605 - Word doc - The Tech Partnership

advertisement
Contribute to operational security management activities
TECHIS60531
This standard covers the competencies required to contribute to secure operations management activities
under supervision. This includes:
- reacting to new threats and vulnerabilities,
- implementing processes for maintaining the security of information throughout its lifespan,
- applying security operating procedures in accordance with security policies and standards.
Performance Criteria
1. assist in identifying and assessing new vulnerabilities and potential security violations to
information assets
2. take appropriate and timely action to report incidents in line with organisational procedures
3. operate with integrity and confidentiality during information assurance activities
4. identify when and how to seek advice and guidance from other individuals during information
assurance activities
5. carry out operational security management activities in line with organisational requirements
Knowledge and Understanding
1. the processes, procedures, methods, tools and techniques relating to identifying information
systems vulnerabilities
2. where to source the policies and standards that are relevant to information systems operations
security activities
3. the range of examples of information security issues that information security operations
management seeks to protect against
4. how to interpret organisational information security policies and standards that apply to
information systems operations and apply them
5. what is meant by information assurance and information security operations management
6. what are the roles and responsibilities of the information assurance and security functions within
the organisation and the impact of off-shoring on those
7. the importance of the need to report and respond to security incidents rapidly and effectively
following organisational policies and standards
8. the need to implement basic technical vulnerability assessments and corrections
9. what is meant by the following core principles of information security: confidentiality; integrity;
availability; authorisation; authentication; non repudiation
10. what is meant by a vulnerability the need for information systems activities to be carried out in
accordance with organisational information security standards
Carry out operational security management activities
TECHIS60541
This standard covers the competencies required to implement secure operations management activities
under supervision. This includes reacting to new threats and vulnerabilities.
Establish processes for maintaining the security of information throughout its lifespan. Develop,
implement and maintains security operating procedures in accordance with security policies and
standards.
Performance Criteria
1. correctly identify and document the information assets that need to be to protected in line with
organisational standards
2. verify that applicable security patches and upgrades are implemented according to the
organisation's policy and standards
3. diagnose and resolve information security problems in response to reported incidents
4. install and operate information systems in accordance with organisational information security
policies and standards
5. monitor and evaluate the effectiveness of the organisation's information security procedures and
safeguards for information systems
6. effectively communication security issues and advice to managers and others
7. establish processes and operating procedures for maintaining the security of information
throughout its existence in accordance with security policies, standards and procedures
8. assess and respond to new technical, physical, personnel or procedural vulnerabilities
Knowledge and Understanding
1. where to source security records and documentation
2. how to identify and apply processes, procedures, methods, tools and techniques relating to
security operations management
3. who the administrator level and technical staff are to maintain secure access and to resolve
information security problems
4. the specific security procedures required for implementing security controls as required by
organisational policy and standards
5. the need to monitor and test that information security standards are correctly applied
6. the potential implications of the deliverables from information security operations management
activities being incorrect, inadequate and/or inappropriate
7. why the ongoing quality and effectiveness of information security operations management
activities need to be managed and monitored
8. the importance of considering both physical and non-physical controls that need to be applied in
order to secure information assets the need to maintain security records and documentation
Manage operational security management activities
TECHIS60551
This standard covers the competencies required to manage all aspects of secure operations and service delivery.
Establish processes for maintaining the security of information throughout its lifespan. Develop, implement and
maintains security operating procedures in accordance with security policies and standards. Manage the
implementation of information security operations, and co-ordinate information security operations activities across
the organisation.
