ISC2 • ISSEP
Validates specialized expertise in security engineering, covering systems security engineering, security engineering principles, risk management, technical management, and the integration of security into the systems development lifecycle using the ISSE process.
Questions
850
Duration
180 minutes
Passing Score
700/1000
Difficulty
SpecialtyLast Updated
Feb 2026
The Information Systems Security Engineering Professional (ISSEP) is an advanced concentration certification offered by ISC2, developed in collaboration with the U.S. National Security Agency (NSA). It validates deep competency in applying systems engineering principles to the design, development, and operation of secure systems throughout the entire system lifecycle. Holders demonstrate the ability to analyze organizational security needs, define security requirements, design security architectures, and support authorization activities across government and commercial sectors.
Effective August 1, 2025, ISC2 updated the ISSEP exam outline based on a triennial Job Task Analysis (JTA), revising domain weights and introducing new objectives covering Zero Trust architectures, DevSecOps practices, supply chain risk management (SCRM), and model-based systems engineering (MBSE) references. The certification is accredited by ANAB under ISO/IEC 17024 and is approved by the U.S. Department of Defense under DoD 8140, making it especially authoritative for professionals working in federal, defense, and intelligence environments.
The ISSEP is designed for senior security professionals who specialize in the intersection of systems engineering and information security. Relevant roles include Senior Systems Engineer, Information Assurance Systems Engineer, Information Assurance Officer, Information Assurance Analyst, and Senior Security Analyst. It is particularly well-suited for professionals working on large-scale government, defense, or critical infrastructure programs where formal engineering processes and authorization frameworks (such as the NIST Risk Management Framework) are mandatory.
Candidates typically come from backgrounds in systems engineering, enterprise security architecture, or defense contracting, and are seeking to formally validate their expertise in engineering secure systems from requirements through decommissioning. Given its NSA origins and DoD 8140 recognition, the ISSEP is especially valued by professionals pursuing or holding roles requiring formal security engineering credentials within federal agencies and defense contractors.
The primary prerequisite path requires candidates to hold an active CISSP credential in good standing, plus two years of cumulative, full-time professional work experience in one or more of the five ISSEP exam domains. This makes the ISSEP a post-CISSP concentration rather than a standalone entry-level certification.
For candidates without the CISSP, a minimum of seven years of cumulative, full-time experience in two or more of the ISSEP domains is required. A post-secondary degree in computer science, information technology, or a related field—or an additional ISC2-approved credential—may satisfy one year of the experience requirement, though no more than one year may be waived. Part-time work and qualifying internships may count toward the experience total. Recommended knowledge includes familiarity with NIST SP 800-160 (Systems Security Engineering), NIST SP 800-37 (Risk Management Framework), ISO/IEC 27001, INCOSE Systems Engineering Handbook, and PMBOK project management concepts.
The ISSEP exam consists of 125 scored items and must be completed within 3 hours (180 minutes). Questions include multiple-choice and advanced item types (such as drag-and-drop or hotspot items). The exam is delivered in English only and is administered exclusively through Pearson VUE testing centers; it is not available as an online proctored exam. There are no unscored/survey questions disclosed by ISC2 for this exam format.
ISC2 uses a scaled scoring system across all its certification exams. All raw scores are converted to a scale of 0–1,000, and the passing score is 700. This scaled score remains constant regardless of which exam form is administered. Candidates who do not pass will receive a score between 0 and 699 along with diagnostic feedback by domain.
The ISSEP is one of three advanced concentration certifications that build on the CISSP (alongside ISSAP and ISSMP), positioning holders at the senior technical specialist level in the security engineering discipline. It is directly recognized under U.S. DoD Directive 8140, making it a qualifying credential for roles within the Department of Defense, federal agencies, and defense contractors—where formal credential requirements for security engineering positions are mandated. Professionals holding the ISSEP are typically employed as senior systems engineers, information assurance officers, or lead security architects on complex government and critical infrastructure programs.
According to industry salary surveys, CISSP concentration holders, including ISSEP, consistently command salaries above the standard CISSP baseline, with senior security engineers in government contracting and defense sectors earning between $130,000 and $180,000 annually depending on clearance level and location. Both ZDNet and Network World have recognized the ISSEP as one of the most valuable technology certifications. With fewer than 1,500 ISSEP holders worldwide as of recent counts, the credential remains rare and highly differentiated, offering a strong competitive advantage in the federal and defense cybersecurity market.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 850 questions.
