Unit of competency
Modification History
Release |
Comments |
Release 1 |
This version first released with ICT Information and Communications Technology Training Package Version 1.0. |
Application
This unit describes the skills and knowledge required to design, develop, install and maintain authentication processes to reduce the vulnerability of the system.
It applies to individuals working as middle managers such as information security managers, network engineers or security analysts, who are responsible for implementing and monitoring the organisational security management system.
No licensing, legislative or certification requirements apply to this unit at the time of publication.
Unit Sector
Networking
Elements and Performance Criteria
ELEMENT |
PERFORMANCE CRITERIA |
Elements describe the essential outcomes. |
Performance criteria describe the performance needed to demonstrate achievement of the element. |
1. Determine authentication requirements |
1.1 Determine user and enterprise security requirements with reference to enterprise security plan 1.2 Identify and analyse authentication options according to user and enterprise requirements 1.3 Select the most appropriate authentication and authorisation processes |
2. Configure authentication software or tools |
2.1 Create an authentication realm and reuse as required to protect different areas of server 2.2 Add users and authorisation rules to new realm according to business needs 2.3 Describe user attributes and user attribute set-up 2.4 Set up an authentication filter and authorisation parameters on the appropriate server according to business requirements |
3. Apply authentication methods |
3.1 Develop or obtain authentication protocols as required 3.2 Develop and distribute related methods to users according to business need 3.3 Brief user on authentication system and their responsibilities according to enterprise security plan 3.4 Apply authentication system to network and user according to system product requirements 3.5 Record and store permission and configuration information in a secure central location |
4. Monitor authentication system |
4.1 Review the authentication system according to user and enterprise security and quality of service requirements 4.2 Ensure ongoing security monitoring, using incident management and reporting processes, according to enterprise security plan 4.3 Adjust authentication system if required |
Foundation Skills
This section describes language, literacy, numeracy and employment skills incorporated in the performance criteria that are required for competent performance.
Skill |
Performance Criteria |
Description |
Reading |
1.1, 1.2, 3.3, 4.2 |
|
Writing |
2.3, 3.1, 3.2, 3.5 |
|
Oral Communication |
1.2, 3.1-3.3, 4.2 |
|
Navigate the world of work |
1.1, 3.3 |
|
Get the work done |
1.1, 1.3, 2.1, 2.2, 2.4, 3.4, 3.5, 4.1-4.3 |
|
Unit Mapping Information
Code and title current version |
Code and title previous version |
Comments |
Equivalence status |
ICTNWK503 Install and maintain valid authentication processes |
ICANWK503A Install and maintain valid authentication processes |
Updated to meet Standards for Training Packages |
Equivalent unit |
Links
Companion Volume implementation guides are found in VETNet - https://vetnet.gov.au/Pages/TrainingDocs.aspx?q=a53af4e4-b400-484e-b778-71c9e9d6aff2