ISC2 • CCSP
Validates advanced competency in cloud security architecture, design, operations, and service orchestration, covering cloud concepts, data security, platform and infrastructure security, application security, operations, and legal and compliance.
Questions
850
Duration
180 minutes
Passing Score
700/1000
Difficulty
ProfessionalLast Updated
Feb 2026
The Certified Cloud Security Professional (CCSP) is a globally recognized advanced credential offered by ISC2, developed in collaboration with the Cloud Security Alliance (CSA). It validates deep technical expertise in cloud security architecture, design, operations, and service orchestration across all major cloud service and deployment models. The credential demonstrates that holders can design and manage secure cloud environments using industry-established best practices, policies, and procedures, covering six core knowledge domains: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform & Infrastructure Security; Cloud Application Security; Cloud Security Operations; and Legal, Risk and Compliance.
The CCSP holds ISO/IEC Standard 17024 accreditation and is approved by the U.S. Department of Defense under DoD Manual 8140.03, making it one of the few cloud security credentials with formal government recognition. As of 2026, ISC2 has announced an updated exam outline effective August 1, 2026, so candidates should verify which outline applies to their target exam date. The certification requires ongoing continuing professional education (CPE) credits and an annual maintenance fee to remain active.
The CCSP is designed for experienced IT and information security professionals who architect, design, manage, or assess cloud environments as a core part of their role. Ideal candidates include cloud security architects, cloud engineers, cloud consultants, security analysts, cloud administrators, and security auditors who work with or within cloud service providers or large enterprise cloud deployments.
Professionals already holding the CISSP who want to specialize in cloud security are a natural fit, as an active CISSP satisfies the entire CCSP experience requirement. Security managers and CISOs seeking to formalize their cloud security expertise and demonstrate vendor-neutral, architectural-level knowledge also benefit significantly from this credential. It is not intended for beginners — candidates should have substantial hands-on experience in IT and cybersecurity before pursuing this certification.
Candidates must have a minimum of five years of cumulative, paid, full-time work experience in information technology, of which at least three years must be in information security and one year in one or more of the six CCSP exam domains. There is no formal educational prerequisite, though a bachelor's or master's degree in computer science, IT, or a related field may substitute for up to one year of the required IT experience.
Holding CSA's Certificate of Cloud Security Knowledge (CCSK) can substitute for one year of the CCSP domain-specific experience requirement. An active CISSP credential from ISC2 satisfies the entire five-year experience requirement. Candidates who pass the exam without meeting the experience requirements may become an Associate of ISC2 and have six years to earn the necessary experience before the credential is formally awarded.
The CCSP exam uses Computerized Adaptive Testing (CAT), delivering between 100 and 150 questions within a 3-hour (180-minute) time limit. Questions include multiple-choice and advanced item formats (e.g., drag-and-drop, hotspot). The adaptive format adjusts question difficulty based on candidate performance, meaning the exam ends when the system can statistically determine pass or fail status, or when the maximum question count or time is reached.
The exam is scored on a scale of 0 to 1000 points, with a passing score of 700. It is delivered at Pearson VUE testing centers worldwide or via online proctored testing. The exam is available in English, with other language options periodically offered. Candidates should check the ISC2 website for the most current language availability and testing center options before scheduling.
The CCSP is one of the most sought-after credentials in cloud security, with ISC2 reporting a global average salary of approximately $114,000 USD for CCSP holders, rising to around $148,000 in the United States. Professionals in architect and leadership roles — such as Cloud Security Architect, CISO, or Cloud Security Engineer — frequently earn well above these averages. The U.S. Bureau of Labor Statistics projects information security analyst roles to grow 33% from 2023 to 2033, far exceeding most occupational categories, reflecting sustained enterprise demand for qualified cloud security practitioners.
The CCSP differentiates candidates from those holding only platform-specific certifications (AWS Security Specialty, Azure Security Engineer) by demonstrating vendor-neutral, architectural-level expertise applicable across multi-cloud and hybrid environments. It is frequently listed as a preferred or required qualification in senior cloud security job postings and satisfies DoD 8140 workforce requirements for government and defense contractors. Professionals already holding the CISSP can acquire the CCSP with reduced barriers given the experience waiver, making it a natural specialization pathway within the ISC2 certification ecosystem.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 850 questions.
1. An enterprise adopts a Cloud Access Security Broker to gain visibility into shadow IT and enforce data security policies. The security architect must select the appropriate deployment mode. Which CASB deployment mode is the ONLY one capable of discovering unsanctioned cloud applications used by employees? (Select one!)
