ISC2 • ISSAP
The ISSAP is a CISSP concentration that validates advanced expertise in designing security solutions and providing risk-based architectural guidance. It demonstrates specialized knowledge across security architecture modeling, infrastructure security, IAM, and governance.
Questions
850
Duration
180 minutes
Passing Score
700/1000
Difficulty
ProfessionalLast Updated
Mar 2026
The Information Systems Security Architecture Professional (ISSAP) is an advanced CISSP concentration credential offered by ISC2 that validates deep expertise in designing, analyzing, and operationalizing enterprise security architectures. It demonstrates mastery across four core domains: Governance, Risk, and Compliance; Security Architecture Modeling; Infrastructure and System Security; and Identity and Access Management Architecture. The ISSAP distinguishes holders as specialists capable of translating business objectives and regulatory requirements into actionable, risk-informed security designs—spanning cloud environments, network infrastructure, cryptographic systems, and IAM frameworks.
Recognized under the U.S. Department of Defense Directive 8140 and accredited by ANAB to ISO/IEC 17024, the ISSAP carries significant weight in both commercial and government sectors. With fewer than 3,000 holders worldwide, it is considered the most technically demanding of the three CISSP concentrations, positioning certified professionals as rare, high-value practitioners at the intersection of strategic leadership and technical implementation. ISC2 updated the exam content and eligibility paths in 2025 to reflect current industry practices including cloud security models, AI-adjacent architecture concerns, and evolving IAM protocols.
The ISSAP is designed for senior-level security professionals whose primary responsibility is architecting security solutions rather than managing teams or implementing individual controls. Ideal candidates include Security Architects, Principal Security Architects, Enterprise Security Architects, Cloud Security Architects, Identity Architects, Chief Technology Officers, and Chief Security Officers. Professionals working as system and network designers or information assurance analysts seeking to formalize their architecture expertise also benefit strongly from this credential.
Candidates typically have a decade or more of hands-on cybersecurity experience and already hold a CISSP. The role of an ISSAP holder sits between C-suite executives and the operational security team—translating organizational risk tolerance and regulatory obligations into concrete security designs. Those aspiring to move from implementation or management roles into architecture leadership, or seeking recognition for existing architecture work in regulated industries such as finance, healthcare, and defense, are the primary audience.
ISC2 offers two eligibility paths for the ISSAP. The first and most common requires an active, in-good-standing CISSP certification plus a minimum of two years of cumulative, full-time professional experience in one or more of the four ISSAP exam domains. The second path, introduced with the 2025 updates, does not require an active CISSP but instead requires seven years of cumulative, full-time work experience across two or more of the ISSAP domains.
Beyond the formal requirements, candidates should have practical, hands-on familiarity with enterprise architecture frameworks such as TOGAF and SABSA, threat modeling methodologies including STRIDE and CVSS, cryptographic design and key lifecycle management, IAM protocols such as SAML, OAuth, RADIUS, and Kerberos, and cloud deployment models. Working knowledge of relevant compliance frameworks—PCI-DSS, HIPAA, GDPR, and NIST standards—is essential for the GRC domain. Candidates without prior exposure to formal architecture design practices and enterprise-scale security programs will find the exam significantly challenging.
The ISSAP exam consists of 125 scored items delivered over 3 hours (180 minutes). The exam uses a linear, fixed-form format and is administered exclusively in-person at authorized Pearson VUE test centers worldwide; candidates should confirm test center availability in their region before registering. Questions are predominantly multiple-choice, testing applied analysis and architectural judgment rather than memorization.
Scoring uses a scaled model with a maximum of 1,000 points, and candidates must achieve a passing score of 700 out of 1,000. The exam fee is approximately $749 USD. Upon passing, the ISSAP credential must be maintained through ISC2's Annual Maintenance Fee (AMF) and earning a minimum of 120 Continuing Professional Education (CPE) credits over each three-year recertification cycle. ISSAP holders who also hold an active CISSP satisfy the CPE requirement jointly.
ISSAP holders command among the highest salaries in the ISC2 certification portfolio. According to ISC2's own Cybersecurity Workforce Study data, ISSAP-certified professionals earn an average of $118,973 globally, with North American holders averaging $146,169 and European holders averaging $129,671. Senior practitioners in chief architect or advisory roles frequently exceed $200,000 in total compensation. The credential directly qualifies professionals for roles such as Security Architect, Principal Security Architect, Enterprise Security Architect, Information Assurance Analyst, and serves as a strong signal for CISO-track career paths.
The ISSAP's DoD 8140 approval makes it particularly valuable for professionals pursuing or maintaining contracts in U.S. federal government and defense work. Its global scarcity—fewer than 3,000 holders worldwide—creates a strong differentiator in competitive hiring situations. Compared to the broader CISSP, the ISSAP signals deep architecture specialization rather than generalist security management knowledge, making it the preferred credential for organizations hiring dedicated security architecture functions. Pairing the ISSAP with the CCSP (for cloud architecture depth) or ISSEP (for engineering and systems security) creates a highly competitive credential portfolio for senior practitioners.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 850 questions.
1. Fabrikam Energy is performing a quantitative risk analysis on its SCADA control network. The asset value of the SCADA system is $2,000,000. A threat assessment determined that a targeted cyberattack could damage 40% of the system. Historical data suggests such an attack occurs approximately once every five years. The security team is evaluating a new intrusion prevention system costing $50,000 annually that would reduce the exposure factor to 10%. What is the annualized value of the safeguard, and should the control be implemented? (Select one!)
