Effective Date: January 1, 2012
(Exam Outline)
Effective Date: January 1, 2012
1
© 2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. 5.12.14, V14
January 1, 2012
Effective Date: January 1, 2012
Non-Discrimination
ISC)² does not discriminate candidates based on their nationality, gender, religion, race,
ethnicity, sexual orientation, age and disability. For further information on (ISC)²’s non-
discrimination policy, please visit https://www.isc2.org/legal-info-policies.aspx.
2
© 2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. 5.12.14, V14
Effective Date: January 1, 2012
1)
ACCESS CONTROL...............................................................................................................................7
Overview ...................................................................................................................................................7
Key Areas of Knowledge ........................................................................................................................7
2) TELECOMMUNICATIONS AND NETWORK SECURITY ..........................................................................9
Overview ...................................................................................................................................................9
Key Areas of Knowledge ........................................................................................................................9
3)
INFORMATION SECURITY GOVERNANCE & RISK MANAGEMENT ................................................. 11
Overview ................................................................................................................................................ 11
Key Areas of Knowledge ..................................................................................................................... 11
4)
SOFTWARE DEVELOPMENT SECURITY .............................................................................................. 14
Overview ................................................................................................................................................ 14
Key Areas of Knowledge ..................................................................................................................... 14
5)
CRYPTOGRAPHY .............................................................................................................................. 15
Overview ................................................................................................................................................ 15
Key Areas of Knowledge ..................................................................................................................... 15
6)
SECURITY ARCHITECTURE & DESIGN .............................................................................................. 17
Overview ................................................................................................................................................ 17
Key Areas of Knowledge ..................................................................................................................... 17
7) OPERATIONS SECURITY ...................................................................................................................... 19
Overview ................................................................................................................................................ 19
Key Areas of Knowledge ..................................................................................................................... 19
8) BUSINESS CONTINUITY & DISASTER RECOVERY PLANNING ........................................................... 21
Overview ................................................................................................................................................ 21
Key Areas of Knowledge ..................................................................................................................... 22
9) LEGAL, REGULATIONS, INVESTIGATIONS AND COMPLIANCE ....................................................... 23
Overview ................................................................................................................................................ 23
Key Areas of Knowledge ..................................................................................................................... 23
10)
PHYSICAL (ENVIRONMENTAL) SECURITY ...................................................................................... 25
3
© 2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. 5.12.14, V14
Effective Date: January 1, 2012
Overview ................................................................................................................................................ 25
Key Areas of Knowledge ..................................................................................................................... 25
REFERENCES ............................................................................................................................................... 27
SAMPLE EXAM QUESTIONS ....................................................................................................................... 32
CISSP® Exam Questions ........................................................................................................................ 32
GENERAL EXAMINATION INFORMATION ................................................................................................ 34
Paper Based Test (PBT) ............................................................................................................................. 34
Any questions? .......................................................................................................................................... 37
GENERAL EXAMINATION INFORMATION ................................................................................................ 38
Computer Based Testing (CBT) ............................................................................................................... 38
Registering for the Exam .......................................................................................................................... 38
Scheduling a Test Appointment ............................................................................................................. 39
Non Disclosure ........................................................................................................................................... 42
Day of the Exam ....................................................................................................................................... 42
Any questions? .......................................................................................................................................... 46
4
© 2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. 5.12.14, V14
Effective Date: January 1, 2012
The Certified Information Systems Security Professional (CISSP) is an information assurance
professional who has demonstrated a globally recognized level of competence provided by a
common body of knowledge that defines the architecture, design, management, risk and
controls that assure the security of business environments.
This Candidate Information Bulletin provides the following:
• Exam blueprint to a limited level of detail that outlines major topics and sub- topics
within the domains,
• Suggested reference list,
• Description of the format of the items on the exam, and
• Basic registration/administration policies
Candidates must meet the following requirements prior to taking the CISSP examination:
• Submit the examination fee
• Applicants must have a minimum of five years of cumulative paid full-time security
professional work experience in two or more of the ten domains of the (ISC)² CISSP®
CBK®. If you hold a certification on the (ISC)² - approved list (visit
www.isc2.org/credential waiver for a complete list), you may receive one year waiver
out of the five-year experience requirement. Alternatively, a four-year degree
leading to a Baccalaureate or regional equivalent can substitute for one year
towards the five-year requirement. No more than 1 year of experience may be
waived.
• Attest to the truth of his or her assertions regarding professional experience, and
legally commit to abide by the (ISC)² Code of Ethics (Section 3).
• Before candidates are allowed to take the test at testing centers, they must respond
“yes” or “No” to the following four questions regarding criminal history and related
background:
1. Have you ever been convicted of a felony; a misdemeanor involving a
computer crime, dishonesty, or repeat offenses; or a Court Martial in military
service, or is there a felony charge, indictment, or information now pending
against you? (Omit minor traffic violations and offenses prosecuted in juvenile
court).
2. Have you ever had a professional license, certification, membership or
registration revoked, or have you ever been censured or disciplined by any
professional organization or government agency?
3. Have you ever been involved, or publicly identified, with criminal hackers or
hacking?
4. Have you ever been known by any other name, alias, or pseudonym? (You
need not include user identities or screen names with which you were publicly
identified).
5
© 2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. 5.12.14, V14
Effective Date: January 1, 2012
CISSP professional experience includes but is not limited to:
Work requiring special education or intellectual attainment, usually including a liberal
education or college degree.
Work requiring habitual memory of a body of knowledge shared by others doing similar
work.
Management/supervision of projects and/or employees.
Work requiring the exercise of judgment, management decision-making, and discretion.
Work requiring the exercise of ethical judgment (as opposed to ethical behavior).
Professional writing and oral communication (e.g., presentation).
Research and development.
The specification and selection of controls and mechanisms (i.e. identification and
authentication technology- does not include the mere operation of these controls).
Teaching, instructing, training and the mentoring of others.
Applicable job title examples are: CISO, Director, Manager, Supervisor, Analyst,
Cryptographer, Cyber Architect, Information Assurance Engineer, Instructor, Professor,
Lecturer, Investigator, Computer Scientist, Program Manager, Lead, etc.
6
© 2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. 5.12.14, V14
1) ACCESS CONTROL
Overview
Effective Date: January 1, 2012
Access Control domain covers mechanisms by which a system grants or revokes the right to
access data or perform an action on an information system.
Access Control systems include:
File permissions, such as “create,” “read,” “edit,” or “delete” on a file server.
Program permissions, such as the right to execute a program on an application server.
Data rights, such as the right to retrieve or update information in a database.
CISSP candidates should fully understand access control concepts, methodologies and their
implementation within centralized and decentralized environments across an organization’s
computing environment.
Key Areas of Knowledge
A. Control access by applying the following concepts/methodologies/
techniques
A.1
Policies
A.2
Types of controls (preventive, detective, corrective, etc.)
A.3
Techniques (e.g., non-discretionary, discretionary and mandatory)
A.4
Identification and Authentication
A.5 Decentralized/distributed access control techniques
A.6 Authorization mechanisms
A.7
Logging and monitoring
B. Understand access control attacks
B.1
Threat modeling
B.2
Asset valuation
B.3
Vulnerability analysis
B.4
Access aggregation
7
© 2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. 5.12.14, V14
Effective Date: January 1, 2012
C. Assess effectiveness of access controls
C.1
User entitlement
C.2 Access review & audit
D. Identity and access provisioning lifecycle (e.g., provisioning, review,
revocation)
8
© 2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. 5.12.14, V14