ISC2 • ISSEP
Validates specialized expertise in security engineering, covering systems security engineering, security engineering principles, risk management, technical management, and the integration of security into the systems development lifecycle using the ISSE process.
Questions
850
Duration
180 minutes
Passing Score
700/1000
Difficulty
SpecialtyLast Updated
Feb 2026
The Information Systems Security Engineering Professional (ISSEP) is an advanced concentration certification offered by ISC2, developed in collaboration with the U.S. National Security Agency (NSA). It validates deep competency in applying systems engineering principles to the design, development, and operation of secure systems throughout the entire system lifecycle. Holders demonstrate the ability to analyze organizational security needs, define security requirements, design security architectures, and support authorization activities across government and commercial sectors.
Effective August 1, 2025, ISC2 updated the ISSEP exam outline based on a triennial Job Task Analysis (JTA), revising domain weights and introducing new objectives covering Zero Trust architectures, DevSecOps practices, supply chain risk management (SCRM), and model-based systems engineering (MBSE) references. The certification is accredited by ANAB under ISO/IEC 17024 and is approved by the U.S. Department of Defense under DoD 8140, making it especially authoritative for professionals working in federal, defense, and intelligence environments.
The ISSEP is designed for senior security professionals who specialize in the intersection of systems engineering and information security. Relevant roles include Senior Systems Engineer, Information Assurance Systems Engineer, Information Assurance Officer, Information Assurance Analyst, and Senior Security Analyst. It is particularly well-suited for professionals working on large-scale government, defense, or critical infrastructure programs where formal engineering processes and authorization frameworks (such as the NIST Risk Management Framework) are mandatory.
Candidates typically come from backgrounds in systems engineering, enterprise security architecture, or defense contracting, and are seeking to formally validate their expertise in engineering secure systems from requirements through decommissioning. Given its NSA origins and DoD 8140 recognition, the ISSEP is especially valued by professionals pursuing or holding roles requiring formal security engineering credentials within federal agencies and defense contractors.
The primary prerequisite path requires candidates to hold an active CISSP credential in good standing, plus two years of cumulative, full-time professional work experience in one or more of the five ISSEP exam domains. This makes the ISSEP a post-CISSP concentration rather than a standalone entry-level certification.
For candidates without the CISSP, a minimum of seven years of cumulative, full-time experience in two or more of the ISSEP domains is required. A post-secondary degree in computer science, information technology, or a related field—or an additional ISC2-approved credential—may satisfy one year of the experience requirement, though no more than one year may be waived. Part-time work and qualifying internships may count toward the experience total. Recommended knowledge includes familiarity with NIST SP 800-160 (Systems Security Engineering), NIST SP 800-37 (Risk Management Framework), ISO/IEC 27001, INCOSE Systems Engineering Handbook, and PMBOK project management concepts.
The ISSEP exam consists of 125 scored items and must be completed within 3 hours (180 minutes). Questions include multiple-choice and advanced item types (such as drag-and-drop or hotspot items). The exam is delivered in English only and is administered exclusively through Pearson VUE testing centers; it is not available as an online proctored exam. There are no unscored/survey questions disclosed by ISC2 for this exam format.
ISC2 uses a scaled scoring system across all its certification exams. All raw scores are converted to a scale of 0–1,000, and the passing score is 700. This scaled score remains constant regardless of which exam form is administered. Candidates who do not pass will receive a score between 0 and 699 along with diagnostic feedback by domain.
The ISSEP is one of three advanced concentration certifications that build on the CISSP (alongside ISSAP and ISSMP), positioning holders at the senior technical specialist level in the security engineering discipline. It is directly recognized under U.S. DoD Directive 8140, making it a qualifying credential for roles within the Department of Defense, federal agencies, and defense contractors—where formal credential requirements for security engineering positions are mandated. Professionals holding the ISSEP are typically employed as senior systems engineers, information assurance officers, or lead security architects on complex government and critical infrastructure programs.
According to industry salary surveys, CISSP concentration holders, including ISSEP, consistently command salaries above the standard CISSP baseline, with senior security engineers in government contracting and defense sectors earning between $130,000 and $180,000 annually depending on clearance level and location. Both ZDNet and Network World have recognized the ISSEP as one of the most valuable technology certifications. With fewer than 1,500 ISSEP holders worldwide as of recent counts, the credential remains rare and highly differentiated, offering a strong competitive advantage in the federal and defense cybersecurity market.
1. A defense contractor is implementing systems security engineering for a national security system following NIST SP 800-160. The security architect needs to ensure the reference monitor implementation satisfies all required properties. Which three properties must the security kernel demonstrate to be a valid reference monitor implementation? (Select three!)
Select all that apply2. An organization is categorizing a new financial management system under FIPS 199. Impact analysis determines confidentiality impact is Moderate, integrity impact is High, and availability impact is Low. The system will process classified information and is designated as a National Security System. What is the correct security categorization for this system? (Select one!)
3. A system owner is implementing the Risk Management Framework and has completed control selection. The Authorizing Official reviews the authorization package and identifies residual risks that exceed the organization's risk tolerance level but are necessary for critical mission functions. What action should the AO take? (Select one!)
4. A systems engineer is designing a multi-level secure system that must enforce mandatory access control for classified information. The system requires strict confidentiality protection following the Bell-LaPadula model. Which two security properties must the implementation enforce? (Select two!)
Select all that apply5. An enterprise architect is selecting a cloud service for a federal agency under FedRAMP. The system processes information where confidentiality requires High impact protection, integrity requires Moderate impact protection, and availability requires Low impact protection. Which FedRAMP baseline must the cloud service provider implement? (Select one!)
All exams included • Cancel anytime