ISC2 β’ CGRC
Validates expertise in information security governance, risk management, and compliance, covering security and privacy governance, risk management, compliance and audit, information system authorization, and continuous monitoring.
Questions
850
Duration
180 minutes
Passing Score
700/1000
Difficulty
ProfessionalLast Updated
Feb 2026
The Certified in Governance, Risk and Compliance (CGRC) is a professional-level certification offered by ISC2 that validates expertise in designing, implementing, and maintaining information security governance, risk, and compliance programs. Formerly known as the Certified Authorization Professional (CAP), it was officially rebranded as the CGRC on February 15, 2023, reflecting its broader applicability beyond U.S. federal authorization frameworks to enterprise GRC practices globally. The credential demonstrates a practitioner's ability to advocate for security risk management in pursuit of information system authorization in accordance with legal and regulatory requirements, spanning frameworks such as NIST RMF, COBIT, ISO/IEC standards, and FedRAMP.
The certification covers seven domains encompassing the full lifecycle of information system compliance: governance program establishment, system scoping, control selection and approval, control implementation, assessment and audit, system compliance authorization, and ongoing compliance maintenance. It is accredited by the ANSI National Accreditation Board (ANAB) under ISO/IEC Standard 17024, and is approved by the U.S. Department of Defense under DoDM 8140.03, making it a recognized credential in both private sector and federal government environments.
The CGRC is designed for IT, information security, and information assurance professionals who work in or aspire to governance, risk management, and compliance roles. Target job titles include cybersecurity auditors, compliance officers, GRC architects, GRC managers, risk and compliance project managers, enterprise risk managers, and information assurance managers. It is best suited for mid-career professionals who operate at the intersection of security and regulatory frameworks, particularly those who manage authorization processes or oversee compliance programs.
Candidates who do not yet meet the experience requirements but pass the exam may become an Associate of ISC2 while they accumulate the necessary work history. The certification is especially relevant for professionals working in or with U.S. federal agencies, defense contractors, or organizations subject to NIST-based compliance mandates, though its updated scope makes it equally applicable to global enterprises managing multi-framework compliance obligations.
Candidates must have a minimum of two cumulative years of paid work experience in one or more of the seven CGRC domains. There is no requirement that experience span all domains β depth in a single relevant domain such as risk management, compliance auditing, or security control assessment qualifies. No specific prior certification is required, though familiarity with foundational information security concepts, risk management principles, and regulatory frameworks (NIST SP 800-37, NIST SP 800-53, ISO/IEC 27001, FedRAMP) is strongly recommended as these underpin the entire CBK.
Candidates who pass the CGRC exam but lack the requisite experience may hold the Associate of ISC2 designation while working toward the two-year threshold. Practical exposure to system authorization or accreditation processes, security control selection and implementation, or compliance auditing in a professional environment significantly improves readiness for the exam.
The CGRC exam consists of 125 items delivered over 3 hours. Questions include both traditional multiple-choice and advanced item types, which may include drag-and-drop, hotspot, and other scenario-based formats designed to assess applied knowledge rather than rote memorization. The exam is administered through Pearson VUE at authorized testing centers and via online proctoring.
Scoring uses a scaled model with a maximum of 1,000 points, and the passing score is 700 out of 1,000. The exam does not use negative scoring. Candidates who fail may retake the exam; ISC2 enforces a mandatory 30-day waiting period after the first failed attempt, 90 days after the second, and 180 days after the third and any subsequent attempts.
The CGRC commands strong salary premiums in the cybersecurity market. According to Certification Magazine's Salary Survey 75, CGRC holders earn an average of $118,980 annually in the United States and $114,150 globally, positioning it among the higher-paying ISC2 credentials. The certification aligns directly with roles such as GRC analyst, compliance officer, information assurance manager, risk manager, and cybersecurity auditor β positions that are in sustained demand as organizations face expanding regulatory obligations under frameworks including CMMC, FedRAMP, HIPAA, and SOC 2.
The CGRC's DoD 8140.03 approval makes it particularly valuable for professionals pursuing or maintaining positions within U.S. federal agencies and defense contractors, where authorized practitioners are required by policy. The credential reached 5,000 worldwide holders in early 2026, reflecting growing global adoption beyond its federal roots. In the 2024 ISC2 Cybersecurity Workforce Study, GRC ranked among the top technical skills in demand at 13% β just behind risk assessment and management β signaling strong and sustained employer appetite for credentialed GRC practitioners.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 850 questions.
