You’ve made an intelligent choice to aim for CISSP as your next certification, but the sheer volume of CISSP study materials can be intimidating. CISSP study guides can also be overwhelming. Moreover, the CISSP exam is long, and you need a brief outline to help you remember how to tie all the exam concepts together.
The good news is, you’ve come to the right place: this CISSP cheat sheet is the brief outline you need. We’ve drawn a roadmap of top ideas to help you navigate this challenging certification. It highlights the concepts which are the foundations of the other concepts.
We hope this CISSP exam cheat sheet helps you prepare well for this examination wherever you are in your cyber security career. Download this cheat sheet here and let’s get started.
CISSP Cheat Sheet Search
Search our CISSP cheat sheet to find the right cheat for the term you're looking for. Simply enter the term in the search bar and you'll receive the matching cheats available.
What is the CISSP Certification?
Certified Information Systems Security Professional (CISSP) is a highly sought-after information security certification developed by (ISC)2, an abbreviation for the nonprofit “International Information System Security Certification Consortium.”
To become CISSP-certified, you need to:
- Pass the CISSP examination to become an Associate;
- Submit the required documentation showing you have cumulative paid full-time work experience of five years, or four years plus proof of having gained a four-year tertiary degree or (ISC)2-approved credential; and
- Get endorsed by a member of (ISC)2.
Find the details on CISSP work experience requirements here.
The following diagram illustrates the eight domains of the CISSP Common Body of Knowledge (CBK).
Here is an overview of the two CISSP exam formats available:
|Dynamic; Computerized Adaptive Testing (CAT)
✔ Spanish (Modern)
✔ Simplified Chinese
|Number of questions
|Can I change answers to earlier questions?
The passing mark is 700 out of 1000, and you can only take the examination on a computer via Pearson VUE. The exam consists of multiple-choice (four options, one correct answer) and scenario-based questions. As CISSP is a long examination, candidates may take breaks but won’t get compensation in the form of extra exam time.
Remember to pick up (ISC)2’s CISSP Ultimate Guide and Exam Action Plan.
We’ve broken down the concepts and terms of the CBKs below. You may find the latest updates on the exam here. Remember to check out our Security+ cheat sheet, as both syllabi have overlapping concepts.
Security and Risk Management
This domain is the basis for all other domains, covering fundamental risk mitigation, legal and regulatory issues, professional ethics, and security concepts in an organizational context.
|Confidentiality, Integrity, Availability
|Disclosure, Alteration, Destruction
|Identification and Authentication, Authorization and Accountability
|Minimum necessary access
|Need to know
|Just enough data to do your job
|One cannot deny having done something
|Payment Card Industry Data Security Standard
|Operationally Critical Threat, Asset, and Vulnerability Evaluation
|Facilitated Risk Analysis Process
|Control Objectives for Information and Related Technology
|Committee of Sponsoring Organizations
|Information Technology Infrastructure Library
|Information security management system
|International Organization for Standardization
|International Electrotechnical Commission
|ISO/IEC 27000 series
|International standards on how to develop and maintain an ISMS developed by ISO and IEC
|Defense in Depth/Layered Defense/Onion Defense
|Multiple overlapping security controls to protect assets
|Who is held accountable; C-level executives (senior leadership/management) are ultimately liable
|Implementing security practices and patches
Memory aid: Do Correct
|Checking for vulnerabilities
Memory aid: Do Detect
|Opposite of due care, without which you may become liable
|General Data Protection Regulation
|Health Insurance Portability and Accountability Act
|Electronic Communications Privacy Act
|USA PATRIOT ACT
|2001 legislation expanding law enforcement electronic monitoring
|Computer Fraud and Abuse Act—Title 18 Section 1030 for prosecuting computer crimes
|Sarbanes-Oxley Act (2002)
|Red team, blue team, purple team, etc.
|(Refer to graphic below)
Check out our articles on cyber security rules and regulations here.
What do terms like “red team” and “blue team” mean in penetration testing?
The primary colors red, blue, and yellow refer to attackers, defenders, and builders of a system respectively. The secondary colors are combinations of these roles. For example, purple team members have dual attack/defense roles. The white team supervises the hack.
Key concepts involving data and information are here.
|Data at rest
|On computer storage
|Data in use/processing
|In RAM being accessed
|Data in transit/motion
|Traveling along cables or broadcasting wirelessly
|Digital Rights Management
|Cloud Access Security Broker
|Data Loss Prevention
|Preserve storage hardware
|Full physical destruction
|Destroy storage hardware
Security Architecture and Engineering
Here we focus on the most important methods to protect our assets.
Secure architecture and design
A well-designed computer system/network can deter many attacks.
|• What/data, How/function, Where/network, Who/people, When/time, and Why/motivation
• Planner, Owner, Designer, Builder, Implementer, and Worker
|The Open Group Architecture Framework
|Department of Defense Architecture Framework
|Ministry of Defence Architecture Framework
|Sherwood Applied Business Security Architecture
|The Red Book
|Trusted Network Interpretation (TNI); part of a Rainbow Series
|The Orange Book
|The Trusted Computer System Evaluation Criteria (TCSEC); part of a Rainbow Series
|Type 1 hypervisor
|Bare or native metal
|Type 2 hypervisor
|App-like virtual machine on the operating system
|Infrastructure as a service
|Platform as a service
|Software as a service
“A cryptographic system should be secure even if everything about the system, except the key, is public knowledge.”—Auguste Kerckhoffs, cryptographer
• key length
• block size
• number of rounds
• Diffie-Hellman key exchange
• Elliptic-curve cryptography
|One-way, deterministic process of transforming a string of characters into another
|Characters appended to a string (e.g., password) before hashing
|Hide data inside other data
|Exploit quantum mechanics
|Secure against cryptanalysis by quantum computer
|Trying character combinations
Variant: spraying (trying the same password across different accounts)
|Using lists of probable passwords
|Using pre-calculated password hashes
|Method that strengthens weak passwords
A given physical security measure can fall into one or more categories below.
|For preventing attacks, e.g., tall fences, locked doors, bollards
|For detecting attacks, e.g., CCTV, alarms
|For obstructing an attack, e.g., fences, security guards, dogs, lights, warning signs.
|To compensate for other controls, e.g., locks, alarms, sensors, shock absorbers in data center
|Compliance, policies, procedures, staff training, etc.
Communication and Network Security
Here, we cover network and communications concepts that warrant review and how to protect such channels.
|Send/receive one at a time only
|One channel, send one signal at a time
|Multiple channels, send/receive many signals at a time
|Open Systems Interconnect:
2. Data Link
Memory aid: Please Do Not Throw Sausage Pizza Away
|Address Resolution Protocol
|Network Address Translation
|Port Address Translation
|Dynamic Host Configuration Protocol
|Protocol for Carrying Authentication for Network Access
|Serial Line Internet Protocol
|Demilitarized zone (screened subnet):
• External network
• External router
• Perimeter network
• Internal router
• Internal network
Learn more about ports and protocols with our Common Ports Cheat Sheet here.
Identity and Access Management (IAM)
Logical and physical controls, identity-related services, and access control attacks comprise this domain.
|False rejection rate
|False acceptance rate
|Crossover error rate/equal error rate
|Identity as a Service
|Ticketing-based authentication protocol
|Secure European System for Applications in a Multi-vendor Environment
|Remote Authentication Dial-In User Service
|Terminal Access Controller Access Control System
|TACACS with separate authentication, authorization, and auditing processes
|XTACACS plus 2FA
|Like RADIUS and TACACS+ with more flexibility
|Password Authentication Protocol
|Challenge-Handshake Authentication Protocol
Security Assessment and Testing
Penetration testing (pentesting) falls under this domain, which, being much more expansive, encompasses technical stress tests and reporting of vulnerabilities to non-technical members of the organization.
|Passively test code but not run it
|Test code during execution
|Fuzzing (Fuzz testing)
|Input random characters and expect spurious results
|Penetration testing (pentesting)
|Actively exploit vulnerabilities
|Service Organization Controls: 1, 2, and 3
This domain emphasizes the aspects of information security on management, prevention, recovery, and digital forensics.
|Business continuity plan
|Business impact analysis
|Continuity of operations
|Disaster Recovery Plan
|Mean time between failures
|Mean time to failure
|Mean time to repair
|Recovery time objective
|Recovery point objective
|Security information and event management
|Privileged Account/Access Management
|User and Entity Behavior Analytics
|Exact real-time copies of database/files to another location
|Electronic Vaulting (E-vaulting)
|Make remote backups at certain intervals or when files change
|Sends transaction log files to a remote location, not the files themselves
|Ways to minimize insider threats
|• Least privilege
• Need to know
• Separation of duties
• Job rotation
• Mandatory vacations
• Presentation in Court
• Court decision
• Real evidence
• Evidence integrity
• Chain of custody (to prove the integrity of the data)
○ Who handled it?
○ When did they handle it?
○ What did they do with it?
○ Where did they handle it?
|Disk-based forensic data
|• Allocated space
• Unallocated space
• Slack space
• Bad blocks/clusters/sectors
* This step is for real-world job settings only. It’s outside the CISSP exam syllabus, but in practice, the more thoroughly an organization equips its team for security incidents, the better it handles problems and the faster it recovers from them.
Software Development Security
Building security controls into software applications is a new best practice in cyber security, and a CISSP needs to know how to secure software during its development.
|End-User License Agreement
|Software development life cycle:
|Continuous Integration/Continuous [Delivery/Deployment/Development]
|Cooperation between development, operations, and quality assurance
|DevOps plus security
|Software Development Methodologies
• Extreme Programming (XP)
• Rapid Application Development (RAD)
|Object Request Broker
|Common Object Request Broker Architecture
|Atomicity, Consistency, Isolation, and Durability
|Open Web Application Security Project; identifies top vulnerabilities
|Cross-Site Request Forgery
|Security Orchestration, Automation, and Response
|Computer system that emulates humanlike decision-making ability
|Artificial Neural Networks
We hope this CISSP exam cheat sheet provides a bird’s-eye view of the CISSP syllabus, accelerates your cyber security journey, and helps you realize your career ambitions.