Information Systems Security Architecture Professional (CISSP-ISSAP) Practice Exam
Information Systems Security Architecture Professional (CISSP - ISSAP) Practice Exam
About CISSP - ISSAP Information Systems Security Architecture Professional Certification Exam
CISSP - ISSAP Information Systems Security Architecture Professional Certification Exam is for professional specializing in designing security solutions and providing management with risk-based guidance to meet organizational goals. CISSP - ISSAP Information Systems Security Architecture Professional Certification Exam facilitate the alignment of security solutions within the organizational context such as vision, mission, strategy, policies, requirements, change, and external factors. The broad spectrum of topics included in the ISSAP Common Body of Knowledge (CBK) ensure its relevancy across all disciplines in the field of information security. Candidates gain the competency in the following domains-
- Architect for Application Security
- Security Architecture Modeling
- Architect for Governance, Compliance, and Risk Management
- Infrastructure Security
- Security Operations Architecture
- Identity and Access Management Architecture
Pre-requisites for CISSP - ISSAP Information Systems Security Architecture Professional Certification Exam
Candidates must be a CISSP in good standing and have 2 years cumulative paid full-time work experience in 1 or more of the 6 domains of the CISSP-ISSAP CBK
Course Structure for CISSP - ISSAP Information Systems Security Architecture Professional Certification Exam
The Information Systems Security Architecture Professional (CISSP-ISSAP) Exam covers the latest and updated content -
Domain 1: Governance, Risk, and Compliance (GRC)
1.1 Determine legal, regulatory, organizational, and industry obligations
- Relevant information security standards and best-practice guidelines
- Third-party and contractual responsibilities (e.g., outsourcing, supply chain, business partners)
- Standards and regulations for sensitive/personal data and privacy protection
- Designing resilient and compliant solutions
1.2 Designing for governance, risk, and compliance (GRC)
- Identify critical assets, stakeholders, and business priorities
- Develop monitoring and reporting mechanisms (e.g., vulnerability tracking, compliance audits)
- Build systems that support auditability (e.g., regulatory, legislative, forensic needs, segregation of duties, high-assurance environments)
- Integrate outputs from risk assessment documentation
- Recommend risk response strategies (e.g., mitigate, transfer, accept, avoid)
Domain 2: Security Architecture Modeling
2.1 Define the security architecture approach
- Scope (e.g., enterprise-wide, cloud-based) and architecture types (e.g., network, SOA)
- Use of frameworks (e.g., TOGAF, SABSA, service-oriented modeling frameworks)
- Reference architectures and standard blueprints
- Threat modeling methods (e.g., STRIDE, CVSS, threat intelligence sources)
2.2 Confirm and validate architecture designs
Outcomes from threat modeling (e.g., attack vectors, likelihood, impact)
- Identification of design gaps
- Alternative approaches, mitigations, and compensating controls
- Internal/external validation techniques (e.g., simulations, tabletop exercises, peer reviews, manual functional reviews)
- Code review strategies (e.g., static, dynamic, manual, source composition analysis)
Domain 3: Infrastructure and System Security Architecture
3.1 Identify infrastructure and system security needs
- Deployment environments (on-premises, cloud, hybrid)
- IT and operational technology integration
- Physical security considerations (e.g., perimeter defense, zoning, fire suppression)
- Monitoring requirements for systems and infrastructure
- Cryptographic requirements for infrastructure
- Application security needs (e.g., secure coding, architecture documentation, traceability matrix)
3.2 Design infrastructure and system security architecture
- Physical control mechanisms (e.g., cameras, access doors, controllers)
- Platform security (physical, virtualized, containers, firmware, OS)
- Network security (wired/wireless, IoT, firewalls, VPN, IPsec, NAC, DNS, NTP, VoIP, WAF, air gaps, software-defined perimeters)
- Storage protection (SAN, NAS, removable media, encryption, archival storage)
- Data repository safeguards (access control, masking, redaction, encryption)
- Cloud security models (IaaS, PaaS, SaaS, public/private)
- OT security (ICS, SCADA, IoT environments)
- Endpoint security (BYOD, mobile, EDR, HIDS/HIPS)
- Secure shared services (email, VoIP, unified communications)
- Third-party connectivity and integrations (APIs, federation, VPN, SFTP)
- Infrastructure-level monitoring
- Content monitoring (email/web/social, DLP solutions)
- Out-of-band communication planning (incident response, BC/DR operations)
- Evaluate security controls across system components (clients, proxies, application services)
3.3 Develop cryptographic solutions for infrastructure and systems
- Define cryptographic constraints and design factors (algorithms, lifecycle, computing capacity, attack resistance)
- Select implementation methods (data in transit, at rest, in use)
- Plan complete key management lifecycle (generation, storage, distribution, rotation)
Domain 4: Identity and Access Management (IAM) Architecture
4.1 Design identity lifecycle management
- Establish and validate identities (physical and logical)
