ICANWK616A Manage security, privacy and compliance of cloud service deployment



Similar documents
Release 1. ICAICT814A Develop cloud computing strategies for a business

Release: 1. ICAICT604A Identify and implement business innovation

Release: 1. ICADBS603A Determine suitability of database functionality and scalability

ICASAS505A Review and update disaster recovery and contingency plans

Release: 1. ICADBS502A Design a database

Release: 1. ICASAS407A Conduct pre-installation audit for software installation

ICAWEB405A Monitor traffic and compile website traffic reports

BSBSMB412A Introduce cloud computing into business operations

Release: 1. ICAPRG502A Manage a project using software management tools

ICADBS402A Complete database backup and restore

ICASAS420A Provide first-level remote help-desk support

Release: 1. ICAPMG601A Establish IT project governance

ICAICT704A Direct ICT in a supply chain

Release: 1. ICAPRG426A Prepare software development review

Release: 1. ICADBS601A Build a data warehouse

Release: 1. ICADBS412A Build a database

How To Write An Icaict423A Cloud Storage Strategy

ICANWK402A Install and configure virtual machines for sustainable ICT

FNSRSK601A Develop and implement risk mitigation plan

Release: 1. ICAWEB414A Design simple web page layouts

ICANWK406A Install, configure and test network security

Release: 1. ICANWK502A Implement secure encryption technologies

ICAWEB201A Use social media tools for collaboration and engagement

Release: 1. BSBPMG503A Manage project time

ICADBS504A Integrate database with a website

ICAPRG529A Apply testing techniques for software development

SIRXSLS008A Develop a sales strategy

PSPCRT409B Administer court fines and debt management

BSBINM501A Manage an information or knowledge management system

Revision Number: 1. BSBADM307B Organise schedules

BSBLEG515A Apply legal principles in wills and probate matters

Release 1. ICAPRG604A Create cloud computing services

BSBGOV403A Analyse financial reports and budgets

FNSIBK404A Provide a claims service to an insurance broking client

ICTTEN5204A Produce technical solutions from business specifications

Release: 1. FNSILF302A Process a life insurance application

BSBCCO501B Develop business continuity strategy

Revision Number: 1. FNSMCA301A Collect debts

How To Manage A Store Security Unit

Release: 1. ICAB5230B Maintain custom software

ICAWEB502A Create dynamic web pages

Release 1. BSBPMG415A Apply project risk-management techniques

BSBMKG506B Plan market research

Release: 1. CPPDSM5032A Market the agency

Release: 1. BSBPMG509A Manage project procurement

ICTTEN4051A Install configuration programs on PC based customer equipment

SIRXCCS408 Build retail relationships and sustain customer loyalty

ICANWK610A Design and build integrated VoIP networks

FNSIBK605A Manage insurance brokerage service performance

Release: 1. ICASAS206A Detect and protect from spam and destructive software

BSBMKG610A Develop, implement and monitor a marketing campaign

ICAB5238B Build a highly secure firewall

PSPPROC506A Plan to manage a contract

How To Write A Life Insurance Claim

BSBCUS501C Manage quality customer service

ICTTEN2209A Build and maintain a secure network

Release 1. BSBPMG412A Apply project cost-management techniques

Release: 1. CPPSEC4015A Maintain networked security system

Release: 1. BSBPMG510A Manage projects

How To Manage A Network Safely

Release: 1. ICANWK607A Design and implement wireless network security

ICANWK504A Design and implement an integrated server solution

ICTSUS4183A Install and test renewable energy system for ICT networks

ICANWK414A Create a common gateway interface script

ICANWK613A Develop plans to manage structured troubleshooting process of enterprise networks

FNSRTS309A Maintain main bank account

ICASAS301A Run standard diagnostic tests

FNSACC611A Implement an insolvency program

Revision Number: 1. SIRXSLS006A Lead a sales team

BSBHRM502A Manage human resources management information systems

PSPWPR401A Process incoming workplace relations enquiries

SITXHRM006A Monitor staff performance

Release 1. BSBPMG410A Apply project time-management techniques

Release: 1. ICTPMG4152A Manage the delivery of network infrastructure

Release: 1. CPPDSM4080A Work in the real estate industry

Revision Number: 1. BSBFIA302A Process payroll

Revision Number: 1. FNSFMB402A Provide finance and mortgage broking services

Release: 1. BSBFIM501A Manage budgets and financial plans

BSBMGT515A Manage operational plan

Revision Number: 1. BSBADV603B Manage advertising production

ICANWK501A Plan, implement and test enterprise communication solutions

ICANWK401A Install and manage a server

Transcription:

ICANWK616A Manage security, privacy and compliance of cloud service deployment Release 1

ICANWK616A Manage security, privacy and compliance of cloud service deployment Modification History Release Release 1 Comments This version first released with ICA11 Information and Communications Technology Version 2. Unit Descriptor This unit describes the performance outcomes, skills and knowledge required to manage cloud security controls, and privacy and legal compliance when implementing cloud services for an enterprise. Application of the Unit This unit applies to those with managerial responsibility, such as experienced security technical specialists, security analysts and security consultants. Licensing/Regulatory Information No licensing, legislative, regulatory or certification requirements apply to this unit at the time of endorsement but users should confirm requirements with the relevant federal, state or territory authority. Pre-Requisites Not applicable. Employability Skills Information This unit contains employability skills. Approved Page 2 of 9

