^

 
 

Unit of competency details

ICTNWK538 - Install and maintain valid authentication processes (Release 1)

Summary

Usage recommendation:
Current
Mapping:
MappingNotesDate
Supersedes and is equivalent to ICTNWK503 - Install and maintain valid authentication processes 20/Jul/2020

Release Status:
Current
Releases:
ReleaseRelease date
1 1 (this release) 21/Jul/2020


Classifications

SchemeCodeClassification value
ASCED Module/Unit of Competency Field of Education Identifier 029901 Security Science  

Classification history

SchemeCodeClassification valueStart dateEnd date
ASCED Module/Unit of Competency Field of Education Identifier 029901 Security Science  21/Jul/2020 
The content being displayed has been produced by a third party, while all attempts have been made to make this content as accessible as possible it cannot be guaranteed. If you are encountering issues following the content on this page please consider downloading the content in its original form

Unit of competency

Modification History

Release 

Comments 

Release 1

This version first released with ICT Information and Communications Technology Training Package Version 6.0.

Application

This unit describes the skills and knowledge required to design, develop, install and maintain authentication processes and reduce vulnerability of a system.

It applies to individuals working in middle management roles including information security managers, network engineers, security analysts, or similar roles who are responsible for implementing and monitoring an organisational security management system.

No licensing, legislative or certification requirements apply to this unit at the time of publication.

Unit Sector

Networking

Elements and Performance Criteria

ELEMENT 

PERFORMANCE CRITERIA 

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Evaluate authentication requirements

1.1 Determine user and organisational security requirements according to organisational security plan

1.2 Identify and analyse authentication options according to user and organisational requirements

1.3 Determine required authentication and authorisation processes according to organisational policies and procedures

2. Configure authentication system

2.1 Create required authentication realm and reuse according to authentication system and organisational requirements

2.2 Add required users and authorisation rules to new realm according to authentication system requirements

2.3 Determine user attributes and user attribute set-up according to authentication system requirements

2.4 Set up authentication filter and authorisation parameters according to authentication system requirements

3. Apply authentication methods

3.1 Develop and document authentication systems and protocols according to authentication system requirements

3.2 Develop, document and distribute user authentication system responsibilities to required personnel

3.3 Apply authentication system to network and user according to system product and authentication system requirements

3.4 Record and securely store permission and configuration information according to authentication system requirements

4. Monitor authentication system

4.1 Review authentication system according to user security and quality of service requirements

4.2 Determine and document security monitoring, incident management and reporting processes according to organisational security plan

4.3 Submit documentation and respond to feedback from to required personnel

4.4 Seek and respond to feedback from required personnel according to organisational policies and procedures

Foundation Skills

This section describes language, literacy, numeracy and employment skills incorporated in the performance criteria that are required for competent performance.

S KILL 

D ESCRIPTION 

Reading

  • Interprets and analyses technical data to determine requirements according to user and organisational plans

Writing

  • Prepares documentation detailing work performed according to organisational policies and procedures for a specific audience

Planning and organising

  • Uses a combination of formal, logical planning processes and an increasingly intuitive knowledge of context to plan control methods and systems processes

Problem solving

  • Demonstrates a high-level knowledge of ways in which digital systems and tools are used or could be used to achieve work goals and begins to recognise strategic and operational applications
  • Uses intuition to identify authentication failure and security incidents and their general problem area
  • Demonstrates an analytical thought processes to clarify goals and key issues and lateral thinking processes to generate possible solutions

Self-management

  • Follows explicit and implicit protocols and meets expectations associated with own role
  • Uses digital technologies and systems safely and securely when implementing and monitoring a system with a growing awareness of the permanence and transparency of all activities

Unit Mapping Information

Supersedes and is equivalent to ICTNWK503 Install and maintain valid authentication processes.

Links

Companion Volume Implementation Guide is found on VETNet - https://vetnet.gov.au/Pages/TrainingDocs.aspx?q=a53af4e4-b400-484e-b778-71c9e9d6aff2

 

Assessment requirements

Modification History

Release 

Comments 

Release 1

This version first released with ICT Information and Communications Technology Training Package Version 6.0.

Performance Evidence

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

  • design and deploy authentications solutions to a medium-sized business technology environment.

In the course of the above, the candidate must:

  • configure authentication software and tools
  • align authentication processes to organisational requirements and industry standard best practices
  • document work plans and processes.

Knowledge Evidence

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

  • problems and challenges associated with organisational authentication issues, including resource accounting through authentication
  • industry standard virtual private network (VPN) issues, including:
  • quality of service (QoS) considerations
  • bandwidth
  • dynamic security environment
  • function and operation of VPN concepts
  • authentication adaptors, including biometric authentication adaptors
  • digital certificates, including:
  • VeriSign
  • X.509
  • SSL
  • function and operation of authentication controls and protocols including:
  • passwords and personal identification numbers (PINs)
  • smart cards biometric devices
  • network authentication services including:
  • Kerberos
  • NT LAN Manager (NTLM)
  • features of common password protocols, including:
  • challenge handshake authentication protocol (CHAP)
  • challenge phrases
  • password authentication protocol (PAP)
  • remote authentication dial-in user service (RADIUS) authentication
  • principles of security tokens.

Assessment Conditions

Skills in this unit must be demonstrated in a workplace or simulated environment where the conditions are typical of those in a working environment in this industry.

  • a site or prototype where network authentication may be implemented and managed
  • network support tools currently used in industry
  • organisational security policies related to authentication
  • manufacturers recommendations
  • current authentication standards, including biometric authentication adaptors.

Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards.

Links

Companion Volume Implementation Guide is found on VETNet - https://vetnet.gov.au/Pages/TrainingDocs.aspx?q=a53af4e4-b400-484e-b778-71c9e9d6aff2