ISC2 • CCSP
Validates advanced competency in cloud security architecture, design, operations, and service orchestration, covering cloud concepts, data security, platform and infrastructure security, application security, operations, and legal and compliance.
Questions
850
Duration
180 minutes
Passing Score
700/1000
Difficulty
ProfessionalLast Updated
Feb 2026
The Certified Cloud Security Professional (CCSP) is a globally recognized advanced credential offered by ISC2, developed in collaboration with the Cloud Security Alliance (CSA). It validates deep technical expertise in cloud security architecture, design, operations, and service orchestration across all major cloud service and deployment models. The credential demonstrates that holders can design and manage secure cloud environments using industry-established best practices, policies, and procedures, covering six core knowledge domains: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform & Infrastructure Security; Cloud Application Security; Cloud Security Operations; and Legal, Risk and Compliance.
The CCSP holds ISO/IEC Standard 17024 accreditation and is approved by the U.S. Department of Defense under DoD Manual 8140.03, making it one of the few cloud security credentials with formal government recognition. As of 2026, ISC2 has announced an updated exam outline effective August 1, 2026, so candidates should verify which outline applies to their target exam date. The certification requires ongoing continuing professional education (CPE) credits and an annual maintenance fee to remain active.
The CCSP is designed for experienced IT and information security professionals who architect, design, manage, or assess cloud environments as a core part of their role. Ideal candidates include cloud security architects, cloud engineers, cloud consultants, security analysts, cloud administrators, and security auditors who work with or within cloud service providers or large enterprise cloud deployments.
Professionals already holding the CISSP who want to specialize in cloud security are a natural fit, as an active CISSP satisfies the entire CCSP experience requirement. Security managers and CISOs seeking to formalize their cloud security expertise and demonstrate vendor-neutral, architectural-level knowledge also benefit significantly from this credential. It is not intended for beginners — candidates should have substantial hands-on experience in IT and cybersecurity before pursuing this certification.
Candidates must have a minimum of five years of cumulative, paid, full-time work experience in information technology, of which at least three years must be in information security and one year in one or more of the six CCSP exam domains. There is no formal educational prerequisite, though a bachelor's or master's degree in computer science, IT, or a related field may substitute for up to one year of the required IT experience.
Holding CSA's Certificate of Cloud Security Knowledge (CCSK) can substitute for one year of the CCSP domain-specific experience requirement. An active CISSP credential from ISC2 satisfies the entire five-year experience requirement. Candidates who pass the exam without meeting the experience requirements may become an Associate of ISC2 and have six years to earn the necessary experience before the credential is formally awarded.
The CCSP exam uses Computerized Adaptive Testing (CAT), delivering between 100 and 150 questions within a 3-hour (180-minute) time limit. Questions include multiple-choice and advanced item formats (e.g., drag-and-drop, hotspot). The adaptive format adjusts question difficulty based on candidate performance, meaning the exam ends when the system can statistically determine pass or fail status, or when the maximum question count or time is reached.
The exam is scored on a scale of 0 to 1000 points, with a passing score of 700. It is delivered at Pearson VUE testing centers worldwide or via online proctored testing. The exam is available in English, with other language options periodically offered. Candidates should check the ISC2 website for the most current language availability and testing center options before scheduling.
The CCSP is one of the most sought-after credentials in cloud security, with ISC2 reporting a global average salary of approximately $114,000 USD for CCSP holders, rising to around $148,000 in the United States. Professionals in architect and leadership roles — such as Cloud Security Architect, CISO, or Cloud Security Engineer — frequently earn well above these averages. The U.S. Bureau of Labor Statistics projects information security analyst roles to grow 33% from 2023 to 2033, far exceeding most occupational categories, reflecting sustained enterprise demand for qualified cloud security practitioners.
The CCSP differentiates candidates from those holding only platform-specific certifications (AWS Security Specialty, Azure Security Engineer) by demonstrating vendor-neutral, architectural-level expertise applicable across multi-cloud and hybrid environments. It is frequently listed as a preferred or required qualification in senior cloud security job postings and satisfies DoD 8140 workforce requirements for government and defense contractors. Professionals already holding the CISSP can acquire the CCSP with reduced barriers given the experience waiver, making it a natural specialization pathway within the ISC2 certification ecosystem.
1. A financial services company is migrating sensitive customer data to a public cloud provider. The Chief Security Officer requires that encryption keys never leave the organization's on-premises HSM, even for cryptographic operations performed in the cloud. The solution must support regulatory compliance audits demonstrating complete key control. Which key management approach should the company implement? (Select one!)
2. An organization discovers that 70 percent of recent security incidents originated from endpoints rather than network perimeter breaches. The security team needs to implement a data loss prevention solution that can monitor data in use, control USB device access, enforce clipboard restrictions, and continue functioning when devices are offline. Which DLP deployment model addresses these requirements? (Select one!)
3. A healthcare provider must ensure their cloud-hosted electronic health records system complies with HIPAA requirements. The cloud service provider will handle data storage and backup services. Under GDPR terminology, which roles do the healthcare provider and cloud service provider fulfill, and what contractual agreement is required under HIPAA? (Select two!)
Select all that apply4. A financial services company is designing a private IaaS cloud infrastructure to host sensitive customer workloads. During a security assessment, the infrastructure team discovers that a vulnerability in their virtualization platform could allow malicious code within a compromised VM to break isolation boundaries and access the hypervisor layer. The team must select a hypervisor architecture that minimizes this risk while maintaining production-grade performance. What type of attack is this scenario describing, and which hypervisor architecture provides the strongest security posture against this threat? (Select one!)
5. A global e-commerce company experiences a ransomware attack that encrypts their primary database. Their disaster recovery plan specifies a Recovery Point Objective (RPO) of 15 minutes and a Recovery Time Objective (RTO) of 1 hour. After restoring from backups, the team needs an additional 30 minutes to verify data integrity and resume operations. If the Maximum Tolerable Downtime (MTD) is 2 hours, does this disaster recovery configuration meet requirements? (Select one!)
All exams included • Cancel anytime