Elements and Performance Criteria Pre-Content ELEMENTS Elements describe the essential outcomes of a unit of competency. PERFORMANCE CRITERIA Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the required skills and knowledge section and the range statement. Assessment of performance is to be consistent with the evidence guide. Elements and Performance Criteria 1. Manage enterprise cloud security controls 2. Manage enterprise cloud privacy and compliance 3. Review, implement and document cloud security, privacy and compliance enhancements 1.1. Identify cloud security issues faced by different delivery and deployment models relevant to enterprise 1.2. Determine specific enterprise areas of security responsibility 1.3. Implement most relevant security controls and measures to protect identified areas of responsibility 2.1. Identify relevant compliance regulations relating to data storage 2.2. Determine most relevant business continuity and data recovery plans 2.3. Identify, secure and maintain relevant logs and audit trails 2.4. Investigate and review legal, privacy and contractual issues to ensure they meet enterprise policy 3.1. Implement appropriate changes and integrate into current enterprise s continuity of operation program (COOP) 3.2. Establish a performance measurement program to evaluate security effectiveness of implemented security controls 3.3. Provide relevant documentation as part of COOP for audit tracking purposes Approved Page 3 of 9

Required Skills and Knowledge This section describes the skills and knowledge required for this unit. Required skills analytical skills to analyse security breaches communication skills to: communicate with peers and supervisors in relevant cloud computing technological areas seek assistance and expert advice from relevant people in cloud computing industry area literacy skills to interpret technical documentation, equipment manuals and specifications research skills to locate appropriate sources of information regarding cloud computing solutions technical skills to: identify features of cloud computing solutions test and evaluate cloud computing solutions Required knowledge business and commercial issues relating to the management of cloud security issues legislation, organisational and jurisdictional policy and procedures that may impact on management areas: cloud-related privacy issues codes of ethics and conduct equal employment opportunity, equity and diversity principles financial management requirements governance requirements work health and safety (WHS) and environmental requirements quality standards management specifications and objectives management tools and techniques suited to a range of complex projects activities organisational and political context systems development life cycle (SDLC) techniques for critical analysis in a management context Evidence Guide The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package. Approved Page 4 of 9

Overview of assessment Critical aspects for assessment and evidence required to demonstrate competency in this unit Context of and specific resources for assessment Evidence of the ability to: identify, manage and implement cloud security controls according to legal and privacy requirements integrate cloud security plans into the enterprise s existing security plans develop an ongoing performance measurement and evaluation review process. Assessment must ensure access to: cloud information and communications technology (ICT) business specifications cloud ICT security assurance specifications management-related scenarios a cloud focused security environment, including the threats to security that are, or are held to be, present in the environment information on the security environment, including: laws or legislation existing enterprise security policies enterprise expertise risk analysis tools and methodologies currently used in industry appropriate learning and assessment support when required modified equipment for people with special needs. Method of assessment A range of assessment methods should be used to assess practical skills and knowledge. The following examples are appropriate for this unit: Guidance information for assessment direct observation of candidate managing cloud-related networks and telecommunications security direct observation of candidate managing cloud ICT security incidents verbal or written questioning to assess candidate s knowledge of enterprise policies and procedures that impact on cloud ICT security review of documentation prepared by candidate, including programs to manage compliance, privacy and risk. Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, where appropriate. Assessment processes and techniques must be culturally appropriate, and suitable to the communication skill level, Approved Page 5 of 9

language, literacy and numeracy capacity of the candidate and the work being performed. Indigenous people and other people from a non-english speaking background may need additional support. In cases where practical assessment is used it should be combined with targeted questioning to assess required knowledge. Approved Page 6 of 9

Range Statement The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. Security issues may Delivery models may Deployment models may Security responsibility may Security controls and measures may Compliance regulations may applications security data security enterprise continuity infrastructure security platform security virtualisation security. infrastructure as a service (IaaS) platform as a service (PaaS) software as a service (SaaS). community cloud hybrid cloud private cloud public cloud. clients: applications (if not part of licence) client employee access data (if not part of licence) physical client site security enterprise (depending on licensing agreement): application data identity management systems infrastructure physical enterprise site security platform. security management, including: corrective controls detective controls deterrent controls preventative controls. international regulations internet or web regulations local regulations Approved Page 7 of 9

Business continuity may Data recovery may Legal, privacy and contractual issues may Continuity of operations program may Documentation may regional regulations. undertaking analysis of: business impact analysis threat and risk analysis impact scenarios solution design developing solution implementation strategies testing and enterprise acceptance implementing suitable maintenance options. logical damage recovery: corrupt partitions overwritten data physical damage recovery virus infections. critical data masked digital identities protected end-of-service: return of data and applications intellectual property: ownership of data liability of data loss unauthorised on-selling of information. COOP plan execution COOP plan revision and updating COOP program implementation identification of functional requirements: mission impact analysis mitigation strategies and plan plan design and development project initiation risk assessment training, testing and drills. applicable network-based documents audits and management reviews communications protocols contingency plans and activities evaluation reports incident management program, processes and procedures management reports network security and telecommunications program performance measurement program reviews and improvements records Approved Page 8 of 9

security classification and data management policies security incident records. Unit Sector(s) Networking Approved Page 9 of 9