Explanation
Forward proxy inline mode is the only CASB deployment capable of discovering shadow IT because it sits between users and the internet, intercepting all web traffic including connections to unsanctioned cloud services. Users or devices must be configured to route traffic through the forward proxy, enabling visibility into all cloud applications regardless of whether they are approved. Reverse proxy mode sits between users and sanctioned cloud applications accessible through SSO or SAML federation, providing deep inspection and control but only for pre-approved applications with no shadow IT discovery capability. API-based mode connects to cloud services via APIs to scan data at rest retrospectively but cannot detect shadow IT since it only connects to known authorized services. Multi-mode hybrid deployments may include forward proxy but the specific forward proxy component is what enables shadow IT discovery. Forward proxy has limitations including potential bypass by sophisticated users and requirement for endpoint configuration.
2. An incident response team investigates a security breach in a containerized microservices environment running on Kubernetes. The suspected compromised container was automatically terminated and replaced by the orchestration platform before forensic evidence could be collected. Container logs and memory contents disappeared when the pod was destroyed. Which cloud forensics challenge does this scenario represent? (Select one!)
Explanation
Ephemeral resource volatility is a critical cloud forensics challenge where dynamic resources like containers, serverless functions, and auto-scaled instances are automatically created, destroyed, or recycled before evidence can be collected. Container orchestration platforms routinely terminate pods, making traditional forensic preservation difficult. Multi-tenancy constraints relate to evidence collection that might expose other tenants' data. Jurisdictional complexity involves data crossing international borders with conflicting legal requirements. Limited physical access affects ability to seize hardware but does not address the ephemeral nature of resources. Cloud incident response must implement continuous logging, memory capture on detection, and rapid snapshot creation before resources disappear.
3. An application security team implements dynamic data masking for a production database containing customer information. The team must understand the appropriate use cases and limitations. In which scenario should dynamic data masking NOT be applied? (Select one!)
Explanation
Dynamic data masking should NEVER be applied in write contexts where masked values would be permanently stored in the database, as this would corrupt the original data with masked values making it irretrievable. DDM is designed exclusively for read operations, obscuring data at query time while leaving the underlying data unchanged. Once masked data is written back to storage, the original values are lost forever. DDM is appropriate for masking credit card numbers displayed to customer service representatives who need account access but not full card numbers. Obscuring social security numbers in production reports accessed by business analysts is a valid DDM use case for read-only reporting. Protecting sensitive data in read-only queries for developers working in production environments is appropriate since the underlying data remains intact. Static data masking is the correct approach when creating non-production copies where masked values will be stored, creating an entirely new obscured dataset while preserving the original.
4. An organization implements enterprise risk management following the NIST Risk Management Framework (RMF) defined in NIST SP 800-37 Revision 2. The framework provides a structured approach to integrating security, privacy, and cyber supply chain risk management into the system development lifecycle. The framework consists of seven steps that form a continuous cycle. Which acronym represents the seven RMF steps in sequential order, with Prepare being the first step? (Select one!)
Explanation
The NIST RMF seven steps in sequential order are represented by P-CSIAAM: Prepare (essential activities for managing security and privacy risks), Categorize (system and information based on impact analysis), Select (controls based on risk assessment), Implement (controls and document in security and privacy plans), Assess (determine if controls are implemented correctly and effective), Authorize (senior official makes risk-based decision to authorize system operation), and Monitor (maintain ongoing situational awareness). STRIDE is a threat modeling methodology from Microsoft, not the NIST RMF. PDCA (Plan-Do-Check-Act) is the Deming Cycle used in quality management and continuous improvement, not the NIST RMF. The incorrect P-CRASP option contains steps in the wrong order and incorrect step names.
5. A healthcare organization implements data classification following protected health information regulations. The data owner assigns classification levels, the data custodian implements storage controls, and operations staff perform daily backups. A compliance audit reveals that classification decisions are being delegated to the data custodian due to the data owner's time constraints. What is the primary compliance concern with this delegation? (Select one!)
Explanation
Data owners hold ultimate accountability for data classification, protection, and appropriate use. While data owners can delegate responsibility for implementing controls to custodians, they cannot delegate accountability. Classification decisions determine all subsequent security controls including encryption, access restrictions, retention periods, and handling procedures. These strategic decisions require business context and risk acceptance authority that only data owners possess. Custodians implement technical controls based on owner-defined classification, but should not make classification decisions. The separation of duties between accountability (owner) and implementation (custodian) represents a fundamental information governance principle. Technical capability is not the issue since custodians already implement controls. Operations staff focus on operational tasks, not governance decisions. Consistency is maintained through data owner-defined classification schemes and criteria, not through limiting the number of decision-makers.
One-time access to this exam