circumstances

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The Evidence Guide specifies the evidence required to demonstrate achievement in the unit of competency as a whole. It must be read in conjunction with the Unit descriptor, Performance Criteria, the Range Statement and the Assessment Guidelines for the Public Sector Training Package.

Units to be assessed together

Pre-requisite unitsthat must be achieved prior to this unit:Nil

Co-requisite unitsthat must be assessed with this unit:Nil

Co-assessed units that may be assessed with this unit to increase the efficiency and realism of the assessment process include, but are not limited to:

PSPETHC501B Promote the values and ethos of public service

PSPGOV502B Develop client services

PSPGOV504B Undertake research and analysis

PSPLEGN501B Promote compliance with legislation in the public sector

PSPSEC501A Assess security risks

PSPSEC502A Develop security risk management plans

Overview of evidence requirements

In addition to integrated demonstration of the elements and their related performance criteria, look for evidence that confirms:

the knowledge requirements of this unit

the skill requirements of this unit

application of the Employability Skills as they relate to this unit (see Employability Summaries in Qualifications Framework)

security risk management plans implemented and monitored in a range of (2 or more) contexts (or occasions, over time)

Resources required to carry out assessment

These resources include:

legislation, policy, procedures and protocols relating to security risk management plans

Security Guidelines for Australian Government IT Systems (ACSI 33)

Commonwealth Protective Security Manual

case studies and workplace scenarios to capture the range of situations likely to be encountered when implementing and monitoring security risk management plans

Where and how to assess evidence

Valid assessment of this unit requires:

a workplace environment or one that closely resembles normal work practice and replicates the range of conditions likely to be encountered when implementing and monitoring security risk management plans, including coping with difficulties, irregularities and breakdowns in routine

security risk management plans implemented and monitored in a range of (2 or more) contexts (or occasions, over time)

Assessment methods should reflect workplace demands, such as literacy, and the needs of particular groups, such as:

people with disabilities

people from culturally and linguistically diverse backgrounds

Aboriginal and Torres Strait Islander people

women

young people

older people

people in rural and remote locations

Assessment methods suitable for valid and reliable assessment of this competency may include, but are not limited to, a combination of 2 or more of:

case studies

portfolios

questioning

scenarios

authenticated evidence from the workplace and/or training courses, such as a reviewed security plan

For consistency of assessment

Evidence must be gathered over time in a range of contexts to ensure the person can achieve the unit outcome and/or apply the competency in different situations or environments

Required Skills and Knowledge

This section describes the essential skills and knowledge and their level, required for this unit.

Skill requirements

Look for evidence that confirms skills in:

applying legislation, regulations and policies relating to security risk management

auditing in the context of security risk management

communicating with diverse stakeholders involving interviewing, negotiating, conflict resolution, listening, questioning, paraphrasing, clarifying, oummarizing

reading and analysing the complex information in standards, legislation and security plans

writing reports requiring formality of language and structure

using computer technology to gather and analyse information, and prepare reports

using numerical, graphical and statistical information

undertaking statistical analysis

responding to diversity, including gender and disability

applying procedures relating to occupational health and safety and environment in the context of implementing and monitoring security risk management plans

Knowledge requirements

Look for evidence that confirms knowledge and understanding of:

legislation, regulations, policies, procedures and guidelines relating to security risk management such as:

occupational health and safety

public service Acts

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control policy

protective security policy

Security Guidelines for Australian Government IT Systems (ACSI 33)

Commonwealth Protective Security Manual

Australian standards, quality assurance and certification requirements

security plan

organisation's strategic objectives

national strategic objectives

security constraints

equal employment opportunity, equity and diversity principles

public sector legislation such as occupational health and safety and environment in the context of implementation and monitoring of security risk management plans

Range Statement

The Range Statement provides information about the context in which the unit of competency is carried out. The variables cater for differences between States and Territories and the Commonwealth, and between organisations and workplaces. They allow for different work requirements, work practices and knowledge. The Range Statement also provides a focus for assessment. It relates to the unit as a whole. Text in italics in the Performance Criteria is explained here.

Security risks may include

internal

external

national

international

real

perceived

to:

people

property

information

reputation

criminal

terrorist

from foreign intelligence services

from commercial/industrial competitors

from malicious people

Countermeasures may include

revision of agency security plan

upgrade of existing security

installation of new security measures

technical controls

training

personnel-oriented

information-oriented

property-oriented

reputation-oriented

Legal requirements, government and organisational policy may include

Commonwealth and State/Territory legislation including equal employment opportunity, occupational health and safety, privacy and anti-discrimination law

access and equity

ethics and accountability

national and international codes of practice and standards

the organisation's policies and practices

government policy

codes of conduct/codes of ethics

Australian and New Zealand standards - Risk management AS/NZS 4360:1999

Security Guidelines for Australian Government IT Systems (ACSI 33)

Commonwealth Protective Security Manual

Residual risks are

those that cannot be treated

Strategies may include

audits

incident reporting mechanisms

technical controls

systems

rosters

access controls

training

Type of risk may include

severe

high

major

significant

moderate

low

trivial

Sources of threats may include

technical

actual events

political circumstances

human behaviour

environmental

conflict

terrorism

internal

external

local

national

international

Monitoring may include

regular checking

critical observation

regular recording

information, such as threat assessments, from senior management

reports from business units on current security measures

identification of changes over time such as:

notification of major changes to business or corporate goals or plans

notification of key projects

Risk treatments may include

addition of security measures

reduction of security measures

avoiding the risk through change of practice

acceptance of residual risk

minimisation of harm through response mechanisms

accepting the risk

Stakeholders may include

supervisors

managers

other areas within the organisation

other organisations

government

third parties

external contractors