1. An incident response team follows NIST SP 800-61 Rev 2 to manage a ransomware attack affecting 200 workstations. The team completed Preparation and Detection and Analysis phases. Malware has been identified and isolated on affected systems. The team must now eliminate the threat, restore systems to operational status, and confirm malicious presence is removed. Which incident response phase should the team execute? (Select one!)
Explanation
SP 800-61 Rev 2 defines four incident response phases: Preparation, Detection and Analysis, Containment Eradication and Recovery, and Post-Incident Activity. After detecting and analyzing the incident, the Containment Eradication and Recovery phase includes three activities: containing the threat (already completed via isolation), eradicating the threat by removing malware and restoring system integrity, and recovering systems to normal operational status while confirming malicious presence is eliminated. Post-Incident Activity occurs after systems are recovered to capture lessons learned and improve processes. Detection and Analysis is already complete with malware identified. Preparation occurs before incidents and while procedures can be updated afterward, the immediate priority is eradication and recovery.
2. An acquisition program office establishes configuration management processes for a weapons system development effort. The program has completed Preliminary Design Review and approved the Allocated Baseline. A supplier proposes a change to the radar subsystem that improves detection range by 15 percent but requires modifications to the antenna mount affecting form, fit, and function of three interfacing subsystems. Which configuration management function and change classification apply? (Select one!)
Explanation
Configuration Control is the function that manages changes through the Configuration Control Board. Changes affecting form, fit, or function of baselined items are Class I changes requiring formal CCB review and approval, particularly after a baseline has been established. This change affects multiple interfacing subsystems and alters physical characteristics. Class II changes are minor and do not affect form/fit/function. Configuration Status Accounting records and reports change status but does not process changes. Configuration Verification and Audit verifies conformance to baselines but does not approve changes; FCA occurs at a later phase to verify requirements are met.
3. A project manager develops cost estimates for implementing security controls across a 36-month system development program. The manager must use multiple estimation techniques to validate budget accuracy. Which cost estimation methods are commonly used in systems security engineering? (Select two!)
Multiple correct answersExplanation
Parametric modeling and bottom-up estimation are standard cost estimation methods in systems engineering per PMBOK and INCOSE SEH. Parametric modeling uses statistical relationships between historical data and cost drivers. Bottom-up estimation aggregates detailed costs from work breakdown structure components. Blockchain consensus, genetic algorithms, and neural networks are not recognized cost estimation methods in PMBOK 5th edition or traditional systems engineering practice, though machine learning may be used as supporting analytical tools.
4. A security engineer evaluates FIPS 140-3 validated cryptographic modules for protecting classified information at rest. The requirement specifies tamper-resistance with physical protection against invasive attacks and identity-based authentication. Which FIPS 140-3 security level must the module meet? (Select one!)
Explanation
FIPS 140-3 Level 3 requires physical tamper-resistance (attempts to physically access trigger zeroization), identity-based authentication (specific individuals, not just roles), and protection against invasive physical attacks. Level 1 requires only approved algorithms with no physical security requirements. Level 2 requires tamper-evidence (detection but not prevention) and role-based authentication (operator vs. administrator). Level 4 adds environmental failure protection (temperature, voltage) and complete physical envelope protection, which exceeds the stated requirements.
5. A security assessment team performs control assessment using NIST SP 800-53A Rev 5 methodology. The assessors review firewall configuration files and access control lists to verify implementation. They conduct this assessment with comprehensive coverage examining all firewall rules across all network segments. Which assessment method and attributes are being applied? (Select one!)
Explanation
Reviewing configuration files and access control lists constitutes the Examine method, which assesses specifications, mechanisms, and activities through documentation review. Comprehensive coverage means examining all instances across all network segments rather than a sample. Detailed depth indicates thorough analysis of the examined artifacts. Test method would involve actively executing the firewall mechanisms. Interview method would involve discussing practices with personnel. Focused depth and representative coverage would indicate sampling rather than complete examination.
One-time access to this exam