NTISthis.com

Evidence Guide: PSPSEC402A - Implement security risk treatments

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

PSPSEC402A - Implement security risk treatments

What evidence can you provide to prove your understanding of each of the following citeria?

Confirm risk decisions

  1. Management decisions determining acceptable and unacceptable risks are confirmed in accordance with organisational policy and procedures.
  2. Low-level risks that the organisation decides to accept are noted and monitored to detect changed circumstances .
  3. Unacceptable high-level risks are referred for the development of formal management plans.
  4. Major or significant risks identified as unacceptable are noted for treatment.
Management decisions determining acceptable and unacceptable risks are confirmed in accordance with organisational policy and procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Low-level risks that the organisation decides to accept are noted and monitored to detect changed circumstances .

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Unacceptable high-level risks are referred for the development of formal management plans.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Major or significant risks identified as unacceptable are noted for treatment.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify risk treatments

  1. Treatments are determined that are consistent with organisational policies, procedures and guidelines and the organisation's security plan.
  2. Treatments are determined that are cost-effective and match the level and type of risk and the importance of the function or resource.
  3. Treatments are selected to reduce the likelihood of occurrence or the consequences of the risk, or both.
  4. Continuity plans are included in treatments, where appropriate, in accordance with the security plan.
  5. Treatments are documented and submitted for approval in accordance with organisational policy and procedures.
Treatments are determined that are consistent with organisational policies, procedures and guidelines and the organisation's security plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Treatments are determined that are cost-effective and match the level and type of risk and the importance of the function or resource.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Treatments are selected to reduce the likelihood of occurrence or the consequences of the risk, or both.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Continuity plans are included in treatments, where appropriate, in accordance with the security plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Treatments are documented and submitted for approval in accordance with organisational policy and procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement countermeasures

  1. A treatment plan is developed and implemented in accordance with organisational policy and procedures.
  2. Implementation of countermeasures is undertaken in accordance with the implementation strategy detailed in the security plan.
  3. Countermeasures are implemented in accordance with timeframe and budgetary requirements.
  4. Countermeasures are implemented in accordance with legal requirements, government and organisational policy.
A treatment plan is developed and implemented in accordance with organisational policy and procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implementation of countermeasures is undertaken in accordance with the implementation strategy detailed in the security plan.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Countermeasures are implemented in accordance with timeframe and budgetary requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Countermeasures are implemented in accordance with legal requirements, government and organisational policy.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor and review security risk management process

  1. Strategies to monitor risk environment are implemented.
  2. Monitoring is conducted on a regular basis in accordance with organisational policy and procedures.
  3. Risk treatments are evaluated against the objectives of the security plan to ensure these remain effective and/or necessary.
  4. Feedback is obtained from stakeholders on the adequacy and need for current security measures affecting their work/area.
  5. Recommendations for re-examination of security risk or improved risk treatments are conveyed to the appropriate personnel in accordance with organisational policy and procedures.
Strategies to monitor risk environment are implemented.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitoring is conducted on a regular basis in accordance with organisational policy and procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Risk treatments are evaluated against the objectives of the security plan to ensure these remain effective and/or necessary.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Feedback is obtained from stakeholders on the adequacy and need for current security measures affecting their work/area.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Recommendations for re-examination of security risk or improved risk treatments are conveyed to the appropriate personnel in accordance with organisational policy and procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The Evidence Guide specifies the evidence required to demonstrate achievement in the unit of competency as a whole. It must be read in conjunction with the Unit descriptor, Performance Criteria, the Range Statement and the Assessment Guidelines for the Public Sector Training Package.

Units to be assessed together

Pre-requisite units that must be achieved prior to this unit:Nil

Co-requisite units that must be assessed with this unit:Nil

Co-assessed units that may be assessed with this unit to increase the efficiency and realism of the assessment process include, but are not limited to:

PSPETHC401A Uphold and support the values and principles of public service

PSPGOV406B Gather and analyse information

PSPGOV422A Apply government processes

PSPLEGN401A Encourage compliance with legislation in the public sector

PSPREG401C Exercise regulatory powers

Overview of evidence requirements

In addition to integrated demonstration of the elements and their related performance criteria, look for evidence that confirms:

the knowledge requirements of this unit

the skill requirements of this unit

application of the Employability Skills as they relate to this unit (see Employability Summaries in Qualifications Framework)

implementation of security risk treatments in a range of (3 or more) contexts (or occasions, over time)

Resources required to carry out assessment

These resources include:

legislation, policy, procedures and protocols relating to the implementation of security risk treatments

organisational standards and documentation

case studies and workplace scenarios to capture the range of situations likely to be encountered when implementing security risk treatments

