ISC2 • ISSAP
The ISSAP is a CISSP concentration that validates advanced expertise in designing security solutions and providing risk-based architectural guidance. It demonstrates specialized knowledge across security architecture modeling, infrastructure security, IAM, and governance.
Questions
850
Duration
180 minutes
Passing Score
700/1000
Difficulty
ProfessionalLast Updated
Mar 2026
The Information Systems Security Architecture Professional (ISSAP) is an advanced CISSP concentration credential offered by ISC2 that validates deep expertise in designing, analyzing, and operationalizing enterprise security architectures. It demonstrates mastery across four core domains: Governance, Risk, and Compliance; Security Architecture Modeling; Infrastructure and System Security; and Identity and Access Management Architecture. The ISSAP distinguishes holders as specialists capable of translating business objectives and regulatory requirements into actionable, risk-informed security designs—spanning cloud environments, network infrastructure, cryptographic systems, and IAM frameworks.
Recognized under the U.S. Department of Defense Directive 8140 and accredited by ANAB to ISO/IEC 17024, the ISSAP carries significant weight in both commercial and government sectors. With fewer than 3,000 holders worldwide, it is considered the most technically demanding of the three CISSP concentrations, positioning certified professionals as rare, high-value practitioners at the intersection of strategic leadership and technical implementation. ISC2 updated the exam content and eligibility paths in 2025 to reflect current industry practices including cloud security models, AI-adjacent architecture concerns, and evolving IAM protocols.
The ISSAP is designed for senior-level security professionals whose primary responsibility is architecting security solutions rather than managing teams or implementing individual controls. Ideal candidates include Security Architects, Principal Security Architects, Enterprise Security Architects, Cloud Security Architects, Identity Architects, Chief Technology Officers, and Chief Security Officers. Professionals working as system and network designers or information assurance analysts seeking to formalize their architecture expertise also benefit strongly from this credential.
Candidates typically have a decade or more of hands-on cybersecurity experience and already hold a CISSP. The role of an ISSAP holder sits between C-suite executives and the operational security team—translating organizational risk tolerance and regulatory obligations into concrete security designs. Those aspiring to move from implementation or management roles into architecture leadership, or seeking recognition for existing architecture work in regulated industries such as finance, healthcare, and defense, are the primary audience.
ISC2 offers two eligibility paths for the ISSAP. The first and most common requires an active, in-good-standing CISSP certification plus a minimum of two years of cumulative, full-time professional experience in one or more of the four ISSAP exam domains. The second path, introduced with the 2025 updates, does not require an active CISSP but instead requires seven years of cumulative, full-time work experience across two or more of the ISSAP domains.
Beyond the formal requirements, candidates should have practical, hands-on familiarity with enterprise architecture frameworks such as TOGAF and SABSA, threat modeling methodologies including STRIDE and CVSS, cryptographic design and key lifecycle management, IAM protocols such as SAML, OAuth, RADIUS, and Kerberos, and cloud deployment models. Working knowledge of relevant compliance frameworks—PCI-DSS, HIPAA, GDPR, and NIST standards—is essential for the GRC domain. Candidates without prior exposure to formal architecture design practices and enterprise-scale security programs will find the exam significantly challenging.
The ISSAP exam consists of 125 scored items delivered over 3 hours (180 minutes). The exam uses a linear, fixed-form format and is administered exclusively in-person at authorized Pearson VUE test centers worldwide; candidates should confirm test center availability in their region before registering. Questions are predominantly multiple-choice, testing applied analysis and architectural judgment rather than memorization.
Scoring uses a scaled model with a maximum of 1,000 points, and candidates must achieve a passing score of 700 out of 1,000. The exam fee is approximately $749 USD. Upon passing, the ISSAP credential must be maintained through ISC2's Annual Maintenance Fee (AMF) and earning a minimum of 120 Continuing Professional Education (CPE) credits over each three-year recertification cycle. ISSAP holders who also hold an active CISSP satisfy the CPE requirement jointly.
ISSAP holders command among the highest salaries in the ISC2 certification portfolio. According to ISC2's own Cybersecurity Workforce Study data, ISSAP-certified professionals earn an average of $118,973 globally, with North American holders averaging $146,169 and European holders averaging $129,671. Senior practitioners in chief architect or advisory roles frequently exceed $200,000 in total compensation. The credential directly qualifies professionals for roles such as Security Architect, Principal Security Architect, Enterprise Security Architect, Information Assurance Analyst, and serves as a strong signal for CISO-track career paths.
The ISSAP's DoD 8140 approval makes it particularly valuable for professionals pursuing or maintaining contracts in U.S. federal government and defense work. Its global scarcity—fewer than 3,000 holders worldwide—creates a strong differentiator in competitive hiring situations. Compared to the broader CISSP, the ISSAP signals deep architecture specialization rather than generalist security management knowledge, making it the preferred credential for organizations hiring dedicated security architecture functions. Pairing the ISSAP with the CCSP (for cloud architecture depth) or ISSEP (for engineering and systems security) creates a highly competitive credential portfolio for senior practitioners.
1. Contoso International operates in 12 countries and must implement an identity accounting architecture that meets multiple regulatory requirements simultaneously. The architecture must ensure audit log integrity, support forensic analysis, enforce different retention periods per jurisdiction, and generate compliance reports for PCI-DSS, HIPAA, and GDPR. Which two architectural components are most critical for meeting these requirements? (Select two!)
Select all that apply2. Tailspin Corporation is implementing Privileged Access Management for its infrastructure team of 50 system administrators who manage 2,000 servers. The security architect must ensure that administrators never see or retain actual root passwords, that all privileged sessions are recorded for forensic purposes, and that emergency access is available when the PAM system itself is unavailable. Which three PAM capabilities must the architecture include to meet all of these requirements? (Select three!)
Select all that apply3. Tailspin Government Agency is designing a privileged access management architecture for its data center administrators. The agency requires that administrators never directly know the passwords to critical systems, all privileged sessions are recorded for forensic review, access is granted only for the specific time window needed to complete approved tasks, and an emergency access procedure exists for critical outages when the PAM system itself is unavailable. Which four PAM capabilities map to these requirements respectively? (Select one!)
4. Contoso Financial is performing a quantitative risk assessment for its online banking platform. The asset value of the platform is $5,000,000, and the exposure factor for a successful DDoS attack is 0.30. The annual rate of occurrence for such attacks is estimated at 0.5. The security architect proposes a DDoS mitigation service costing $200,000 annually that would reduce the exposure factor to 0.05. What is the safeguard value of the proposed mitigation service? (Select one!)
5. Fabrikam Healthcare operates a large hospital network and must ensure its new electronic health records system enforces strict data integrity controls. The security architect needs to select a formal security model that ensures all modifications to patient records occur only through authorized programs and that different personnel are responsible for initiating, authorizing, and verifying changes. Which security model best addresses these requirements? (Select one!)
All exams included • Cancel anytime