- Assign identifiers to users, services, devices, and components
- Manage provisioning and de-provisioning processes (joiners, movers, leavers)
- Apply identity management tools and technologies
4.2 Design authentication architecture
- Define authentication models (single-factor, multi-factor, risk-based)
- Authentication protocols and technologies (SAML, RADIUS, Kerberos, OAuth)
- Access control technologies (XACML, LDAP)
- Establish trust models (federated vs. stand-alone)
4.3 Design authorization architecture
- Core authorization principles (least privilege, separation of duties, discretionary/mandatory access)
- Authorization models (physical, logical, administrative)
- Governance workflows (issuance, review, suspension, revocation)
- Roles and responsibilities for access control (groups, DRM, trust relationships)
- Privileged account oversight (PAM solutions)
- Authorization approaches (SSO, role-based, rule-based, attribute-based, certificates, tokens)
4.4 Design identity accounting and auditing
- Define accounting, forensic, and analysis needs
- Specify key audit events
- Implement alerts and audit log notifications
- Log management requirements (retention, integrity assurance)
- Reporting and log analysis processes
- Ensure compliance with policies and standards (PCI-DSS, FISMA, HIPAA, GDPR)
Exam Pattern for CISSP - ISSAP Information Systems Security Architecture Professional Certification Exam
- Testing center: Pearson VUE Testing Center
- Exam availability: English
- Passing Grade: 700 out of 1000 points
- Format: Multiple choice
- Total questions: 125
- Duration: 3 hours
FAQs on CISSP - ISSAP Information Systems Security Architecture Professional Certification Exam
What is my (ISC)² ID?
Upon account creation, you will receive an (ISC)² ID. Your ID number can be found on your profile page on the (ISC)² website.
How can my certification be verified by a potential employer?
Employers can verify your certification status using the Certification Verification page on our website. Verification requires your last name and member ID number.
How do I become a member?
To become an (ISC)² member, follow three steps: pass one of the six credential examinations, submit an endorsement application demonstrating required experience, and pay the Annual Maintenance Fee (AMF) upon endorsement approval.
What should I do if I cannot find a test center near me?
Contact Pearson VUE Customer Service for assistance in scheduling your examination.
Can I obtain my exam score?
Exam scores are not provided for passing candidates. However, scores are provided upon completion for those who fail an examination.
What items are allowed inside the test center?
No items are permitted inside the test center as stated in the instructions. The test administrator will instruct you to empty your pockets and store all items in a locker.
Does Testprep Training offer a Money Back Guarantee for the Exam Simulator?
Yes, Testprep Training provides a 100% unconditional money-back guarantee. If you fail the exam, you can request a full refund. Refunds are applicable only to products purchased from Testprep Training, not from Microsoft Learning.
Does Testprep Training provide exam preparation assistance?
Yes, Testprep Training offers email support for certification-related queries while you prepare for the exam using our practice exams. Expert assistance will be provided in a timely manner.
Can I try a free test before purchasing the practice exam?
Yes, Testprep Training offers free practice tests for the CISSP - ISSAP Information Systems Security Architecture Professional Certification Exam. You can use these tests before making a purchase decision.
Do you offer preparation guidance for this certification exam?
Yes, our experts frequently publish blogs with tips and tricks for exam preparation.
Is there a discount for bulk purchases?
Yes, Testprep Training offers a nearly 50% discount for orders of more than 10 products at a time. For more information, contact the Testprep Training Helpdesk, and a support staff member will respond promptly.
For more FAQs
https://www.isc2.org/Frequently-Asked-Questions
What do we offer?
- Full-Length Mock Test with unique questions in each test set
- Practice objective questions with section-wise scores
- In-depth and exhaustive explanation for every question
- Reliable exam reports to evaluate strengths and weaknesses
- Latest Questions with an updated version
- Tips & Tricks to crack the test
- Unlimited access
What are our Practice Exams?
- Practice exams have been designed by professionals and domain experts that simulate real time exam scenario.
- Practice exam questions have been created on the basis of content outlined in the official documentation.
- Each set in the practice exam contains unique questions built with the intent to provide real-time experience to the candidates as well as gain more confidence during exam preparation.
- Practice exams help to self-evaluate against the exam content and work towards building strength to clear the exam.
- You can also create your own practice exam based on your choice and preference
100% Assured Test Pass Guarantee
Table of Contents
- Architect for Application Security - 15%
- Security Architecture Modeling - 14%
- Architect for Governance, Compliance, and Risk Management - 16%
- Infrastructure Security - 19%
- Security Operations Architecture - 17%
- Identity and Access Management Architecture - 19%
