For Program Managers, here is ours:
So there are 15 different IT security-related competencies that we are supposed to master as Program Managers. Let me take a moment to go through each of these cells and pull out the behavioral outcome.
1C - Individuals responsible for the design and development of automated information systems are able to translate IT laws and regulations into technical specifications which provide adequate and appropriate levels of protection.
2.1A - Individuals involved in the management of IT security programs are able to understand principles and processes of program planning and can organize resources to develop a security program that meets organizational needs.
2.2A - Individuals involved in IT security program management understand and are able to implement a security program that meets their organization’s needs.
2.2D - Individuals who are responsible for the implementation and daily operations of an IT security program have a sufficient understanding of the appropriate program elements and requirements to be able to apply them in a manner which provides adequate and appropriate levels of protection for the organization’s IT resources.
3.1A - Individuals with management responsibilities are able to identify steps in the system development life cycle where security requirements and concerns (e.g., confidentiality, integrity, and availability) need to be considered and to define the processes to be used to resolve those concerns.
3.1C - Individuals responsible for the design and development of IT systems are able to translate IT security requirements into system level security specifications.
3.2E - Individuals responsible for review and evaluation are able to examine development efforts at specified milestones to ensure that approved safeguards are in place and documented.
3.4A - Individuals with management responsibilities are able to oversee the implementation and deployment of an IT system in a manner that does not compromise in-place and tested security safeguards.
3.4B - Individuals with acquisition responsibilities are able to ensure that the system, as implemented, meets all contractual requirements related to the security and privacy of IT resources.
3.4C - Individuals responsible for system design and/or modification are able to participate in the development of procedures which ensure that safeguards are not compromised as they are incorporated into the production environment.
3.4E - Individuals responsible for review and evaluation are able to analyze system and test documentation to determine whether the system provides adequate and appropriate IT security to support certification and accreditation.
3.5A - Individuals with management responsibilities are able to monitor operations to ensure that safeguards are effective and have the intended effect of balancing efficiency with minimized risk.
3.5B - Individuals with acquisition responsibilities are able to understand the IT security concerns associated with system operations and to identify and use the appropriate contract vehicle to meet current needs in a timely manner.
3.6A - Individuals with management responsibilities are able to understand the special IT security considerations and measures required during the shutdown of a system, and effectively plan and direct these activities.
3.6D - Individuals responsible for IT system operation are able to develop and implement the system termination plan, including security requirements for archiving/disposing of resources.
Each of those cells is further broken down into Beginning, Intermediate and Advanced competencies. When you review these, none of them seems excessive, or out of control. In fact, most of these seem consistent with what we need to do every day, well, except for the last one, it is very rare that we terminate a system. But for the rest of them, yes, these should be part of the baseline competencies that we expect when you are performing in that role. It is not appropriate to expect everyone to be in the Advanced category for each competency, but I would expect that at the full performance level in the job, you probably should be close. When you go to refine your Individual Development Plan, you should establish a baseline for your mastery of these competencies and measure your progress over time.