Performance Criteria
1. manage the implementation of information security programmes, and co-ordinate security
activities across the organisation in line with organisational requirements
2. manage all aspects of a security programme, including reacting to new threats and vulnerabilities,
secure operational and service delivery consistent with security policies, standards and procedures
3. ensure that operations and service delivery activities align together and with appropriate
organisational strategy, policy and standards relating to the security of information assets
4. analyse instances of non-compliance to procedures and take appropriate administrative or
technological action to correct and minimise security risks
5. lead development of operations procedures used across multiple information systems in line with
organisational procedures
6. ensure consistency across security operations in order to deliver cost-effective security implement
and maintain the standards and procedures for managing secure operations and service delivery
across the full range information systems
7. routinely monitor operational security provision, taking action to address potential vulnerabilities
8. develop and implement the necessary information security operations management plans and
procedural documentation to ensure that information security incidents are avoided during
ongoing operations and shutdown/closure of information systems
9. design, implement and monitor the user access rights management framework for the full range of
information systems
10. manage the review cycle for security operations, taking into account information from incidents,
vulnerability assessments, penetration tests, threat assessments and changes to relevant
legislation and regulations
11. raise awareness of security operations across the organization
12. routinely evaluate compliance to legal, regulatory, contractual and organisational requirements for
the security of information assets, report the results to sponsors, stakeholders and other
internal/external individuals and bodies provide advice regarding security operations management
activities
Knowledge and Understanding
1. how to write and maintain procedures required to ensure security of the organisation's
information infrastructure
2. the specific requirements for the protection and security of customer/business information assets
3. the results from any security incidents, vulnerability assessments, penetration tests, threat
assessments and the actions taken to mitigate, relevant to inform future information system
operations management
4. how to ensure alignment of information system security operating processes and procedures to
ensure that they provide cost effective security provision
5. how to influence sponsors and stakeholders to resource security operation management activities
to ensure ongoing compliance with security requirements
6. the importance of ensuring that operational environments apply and maintain appropriate levels of
security in line with standards and procedures
7. the fact that information security requirements may form part of specific service level and
operational level agreements for information systems
8. the detailed content and relevance of organisational policies and standards for security operations
management
9. the importance of reviewing and updating operating procedures for information security
operations management
10. the need to maintain up to date security records and documentation
11. the need to manage the review cycle for information system
Contribute to vulnerability assessments
TECHIS60532
This standard covers the competencies required to assist conducting vulnerability assessments under supervision. This
includes following processes for planning and undertaking vulnerability assessments under supervision.
Performance Criteria
1. source, gather and collate information and data about the vulnerabilities in specified information
systems and assets
2. review information on emerging vulnerabilities and determine their importance
3. identify when and how to seek advice and guidance from other individuals during vulnerability
assessment activities
4. carry out vulnerability assessment activities in line with organisational requirements
5. monitor data from protective monitoring systems to identify potential exploitation of
vulnerabilities
6. communicate relevant stakeholders on the need to respond to new vulnerabilities
7. identify information systems that are vulnerable to attack
8. recommend mitigating actions for new vulnerabilities
9. assist in documenting the outcomes of vulnerability assessments
Knowledge and Understanding
1. the range of information assets on which vulnerability assessments need to be conducted
2. the range of vulnerabilities that may compromise an organisation's infrastructure and information
assets
3. the processes, procedures, methods, tools and techniques relating to vulnerability assessment
activities and their deliverables
4. the range of scanning and testing activities that can be used to identify vulnerabilities in an
organisation's information systems and assets
5. the purpose of vulnerability assessments in maintaining information security
6. the role of vulnerability assessment activities in information security provision
7. how to source current vulnerability information
8. the processes and procedures that need to be followed when undertaking vulnerability
assessments
Carry out vulnerability assessments
TECHIS60542
This standard covers the competencies required to conduct vulnerability assessments under supervision.
This includes following processes for planning and undertaking vulnerability assessments under
supervision.
Performance Criteria
1. select and apply the most appropriate methods and tools to be used for vulnerability assessments
in line with organisational standards
2. clearly and accurately identify specific vulnerabilities within target information systems
3. critically review the results of vulnerability assessments, identifying priorities for action where
appropriate
4. assess vulnerability intelligence in order to determine the potential impact to the organisation's
information systems infrastructure
5. ensure the preservation of information integrity where vulnerabilities have been identified
6. communicate vulnerability assessment outputs informing appropriate stakeholders of the impact
and potential resolutions
7. prioritise and recommend improvements to the organisation's information systems infrastructure
and assets to reduce the risks associated with identified vulnerabilities
8. ensure that agreed improvements to the organisation's information systems infrastructure and
assets are implemented in a timely manner
Knowledge and Understanding
1. the range of information assets on which vulnerability assessments need to be conducted
2. the range of vulnerabilities that may compromise an organisation's infrastructure and information
assets
3. the range of scanning activities that can be used to identify vulnerabilities in an organisation's
information systems
4. how to monitor and assess information and data in external vulnerability reports to ensure
relevance to the organisation, ensuring that relevant vulnerabilities are identified and rectified
5. how to distribute warning material to relevant operations functions relating to security
vulnerabilities in a timely manner and suitable for the target audience
6. how to present and communicate vulnerability detection and mediation activities to sponsors and
stakeholders
7. how to design, develop, implement and report on metrics for monitoring the level and significance
of information system vulnerabilities
8. how to identify the potential business impacts if vulnerabilities are exploited
9. the relationship between vulnerability assessments, security audits/reviews and risk management
activities
10. the fact that new threats and vulnerabilities may emerge at any time
11. the importance of prioritising vulnerabilities and recommend specific and timely action to address
identified vulnerabilities
12. the importance of proactively identifying vulnerabilities within the organisation's information
systems
13. the role of vulnerability assessment activities in informing and directing countermeasures to
maintain and reinforce information security provision
14. the importance of ensuring that processes and procedures are implemented and followed to
restrict the knowledge of new vulnerabilities externally until appropriate remediation or mitigation
is available
Manage vulnerability assessments
TECHIS60552
This standard covers the competencies required to manage vulnerability assessment activities. This includes managing
resources, activities, deliverables and defining and implementing organisational policies, standards and processes.
