ISC2 • ISSMP
The ISSMP validates advanced expertise in establishing, presenting, and governing information security programs. It demonstrates deep management and leadership skills across security governance, risk management, incident management, and compliance.
Questions
833
Duration
180 minutes
Passing Score
700/1000
Difficulty
ProfessionalLast Updated
Mar 2026
The Information Systems Security Management Professional (ISSMP) is an advanced concentration certification from ISC2 that validates deep expertise in establishing, presenting, and governing enterprise information security programs. Earning the ISSMP demonstrates mastery across six critical management domains: leadership and organizational management, systems lifecycle management, risk management, security operations, contingency management, and law, ethics, and compliance. The certification is accredited by ANAB under ISO/IEC Standard 17024 and is approved by the U.S. Department of Defense under DoD 8140, underscoring its recognition as an elite-level credential.
Unlike technical security certifications, the ISSMP is specifically oriented toward security executives and senior managers who must align information security programs with business objectives, manage risk across the enterprise, oversee incident response capabilities, and ensure regulatory compliance. As of October 2023, ISC2 updated the prerequisite structure, making the CISSP no longer strictly required, though CISSP holders with two years of qualifying experience remain a primary pathway to certification. The exam was also refreshed with updated domain outlines based on a current Job Task Analysis (JTA).
The ISSMP is designed for senior information security professionals who operate at the intersection of security and business leadership. Primary target roles include Chief Information Security Officers (CISOs), Chief Information Officers (CIOs), Chief Technology Officers (CTOs), Information Security Directors, and other senior security executives responsible for program governance and strategic direction. It is equally well-suited for seasoned Security Managers and Program Managers who are transitioning into executive leadership roles and need to validate their managerial and governance competencies.
Candidates should have a minimum of seven years of cumulative, full-time experience in two or more of the ISSMP domains, or hold an active CISSP certification plus two years of relevant experience. Those with a post-secondary degree in computer science, information technology, or a related field may apply one year of education toward the experience requirement. The certification is not entry-level; it assumes a practitioner who has already built and operated security programs and is seeking formal recognition of that management expertise.
ISC2 requires candidates to demonstrate substantial professional experience before sitting for the ISSMP. There are two pathways: candidates who already hold an active CISSP in good standing need a minimum of two years of cumulative, full-time paid work experience in one or more of the six ISSMP domains. Candidates without a CISSP must have at least seven years of cumulative, full-time paid work experience in two or more of the domains. A four-year college degree or a regional equivalent, or an additional credential from the ISC2 approved list, can satisfy one year of the required experience under either pathway.
Beyond the formal requirements, candidates should be well-versed in enterprise security program development, risk management frameworks (such as NIST RMF or ISO 27001), incident management methodologies, business continuity planning, and relevant legal and regulatory environments such as GDPR, HIPAA, or FISMA. Practical experience in budgeting, workforce management, vendor/supply chain oversight, and executive-level communication will also be essential for both passing the exam and applying the certification in practice.
The ISSMP exam consists of 125 items delivered over a 3-hour testing window. Questions include multiple-choice and advanced item types, which may include drag-and-drop, hotspot, or scenario-based formats that test applied judgment rather than rote recall. The exam is administered in English and can be taken at Pearson VUE testing centers worldwide or through online proctored delivery. The exam fee is $599 USD.
Scoring uses a scaled system with a maximum of 1,000 points, and candidates must achieve a minimum score of 700 to pass. ISC2 does not publish a fixed number of scored versus unscored items, but the 125-item count is the total presented. Upon passing and meeting the experience requirements, the certification is valid for three years and requires 60 CPE credits for renewal, with an annual maintenance fee. Candidates who do not pass may retake the exam after a waiting period per ISC2's retake policy.
The ISSMP positions certified professionals for the most senior roles in information security leadership, including CISO, Information Security Director, VP of Security, and Security Program Manager. According to salary data aggregated from KnowledgeHut and ZipRecruiter, CISSP-ISSMP holders earn an average of approximately $116,000–$140,000 annually in the United States, with CISO-level roles reaching $218,000 or more depending on organization size and geography. Top markets including San Francisco, New York, and Washington D.C. consistently offer compensation above these averages.
The broader demand environment for this credential is strong: the U.S. Bureau of Labor Statistics projects 33% job growth for information security analysts through 2033, and ISC2's 2024 Cybersecurity Workforce Study identified a global gap of 4.76 million cybersecurity professionals. The ISSMP is approved under DoD Directive 8140, making it particularly valuable for professionals pursuing or maintaining federal government and defense contractor positions. Compared to the base CISSP, the ISSMP signals specialization in governance and management — a differentiator that commands premium compensation and opens doors to executive-track opportunities that generalist certifications do not.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 833 questions.