Where and how to assess evidence

Valid assessment of this unit requires:

a workplace environment or one that closely resembles normal work practice and replicates the range of conditions likely to be encountered when implementing security risk treatments, including coping with difficulties, irregularities and breakdowns in routine

implementation of security risk treatments in a range of (3 or more) contexts (or occasions, over time)

Assessment methods should reflect workplace demands, such as literacy, and the needs of particular groups, such as:

people with disabilities

people from culturally and linguistically diverse backgrounds

Aboriginal and Torres Strait Islander people

women

young people

older people

people in rural and remote locations

Assessment methods suitable for valid and reliable assessment of this competency may include, but are not limited to, a combination of 2 or more of:

case studies

portfolios

questioning

scenarios

authenticated evidence from the workplace and/or training courses, such as a risk management plan

For consistency of assessment

Evidence must be gathered over time in a range of contexts to ensure the person can achieve the unit outcome and apply the competency in different situations or environments

Required Skills and Knowledge

This section describes the essential skills and knowledge and their level, required for this unit.

Skill requirements

Look for evidence that confirms skills in:

applying legislation, regulations and policies relating to government security management

reading and analysing the organisation's security plan

observing and critically analysing the application of security risk treatments in an operational environment

engaging in communication with diverse stakeholders involving listening, questioning, paraphrasing, clarifying, summarising

responding to diversity, including gender and disability

writing reports requiring formality of language and structure

using computer technology to gather and analyse information, and prepare reports

representing mathematical information in a range of formats to suit the information and the purpose

applying procedures relating to occupational health and safety and environment in the context of government security management

Knowledge requirements

Look for evidence that confirms knowledge and understanding of:

legislation, regulations, policies, procedures and guidelines relating to government security management such as:

occupational health and safety

public service acts

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control policy

protective security policy

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

risk analysis terminology and techniques

the organisation's security plan

the organisation's assets and security environment

Australian standards, quality assurance and certification requirements

AS/NZS ISO 31000:2009 Risk Management - Principles and Guidelines

public sector legislation such as equal employment opportunity, and equity and diversity principles applied in the context of government security management

Range Statement

The Range Statement provides information about the context in which the unit of competency is carried out. The variables cater for differences between States and Territories and the Commonwealth, and between organisations and workplaces. They allow for different work requirements, work practices and knowledge. The Range Statement also provides a focus for assessment. It relates to the unit as a whole. Text in bold italics in the Performance Criteria is explained here.

Risk may be to:

personnel

information

property

reputation

Acceptable risks are:

those which an organisation has determined have the least potential for harm

Unacceptable risks are:

those which an organisation has determined have the most potential for harm

Sources of security risk may include:

technical

actual events

political circumstances

human behaviour

environmental

conflict

terrorism

internal

external

local

national

international

Level of risk may be:

severe

high

major

significant

moderate

low

trivial

Treatment options may include:

addition of security measures

reduction of security measures

avoiding the risk through change of practice

acceptance of residual risk

minimisation of harm through response mechanisms

accepting the risk

Likelihood of risk may be determined through analysis of:

current controls to deter, detect or prevent harm

effectiveness of current controls

level of exposure

threat assessment

determination of threat source/s

competence (capability and intent) of threat source/s

Consequences may include:

what constitutes harm

degree of harm

who would be affected and how

how much disruption would occur

levels that are:

extreme

very high

medium

low

negligible

Continuity plans:

may lessen the adverse consequences of risk

provide a set of planned procedures that enable organisations to continue or recover services to the government and the public with minimal disruption over a given period, irrespective of the source of the disruption

Treatment plans may include:

responsibilities

schedules

expected outcomes

budget information

performance measures

monitoring process

Countermeasures may include:

revision of agency security plan

upgrade of existing security

installation of new security measures

technical controls

training

personnel-oriented

information-oriented

property-oriented

reputation-oriented

Legal requirements, government and organisational policy may include:

Commonwealth and State/Territory legislation including equal employment opportunity, occupational health and safety, privacy and anti-discrimination law

access and equity

ethics and accountability

national and international codes of practice and standards

the organisation's policies and practices

government policy

codes of conduct/codes of ethics

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

AS/NZS ISO 31000:2009 Risk management - Principles and Guidelines

Strategies may include:

audits

incident reporting mechanisms

technical controls

systems

rosters

access controls

training

Monitoring may include:

regular checking

critical observation

regular recording

information, such as threat assessments, from senior management

reports from business units on current security measures

identification of changes over time such as:

notification of major changes to business or corporate goals or plans

notification of key projects

Stakeholders may include:

supervisors

managers

other areas within the organisation

other organisations

government

third parties