Performance Criteria
1. be accountable for undertaking accurate security vulnerability assessments on information systems
2. develop, implement and maintain plans, processes, procedures, methods, tools and techniques for
vulnerability assessment activities and their deliverables
3. clearly and accurately define the scope of vulnerability assessment activities, adjusting the process
to suit specific contexts
4. select and apply the most appropriate methods and tools to be used during vulnerability
assessments
5. set the resourcing and training plan for vulnerability assessment activities
6. identify, source and secure the most appropriate resources to conduct specialised vulnerability
assessment activities
7. be responsible for designing, implementing and reporting metrics for monitoring information
system vulnerabilities effectiveness
8. critically review the results of vulnerability assessments, identifying priorities for action where
appropriate
9. verify and validate new potential vulnerabilities that may impact on the organisation's information
assets
10. monitor the quality and effectiveness of vulnerability assessment activities, critically reviewing the
vulnerability assessment process and making recommendations for improvement where
appropriate
11. advise and guide others on all aspects of vulnerability assessment activities and their deliverables
12. effectively communicate vulnerability assessment status and results to a wide range of sponsors,
stakeholders and other individuals
Knowledge and Understanding
1. need to ensure that the most appropriate resources from within the organisation conduct
vulnerability assessment activities
2. how to examine information system vulnerabilities and determine actions to mitigate them
3. how to develop and implement effective vulnerability countermeasures
4. the need to ensure that vulnerability evaluations are performed on an ongoing basis
5. information on latest identified threats, vulnerabilities and exposures
6. the organisational, external standards, best practice frameworks and codes of conduct that
vulnerability assessment should comply with
7. how to analyse and assess internal problem reports for signs of vulnerabilities
8. how to engage proactively with stakeholders to ensure that mitigation for vulnerabilities are
understood and processes in a timely manner
9. how to ensure that processes and procedures are implemented and followed to restrict the
knowledge of new vulnerabilities until appropriate remediation or mitigation is available
10. how to maintain lists of authorised or banned applications or devices for use on protective
monitoring systems
11. the range of methods for performing vulnerability assessments and the outputs they produce
12. the need to critically review the results of vulnerability assessments, identifying priorities for action
where appropriate
13. how to analyse information security vulnerability bulletins for their potential impact on information
systems and undertake or recommends appropriate action
14. the importance of monitoring the quality and effectiveness of vulnerability assessment activities
15. how to identify and implement improvements to the vulnerability assessment processes and
procedures
Contribute to identity and access management activities
TECHIS60533
Identity and access management (IAM) deals with how users within an organisation are given an identity
and how it is protected. It also included protecting critical applications, data and systems from
unauthorised access, and managing access rights of people both inside and outside the organisation. This
is especially important in the light of recent trends towards bring-your-own-device, cloud computing,
mobile apps and an increasingly mobile workforce. Identity and access management involves protecting
our data assets and implementing processes and procurement standards to run organisations more
intelligently.
This standard involves the competencies associated with contributing to effective operation of identity
and access management systems, and managing access to different sets of information and systems across
an organisation. As employees migrate through different roles and require different access rights within
and across organisation, and it becomes more difficult to manage identity and access.
Performance Criteria
1. use identity and access management tools and methods in line with organisational standards
2. configure and implement custom extensions to identity and access management tools to meet
organisational requirements
3. implement account provisioning processes to ensure that the creation of user accounts and access
to software and data is in line with organisational policies and standards
4. assist with the identification and resolution of identity and access issues in line with
organisational requirements
5. assist with identity and access management integration across systems and applications to meet
business requirements
6. implement upgrades and manage patch status for the identity and access management
infrastructure in line with organisational standards
Knowledge and Understanding
1. what is meant by identity and access management and how to implement it
2. that an identity access management (IAM) system can be used to initiate, capture, record and
manage user identities and their related access permissions in an automated fashion
3. the main features of an identity and access management system that facilitates the management
of electronic identities and access privileges
4. that XACML (eXtensible Access Control Markup Language) is an open standard designed to express
security policies and access rights to information for Web services, digital rights management
(DRM), and enterprise security applications
5. that there are a range of supporting technologies and protocols relevant to identity and access
management including Linux administration, Hypertext Transfer Protocol (HTTP), XML, LDAP, and
SQL
6. that identity management relates to user account provisioning and workflow processes
7. that access management concerns authentication and entitlement to access different systems and
data across an organisation
8. that data security and privacy concerns database access to specific datasets
9. that access privileges are granted according to a consistent interpretation of policy and all
individuals and services are properly authenticated, authorized and audited
10. what the underlying database structure that is used in information systems access privileges is in
order to successfully manage identities and access.
