CISSP Exam Outline April 2024 English
CISSP Exam Outline April 2024 English
The broad spectrum o topics included in the CISSP body o knowledge ensure its relevancy across all
disciplines in the eld o inormation security. Successul candidates are competent in the ollowing
eight domains:
Experience Requirements
Candidates must have a minimum o ve years cumulative, ull-time experience in two or more o the eight
domains o the current CISSP Exam Outline. Earning a post-secondary degree (bachelors or masters) in
computer science, inormation technology (IT) or related elds may satisy up to one year o the required
experience or an additional credential rom the ISC2 approved list may satisy up to one year o the required
experience. Part-time work and internships may also count towards the experience requirement.
A candidate that doesn’t have the required experience to become a CISSP may become an Associate o ISC2
by successully passing the CISSP examination. The Associate o ISC2 will then have six years to earn the ve
years required experience. You can learn more about CISSP experience requirements and how to account or
part-time work and internships at www.isc2.org/Certications/CISSP/experience-requirements.
Accreditation
CISSP was the rst credential in the eld o inormation security to meet the stringent requirements o ANSI/
ISO/IEC Standard 17024.
Testing center ISC2 Authorized PPC and PVTC Select Pearson VUE
Testing Centers
Total: 100%
» Condentiality, integrity, and availability, authenticity, and nonrepudiation (5 Pillars o Inormation Security)
» Alignment o the security unction to business strategy, goals, mission, and objectives
» Organizational processes (e.g., acquisitions, divestitures, governance committees)
» Organizational roles and responsibilities
» Security control rameworks (e.g., International Organization or Standardization (ISO), National Institute
o Standards and Technology (NIST), Control Objectives or Inormation and Related Technology (COBIT),
Sherwood Applied Business Security Architecture (SABSA), Payment Card Industry (PCI), Federal Risk
and Authorization Management Program (FedRAMP))
» Due care/due diligence
1.4 Understand legal, regulatory, and compliance issues that pertain to information
security in a holistic context
» Cybercrimes and data breaches » Issues related to privacy (e.g., General Data
Protection Regulation (GDPR), Caliornia Consumer
» Licensing and Intellectual Property requirements
Privacy Act, Personal Inormation Protection Law,
» Import/export controls Protection o Personal Inormation Act)
» Transborder data fow » Contractual, legal, industry standards,
and regulatory requirements
1.5 Understand requirements for investigation types (i.e., administrative, criminal, civil,
regulatory, industry standards)
1.6 Develop, document, and implement security policy, standards, procedures, and guidelines
1.7 Identify, analyze, assess, prioritize, and implement Business Continuity (BC) requirements
» Business impact analysis (BIA)
» External dependencies
1.12 Establish and maintain a security awareness, education, and training program
» Methods and techniques to increase awareness » Program eectiveness evaluation
and training (e.g., social engineering, phishing,
security champions, gamication)
» Periodic content reviews to include emerging
technologies and trends (e.g., cryptocurrency,
articial intelligence (AI), blockchain)
2.5 Ensure appropriate asset retention (e.g., End of Life (EOL), End of Support)
3.4 Understand security capabilities of Information Systems (IS) (e.g., memory protection,
Trusted Platform Module (TPM), encryption/decryption)
3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution
elements
» Cryptographic lie cycle (e.g., keys, algorithm » Key management practices (e.g., rotation)
selection)
» Digital signatures and digital
» Cryptographic methods (e.g., symmetric, certicates (e.g., non-repudiation,
asymmetric, elliptic curves, quantum) integrity)
» Public key inrastructure (PKI)
(e.g., quantum key distribution)
5.2 Design identifcation and authentication strategy (e.g., people, devices, and services)
» Remediation
» Exception handling
» Ethical disclosure
» Internal (e.g., within organization control) » Third-party (e.g., outside o enterprise control)
» External (e.g., outside organization control) » Location (e.g., on-premises, cloud, hybrid)
8.1 Understand and integrate security in the Software Development Life Cycle (SDLC)
» Development methodologies (e.g., Agile, Waterall, DevOps, DevSecOps, Scaled Agile Framework)
» Maturity models (e.g., Capability Maturity Model (CMM), Sotware Assurance Maturity Model (SAMM))
» Operation and maintenance
» Change management
» Integrated Product Team
Legal Info
For any questions related to ISC2’s legal policies, please contact the ISC2 Legal
Department at [email protected].
Any Questions?
Contact ISC2 Candidate Services in your region:
Americas
Tel: +1.866.331.ISC2 (4722), press 1
Email: [email protected]
Asia-Pacifc
Tel: +(852) 5803-5662
Email: [email protected]
CISSP Certication
v9/2024Exam Outline 15