Skill description
Defining and operating a framework of security controls and security management strategies.
Guidance notes
Activities may include, but are not limited to:
- selecting and adapting security frameworks to protect confidentiality, integrity, and availability of systems.
- implementing security controls, including physical, procedural, technical, and compliance measures.
- ensuring accountability and adherence to relevant laws and standards.
- embedding secure by design principles throughout the system's lifecycle, ensuring security is integrated from the earliest design stages, through development, deployment, and into operations.
- identifying and mitigating risks in infrastructure and applications.
Security controls include, but are not limited to:
- physical controls - protecting tangible assets and physical environments.
- procedural or administrative controls - policies and guidelines governing organisational security practices.
- technical or logical controls - hardware and software measures that protect information systems.
- legal, regulatory or compliance controls - measures ensuring laws, regulations and industry standards.
These activities are typically performed in collaboration with specialists in other areas including, but not limited to: legal, technical infrastructure, audit, architecture and software engineering.
Level 2Assist
Assists with implementing and monitoring security policies and protocols across different systems.
Contributes to identifying and addressing potential risks in security governance and compliance.
Supports the analysis of documented security incidents, escalating where appropriate.
Assists in the review of access controls and permissions, ensuring adherence to security policies.
Level 3Apply
Applies and maintains specific security controls as required by organisational policy and local risk assessments.
Communicates security risks and issues to business managers and others.
Performs basic risk assessments for small information systems.
Contributes to the identification of risks that arise from potential technical solution architectures.
Suggests alternate solutions or countermeasures to mitigate risks.
Defines secure systems configurations in compliance with intended architectures.
Supports investigation of suspected attacks and security breaches.
Level 4Enable
Provides guidance on the application and operation of elementary physical, procedural and technical security controls.
Explains the purpose of security controls and performs security risk and business impact analysis for medium complexity information systems.
Identifies risks that arise from potential technical solution architectures.
Designs alternate solutions or countermeasures and ensures they manage identified risks.
Investigates suspected attacks and supports security incident management.
Level 5Ensure, advise
Provides advice and guidance on security strategies to manage identified risks and ensure adoption and adherence to standards.
Contributes to development of information security policy, standards and guidelines.
Obtains and acts on vulnerability information and conducts security risk assessments, business impact analysis and accreditation on complex information systems.
Investigates major breaches of security and recommends appropriate control improvements.
Develops new architectures that manage the risks posed by new technologies and business practices.
Level 6Initiate, influence
Develops and communicates corporate information security policy, standards and guidelines.
Ensures architectural principles are applied during design to reduce risk.
Drives adoption and adherence to policy, standards and guidelines.
Contributes to the development of organisational strategies that address information control requirements.
Identifies and monitors environmental and market trends and proactively assesses impact on business strategies, benefits and risks.
Leads the provision of authoritative advice and guidance on the requirements for security controls in collaboration with subject matter experts.
Level 7Set strategy, inspire, mobilise
Directs the development, implementation, delivery and support of an enterprise information security strategy aligned with the business strategy.
Ensures compliance between business strategies and information security.
Leads the provision of information security expertise, guidance and systems needed to execute strategic and operational plans.
Secures organisational resources to execute the information security strategy.
No notes added yet.
Comments
0 comments
Please sign in to leave a comment.