1. Northwind Healthcare is implementing the NIST Risk Management Framework for its electronic health records system. The system has been categorized as high-impact under FIPS 199, appropriate controls from NIST SP 800-53 have been selected and tailored, and the controls have been implemented. The security team has just completed an independent assessment of the controls. What is the next step in the RMF process? (Select one!)
Explanation
The NIST RMF follows seven sequential steps: Prepare, Categorize, Select, Implement, Assess, Authorize, and Monitor. After the Assess step, the next step is Authorize, where a senior official (the Authorizing Official) reviews the authorization package including assessment reports, Plans of Action and Milestones, and system security plans to make a risk-based decision on whether to approve the system for operation. Returning to Prepare would skip the authorization decision. Moving directly to Monitor bypasses the critical authorization decision. Revisiting Select is premature without the authorizing official's review and direction.
2. Fabrikam Technologies has engaged an external auditor to evaluate the maturity of its software development security processes using the Capability Maturity Model (CMM). The auditor's report indicates that Fabrikam collects detailed quantitative metrics on both its software processes and product quality, and uses statistical techniques to control process variation. However, the organization has not yet established a formal mechanism for continuous process improvement or piloting innovative technologies. At which CMM maturity level is Fabrikam Technologies currently operating? (Select one!)
Explanation
CMM Level 4 (Managed) is characterized by the collection of detailed quantitative metrics for both software processes and product quality, enabling organizations to understand and control their processes using statistical and quantitative techniques. This level establishes measurement-driven discipline where process performance becomes predictable within defined parameters. Level 2 (Repeatable) only establishes basic project management practices to repeat earlier successes on similar projects, without organization-wide standardization or quantitative control. Level 3 (Defined) means processes are documented, standardized, and integrated across the organization, but processes are not yet measured or controlled quantitatively. Level 5 (Optimizing) goes beyond Level 4 by establishing continuous process improvement through quantitative feedback, defect prevention programs, and systematic piloting of innovative ideas and technologies. The key distinction is that Level 4 asks whether processes are performing to specification through measurement, while Level 5 asks how processes can be systematically improved using that measurement data.
3. Tailspin Energy Corporation is conducting a Business Impact Analysis for its enterprise resource planning system. The BIA team has gathered input from business process owners across all departments. Which three outcomes should the BIA produce to support contingency planning? (Select three!)
Multiple correct answersExplanation
A Business Impact Analysis produces three critical outputs for contingency planning: criticality prioritization that ranks business functions by their impact on organizational operations, estimation of maximum tolerable downtime that establishes recovery time parameters for each function, and dependency mapping that identifies the relationships between business processes, supporting IT systems, and essential resources. These outputs form the foundation for developing recovery strategies and determining resource allocation during a disruption. A detailed technical vulnerability assessment is a security assessment activity, not a BIA output. The BIA focuses on business impact and recovery requirements rather than technical security weaknesses. A penetration testing report evaluates security controls through simulated attacks and is unrelated to business impact analysis. While resource requirements identification is a valid BIA output, dependency mapping between processes and IT systems is the more comprehensive and foundational deliverable that enables resource planning.
4. Contoso Financial is evaluating its security governance framework and needs to select one that supports SOX compliance for its publicly traded parent company. The framework must provide IT governance and management guidance, include audit and assurance capabilities, and align with regulatory requirements for financial reporting integrity. Which framework should the security manager recommend? (Select one!)
Explanation
COBIT 2019 is the most commonly used framework for SOX IT compliance because it was developed by ISACA with a focus on IT governance, management, and audit/assurance. Its five principles and comprehensive process model directly support the internal controls over financial reporting required by SOX. ITIL focuses on IT service management and delivery rather than governance and audit. The NIST Cybersecurity Framework provides risk management guidance but lacks the governance and audit focus needed for SOX compliance. ISO 27001 is a certifiable ISMS standard focused on information security management, not financial reporting governance.
5. Northwind Global is planning its annual contingency testing program. The BCP coordinator wants to conduct an exercise that brings together key stakeholders to walk through a simulated disaster scenario in a conference room setting, discussing their roles and decision points without actually activating any recovery systems. Which testing type does this describe? (Select one!)
Explanation
A tabletop exercise, also known as a structured walk-through, brings together key personnel to discuss their roles and responses during a simulated scenario in a conference room setting without activating actual recovery systems. It is the most cost-effective way to identify gaps, overlaps, and coordination issues in continuity plans. A full interruption test involves actually shutting down primary operations and switching to recovery systems, making it the most realistic but highest-risk test type. A parallel test activates the backup site while the primary site continues to operate, involving actual system recovery. A simulation test involves a full rehearsal of the recovery process that may include actual resource mobilization but stops short of actual system failover, making it more involved than a tabletop exercise.
One-time access to this exam