1. An Authorizing Official reviews a system security plan during Task S-6 and identifies three organization-defined parameters: AC-2(1) requires review of accounts every 90 days, AC-11 requires session timeout after 15 minutes, and SI-4 requires monitoring all boundary interfaces. The AO determines that 90-day account review is insufficient for this High-impact financial system. What should happen? (Select one!)
Explanation
Organization-defined parameters allow organizations to specify values, frequencies, thresholds, or lists that tailor controls to organizational needs and risk tolerance. When an AO determines that a proposed ODP assignment is insufficient for the system's risk profile during plan review, the appropriate action is to work with the System Owner to revise the parameter to a more appropriate value before plan approval. ODP assignments should reflect the system's impact level, threat environment, and organizational risk tolerance. The AO is not required to reject the entire SSP for a single parameter issue; targeted revision is more efficient. Approving with conditions should be reserved for controls that cannot be fully implemented at authorization time, not for parameter assignments that can be corrected before approval. The CCB reviews proposed changes to operational systems; initial parameter assignments during plan development are between the System Owner and AO as part of plan approval. High-impact systems typically require more stringent parameter values than low or moderate systems to address elevated risk.
2. A Mission Owner collaborates with the System Owner during Task P-8 (Mission or Business Focus) to document critical business processes supported by a new federal supply chain management system. The system will support procurement operations, vendor management, and contract administration. Which outcome is the PRIMARY purpose of Task P-8? (Select one!)
Explanation
Task P-8 Mission or Business Focus requires the Mission or Business Owner to document the specific missions and business processes that the system will support. This establishes the business context and mission criticality that drives subsequent risk management decisions throughout the RMF lifecycle. Establishing the authorization boundary occurs in Task P-11. Stakeholder identification is performed in Task P-9. Security categorization happens later in the Categorize step during Task C-2. Task P-8 is a Prepare step system-level task focused specifically on documenting mission and business alignment.
3. An organization operates under FISMA requirements and has implemented an ISCM program providing near real-time security posture visibility. The CIO asks whether the organization can eliminate authorization termination dates for systems using ongoing authorization. What are the prerequisites for eliminating authorization termination dates? (Select two!)
Multiple correct answersExplanation
NIST SP 800-37 Rev 2 and OMB M-14-04 specify two prerequisites for ongoing authorization without termination dates: first, the system must have received initial authorization based on a complete zero-based review ensuring all controls were comprehensively assessed; second, the organization must have a robust, mature ISCM program providing near real-time security posture information that enables continuous risk-based decisions. These prerequisites ensure the AO has sufficient visibility to make informed ongoing authorization decisions. Ongoing authorization applies regardless of impact level when prerequisites are met. Consecutive ATOs are not the determining factor; ISCM maturity is. Agency head approval is not specified as a prerequisite, though organizational policies may require notification.
4. An organization implements NIST SP 800-160 Vol 1 Systems Security Engineering principles during the acquisition of a supply chain management system. The security architect must incorporate security as an emergent property from system inception rather than a bolt-on feature. Which two SSE design principles should the architect prioritize to address supply chain security risks identified in the risk assessment? (Select two!)
Multiple correct answersExplanation
Systems security engineering principles from NIST SP 800-160 Vol 1 treat security as an emergent property requiring intentional design from inception. For supply chain security risks per SP 800-161, least privilege limits supplier access to minimize insider threat and limit damage from compromised supplier accounts, directly addressing supply chain threat vectors. Defense in depth provides multiple protective layers so that compromise of one component, supplier, or control does not compromise the entire systemβcritical when facing multifaceted supply chain attacks including counterfeit components and malicious functionality insertion. Complete mediation addresses access control but does not specifically target supply chain risks. Psychological acceptability emphasizes usability over security rigor. Economy of mechanism promotes simplicity but should not override necessary supply chain protections requiring comprehensive controls.
5. A federal agency is comparing authorization approaches for deploying a standard commercial-off-the-shelf email platform to 75 geographically distributed field offices. Each office will run an identical configuration of the platform with local administrators. The agency is considering traditional authorization, type authorization, and facility authorization approaches. Which authorization structure is most appropriate for this deployment scenario? (Select one!)
Explanation
Type authorization is specifically designed for scenarios where a common system configuration is deployed to multiple locations. A single authorization package is developed for the standardized configuration, and a single ATO covers all instances of that type. This approach dramatically reduces authorization burden while maintaining security rigor for the common configuration, with local implementation differences documented as deviations. Traditional authorization with 75 separate packages imposes enormous administrative burden without commensurate security benefit when configurations are identical. Facility authorization applies to physical facilities and their environmental controls, not information system platforms. Joint authorization involves multiple co-authorizing officials for a single system with shared operational responsibility, not multiple independent instances of the same system configuration across different organizational units.
One-time access to this exam