11. how to implement multiple authentication techniques
Carry out identity and access management activities
TECHIS60543
Identity and access management (IAM) deals with how users within an organisation are given an identity
and how it is protected. It also included protecting critical applications, data and systems from
unauthorised access, and managing access rights of people both inside and outside the organisation. This
is especially important in the light of recent trends towards bring-your-own-device, cloud computing,
mobile apps and an increasingly mobile workforce. Identity and access management involves protecting
our data assets and implementing processes and procurement standards to run organisations more
intelligently.
This standard involves the competencies associated with effective implementation, operation and
management of identity and access management systems. This includes ensuring that company data is not
at risk from being compromised by those who do not have authority to access it within an enterprise
environment that may have diverse requirements for associated data access privileges. It also includes
revoking access privileges when they change or are no longer required.
Performance Criteria
1. define the user roles and access controls necessary to meet organisational requirements
2. determine how to make best use of available identity and access management infrastructure tools
for overall information resilience
3. implement identity and access management policies and standards in line with organisational
requirements
4. provide guidance to others on the identity and access management architecture in line with
organisational needs
5. review the identity and access management infrastructure for alignment with changing business
needs
6. monitor the operation of access controls for compliance with internal and external standards and
regulations
7. prioritise and recommend improvements to the identity and access management infrastructure
8. produce deployment models and architectures for applications to be managed
9. evaluate the impact of future requirements on the identity and access management infrastructure
Knowledge and Understanding
1. the importance of designing and maintaining user roles that are closely correlated with the security
status of data and applications accessed through information systems across the organisation
2. what the organisational security architecture is and how to apply this
3. how to customise the identity and access management system to align to business processes and
the security architecture
4. how to analyse and modify the underlying database structure that is used in information systems
access privileges
5. what the organisational structure and management processes for identities of employees,
contractors, customers and other constituents is
6. the range of tools and techniques that are used for identity and access management and how to
apply them
7. the organisational polices and standards that are used for identity and access management and
how to apply them
8. the need to ensure that identity and access management operations align to changing business
needs
9. the need to modify access controls in line with employees changing responsibilities, including
removal of access when no longer required
10. the importance of monitoring access controls in relation to regulatory compliance for sensitive data
11. how to identify possible future requirements for the identity and access management
infrastructure
Manage identity and access management activities
TECHIS60553
Identity and access management (IAM) deals with how users within an organisation are given an identity
and how it is protected. It also included protecting critical applications, data and systems from
unauthorised access, and managing access rights of people both inside and outside the organisation. This
is especially important in the light of recent trends towards bring-your-own-device, cloud computing,
mobile apps and an increasingly mobile workforce. Identity and access management involves protecting
our data assets and implementing processes and procurement standards to run organisations more
intelligently.
This standard involves the competencies associated with managing identity and access management
activities. This includes setting policies and standards and ensuring that identity and access management
processes are dynamic and respond to changing security status of data and information systems and also
ensure that intruders cannot gain access to systems or to user accounts, especially those with excessive
privileges to prevent data loss or theft.
Performance Criteria
1. implement information security policies, controls and standards for identity and access
management in line with organisational requirements
2. develop the identity and access management aspects of security architectures to support large user
communities with complex information authorisation rules and requirements
3. identify and review all compliance mandates (including privacy regulations) to which the
organisation is subject in a timely manner
4. regularly review organisational compliance with internal and external standards and regulations
5. evaluate and recommend new identity and access management security technologies, processes
and methodologies in line with business needs
6. ensure that all relevant staff are trained in the implementation and operation of identity and
access security systems in line with organisational standards
7. monitor adherence to identity and access management controls in line with organisational
standards
Knowledge and Understanding
1. how to define the identity and access management architecture
2. the importance of aligning identity and access management initiatives to business processes
3. the need to monitor identity and access management controls and ensure regulatory compliance
to required standards
4. how to apply performance metrics to identity and access management activities and their
deliverables
5. how to select and acquire technologies and vendors/service providers for identity and access
management
6. what the organisations current identity and access management capabilities are
7. how to identify technology and service gaps needing functional improvement
8. the need to keep up to date on the shifting compliance landscape
9. the importance of gaining management agreement on the vision and mandate behind the strategy
and policies for identity and access management
10. the need to establish appropriate resources, budget and governance systems for identity and
access management
Download