Explanation
The calculation follows the standard quantitative risk formula chain. Before the control: SLE = Asset Value x Exposure Factor = $2,000,000 x 0.40 = $800,000. ALE_before = SLE x ARO = $800,000 x 0.20 (once per 5 years) = $160,000. After the control: SLE = $2,000,000 x 0.10 = $200,000. ALE_after = $200,000 x 0.20 = $40,000. Safeguard value = (ALE_before - ALE_after) - Annual cost of control = ($160,000 - $40,000) - $50,000 = $110,000. Since the safeguard value is positive, the control is cost-justified and should be implemented. The other calculations either use incorrect exposure factors, misapply the ARO, or incorrectly compute the annual cost deduction.
2. Adatum Federal Systems is designing a Zero Trust Architecture aligned with NIST SP 800-207 for its multi-cloud environment. The architect must ensure that every resource access request is evaluated dynamically based on identity, device posture, behavioral analytics, and threat intelligence feeds. The architecture requires a component that generates session-specific authentication tokens and can immediately revoke them if the risk profile changes mid-session. Which NIST SP 800-207 component fulfills this specific requirement? (Select one!)
Explanation
The Policy Administrator (PA) in NIST SP 800-207 is responsible for generating session-specific authentication tokens or credentials and delivering them to the Policy Enforcement Point. The PA acts on decisions made by the Policy Engine and has the capability to immediately revoke credentials if the risk profile changes during a session. The Policy Engine evaluates signals and computes access decisions using trust algorithms but does not generate or manage session credentials. The Policy Enforcement Point enforces the decisions by allowing or blocking connections but does not issue tokens. The Continuous Diagnostics and Mitigation system is a data source that feeds information to the Policy Engine about asset state and vulnerabilities, not a decision or credential management component.
3. Tailspin Financial is designing its incident response architecture following NIST SP 800-61. During a recent ransomware incident, the IR team discovered that the attackers had compromised the corporate email system and were monitoring the team's communications about containment strategies. The security architect must design an out-of-band communication capability for future incidents. Which architectural approach should the architect implement? (Select one!)
Explanation
A separate, pre-provisioned communication platform on isolated infrastructure provides true out-of-band communication because it operates independently of any corporate systems that may be compromised. Pre-distributed access credentials ensure the IR team can access the platform even if corporate identity systems are unavailable. Satellite phones provide voice communication independent of corporate telephony, and encrypted messaging ensures confidentiality. This architecture addresses the exact scenario described where attackers had compromised corporate communications. A dedicated Slack channel on the corporate workspace is not out-of-band because it depends on the corporate infrastructure and identity systems that may be compromised. Personal email accounts lack encryption, may violate data handling policies, and provide no assurance of confidentiality for sensitive incident details. End-to-end encrypted email on the existing corporate infrastructure does not address the fundamental problem since the attackers have already compromised the email system and could potentially intercept communications regardless of encryption if they control the platform.
4. Northwind Financial is migrating its customer records data warehouse to the cloud and must implement encryption at rest. The security architect is presenting the encryption design to the compliance team and needs to accurately describe the envelope encryption pattern used by major cloud KMS services. Which description correctly explains how envelope encryption protects data at rest? (Select one!)
Explanation
Envelope encryption works by generating a symmetric Data Encryption Key (DEK) locally, encrypting the data with that DEK using a fast symmetric algorithm such as AES-256-GCM, and then wrapping the DEK with a Key Encryption Key (KEK) managed by the cloud KMS. The wrapped DEK is stored alongside the encrypted data. To decrypt, the KMS unwraps the DEK using the KEK, and the plaintext DEK then decrypts the data. This two-tier approach avoids sending large data volumes to the KMS over the network and keeps the KEK within the KMS boundary at all times. Direct encryption by the master key is impractical because cloud KMS services impose small payload limits (4 KiB for AWS KMS, 64 KiB for Google Cloud KMS) and would require all data to traverse the network to the KMS. Generating asymmetric key pairs per data object describes a hybrid cryptosystem pattern but not the standard envelope encryption model used by cloud KMS services. Block-level key derivation describes a different technique unrelated to the envelope encryption pattern.
5. Litware Government Agency is categorizing a new information system under FIPS 199 as part of the NIST Risk Management Framework. The system processes routine administrative correspondence (low confidentiality impact), manages scheduling data where temporary unavailability is acceptable (low availability impact), but also processes financial disbursement records where unauthorized modification could result in significant adverse effects on organizational operations. What is the overall system categorization? (Select one!)
Explanation
Under FIPS 199, the overall system impact level is determined by the high-water mark principle — the highest impact level assigned to any of the three security objectives (confidentiality, integrity, availability) becomes the overall system categorization. In this scenario, confidentiality is low, availability is low, but integrity is moderate because unauthorized modification of financial disbursement records could cause significant adverse effects. Therefore, the overall system categorization is Moderate. The individual security objective categorizations are preserved for control selection purposes under FIPS 200 and NIST SP 800-53, but the aggregate system level uses the highest value. The system is not automatically High simply because it processes financial records — the actual impact analysis determines the level. Averaging or majority-rules approaches are not used in FIPS 199 categorization.
One-time access to this exam