Assessor Resource

BSBXCS405
Contribute to cyber security incident responses

Assessment tool

Version 1.0
Issue Date: May 2024


This unit describes the skills and knowledge required to assist in responding to and containing cyber security incidents.

It applies to those working in a broad range of industries and job roles who work alongside technical experts to develop cyber security risk-management strategies.

No licensing, legislative or certification requirements apply to this unit at the time of publication.

You may want to include more information here about the target group and the purpose of the assessments (eg formative, summative, recognition)



Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to assist in:

responding to two different cyber security incidents in a work area

conducting one post-breach review.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

legislative requirements relating to contributing to cyber security incident responses, including:

data protection

implications of notifiable data breach legislation on an organisation and other associated Australian privacy laws

established international legislation

procedures for developing communications plans

organisational policies and procedures relating to cyber security incident response, including procedures for:

confirming nature and location of incidents

determining risk, likelihood, and consequence of incidents

containing incidents

notifying internal and external stakeholders of incident

internal and external communications

conducting post-breach reviews

reporting methods for cyber security incidents, including official government channels

key features of cyber security incident response plan

risk mitigation strategies and procedures relating to cyber security

internal and external stakeholders involved in responding to cyber security incidents.

Skills must be assessed in a workplace or simulated environment where conditions are typical of a work environment requiring cyber secure practices, processes and procedures.

Access is required to:

information and data sources relating to cyber security

device with active internet connection

internet browser

industry standards, organisational procedures, and legislative requirements required to demonstrate the performance evidence.

Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assingnment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to assist in:

responding to two different cyber security incidents in a work area

conducting one post-breach review.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

legislative requirements relating to contributing to cyber security incident responses, including:

data protection

implications of notifiable data breach legislation on an organisation and other associated Australian privacy laws

established international legislation

procedures for developing communications plans

organisational policies and procedures relating to cyber security incident response, including procedures for:

confirming nature and location of incidents

determining risk, likelihood, and consequence of incidents

containing incidents

notifying internal and external stakeholders of incident

internal and external communications

conducting post-breach reviews

reporting methods for cyber security incidents, including official government channels

key features of cyber security incident response plan

risk mitigation strategies and procedures relating to cyber security

internal and external stakeholders involved in responding to cyber security incidents.

Skills must be assessed in a workplace or simulated environment where conditions are typical of a work environment requiring cyber secure practices, processes and procedures.

Access is required to:

information and data sources relating to cyber security

device with active internet connection

internet browser

industry standards, organisational procedures, and legislative requirements required to demonstrate the performance evidence.

Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Confirm nature and location of cyber security incident according to organisational policies and procedures 
Estimate risk, likelihood and potential consequence of incident according to organisational response procedures 
Assist in ensuring that cyber incident is contained according to legislative requirements and organisational cyber security incident response plan 
Assist in confirming no further risks according to legislative requirements and organisational response procedures 
Escalate cyber security incident with required workplace personnel according to organisational policies and procedures 
Consult with required internal and external stakeholders on communication needs relating to cyber security incident 
Assist in alerting required external parties according to legislative requirements and organisational procedures 
Support post-breach review and reporting 
Assist in identifying lessons learnt from incident response and recommended changes to cyber security response plan 
Assist in updating cyber security response plan to reflect review outcomes according to organisational policies and procedures 
Communicate lessons learnt and recommendations to required personnel 

Forms

Assessment Cover Sheet

BSBXCS405 - Contribute to cyber security incident responses
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

BSBXCS405 - Contribute to cyber security incident responses

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: