The global skills and competency framework for the digital world

Information security SCTY

(new)

Defining and operating a framework of security controls and security management strategies.

SFIA 9 is in development

  • SFIA 9 beta due in early July 2024
  • SFIA 9 planned for publication October 2024

This is a prototype for SFIA 9. It is subject to change before publication.

Moving to SFIA 9

  • New level 2 added to support entry-level roles
  • SFIA 8 skill descriptions will remain available for you to use
  • Previous SFIA assessments are not impacted by this change

Guidance notes

(modified)

The purpose of security controls and management strategies is to:

  • maintain the security, confidentiality, integrity, availability, accountability of information systems
  • ensure information systems comply with legislation, regulation and relevant standards.

Activities may include, but are not limited to:

  • selecting, adopting and adapting security control frameworks
  • designing, justifying and implementing security management strategies
  • identifying risks with technical solution architectures
  • ensuring security principles are applied during design and development to reduce risk.

Examples of types of security controls include, but are not limited to:

  • physical controls 
  • procedural or administrative controls 
  • technical or logical controls 
  • legal and regulatory or compliance controls.

These activities are typically performed in collaboration with specialists in other areas including, but not limited to, legal, technical infrastructure, audit, architecture, software engineering.

Understanding the responsibility levels of this skill

Where lower levels are not defined...

  • Specific tasks and responsibilities are not defined because the skill requires a higher level of autonomy, influence, and complexity in decision-making than is typically expected at these levels. You can use the essence statements to understand the generic responsibilities associated with these levels.

Where higher levels are not defined...

  • Responsibilities and accountabilities are not defined because these higher levels involve strategic leadership and broader organisational influence that goes beyond the scope of this specific skill. See the essence statements.

Developing skills and demonstrating responsibilities related to this skill

The defined levels show the incremental progression in skills and reponsibilities.

Where lower levels are not defined...

You can develop your knowledge and support others who do have responsibility in this area by:

  • Learning key concepts and principles related to this skill and its impact on your role
  • Performing related skills (see the related SFIA skills)
  • Supporting others with tasks (generic examples are provided by the essence statements for each level)

Where higher levels are not defined...

  • You can progress by developing related skills which are better suited to higher levels of organisational leadership.

Levels

Defined at these levels: 2 3 4 5 6 7

Show/hide extra descriptions and levels.

Level 1

Level 1 - Follow: Essence of the level: Performs routine tasks under close supervision, follows instructions, and requires guidance to complete their work. Learns and applies basic skills and knowledge.

Information security: Level 2

Level 2 - Assist: Essence of the level: Provides assistance to others, works under routine supervision, and uses their discretion to address routine problems. Actively learns through training and on-the-job experiences.

(new)

Assists with information security tasks under routine supervision.

Supports the application of basic security controls.

Helps document and report security issues and risks.

Helps investigate suspected attacks and security breaches.

Information security: Level 3

Level 3 - Apply: Essence of the level: Performs varied tasks, sometimes complex and non-routine, using standard methods and procedures. Works under general direction, exercises discretion, and manages own work within deadlines. Proactively enhances skills and impact in the workplace.

(unchanged)

Applies and maintains specific security controls as required by organisational policy and local risk assessments.

Communicates security risks and issues to business managers and others. Performs basic risk assessments for small information systems.

Contributes to the identification of risks that arise from potential technical solution architectures. Suggests alternate solutions or countermeasures to mitigate risks. Defines secure systems configurations in compliance with intended architectures.

Supports investigation of suspected attacks and security breaches.

Information security: Level 4

Level 4 - Enable: Essence of the level: Performs diverse complex activities, supports and supervises others, works autonomously under general direction, and contributes expertise to deliver team objectives.

(unchanged)

Provides guidance on the application and operation of elementary physical, procedural and technical security controls.

Explains the purpose of security controls and performs security risk and business impact analysis for medium complexity information systems.

Identifies risks that arise from potential technical solution architectures. Designs alternate solutions or countermeasures and ensures they mitigate identified risks.

Investigates suspected attacks and supports security incident management.

Information security: Level 5

Level 5 - Ensure, advise: Essence of the level: Provides authoritative guidance in their field and works under broad direction. Accountable for achieving workgroup objectives and managing work from analysis to execution and evaluation.

(unchanged)

Provides advice and guidance on security strategies to manage identified risks and ensure adoption and adherence to standards.

Contributes to development of information security policy, standards and guidelines.

Obtains and acts on vulnerability information and conducts security risk assessments, business impact analysis and accreditation on complex information systems. Investigates major breaches of security, and recommends appropriate control improvements.

Develops new architectures that mitigate the risks posed by new technologies and business practices.

Information security: Level 6

Level 6 - Initiate, influence: Essence of the level: Has significant organisational influence, makes high-level decisions, shapes policies, demonstrates leadership, fosters organizational collaboration, and accepts accountability in key areas.

(unchanged)

Develops and communicates corporate information security policy, standards and guidelines.

Ensures architectural principles are applied during design to reduce risk. Drives adoption and adherence to policy, standards and guidelines.

Contributes to the development of organisational strategies that address information control requirements. Identifies and monitors environmental and market trends and proactively assesses impact on business strategies, benefits and risks.

Leads the provision of authoritative advice and guidance on the requirements for security controls in collaboration with subject matter experts.

Information security: Level 7

Level 7 - Set strategy, inspire, mobilise: Essence of the level: Operates at the highest organisational level, determines overall organisational vision and strategy, and assumes accountability for overall success.

(unchanged)

Directs the development, implementation, delivery and support of an enterprise information security strategy aligned with the business strategy.

Ensures compliance between business strategies and information security.

Leads the provision of information security expertise, guidance and systems needed to execute strategic and operational plans.

Secures organisational resources to execute the information security strategy.

Keywords
New level