CAP Exam Outline
CAP Exam Outline
CAP Exam Outline
The broad spectrum of topics included in the CAP Common Body of Knowledge (CBK®) ensure its relevancy
across all disciplines in the field of information security. Successful candidates are competent in the following
seven domains:
Experience Requirements
Candidates must have a minimum of two years cumulative work experience in one or more of the seven
domains of the CAP CBK.
A candidate that doesn’t have the required experience to become a CAP may become an Associate of (ISC)²
by successfully passing the CAP examination. The Associate of (ISC)² will then have three years to earn the
two year required experience. You can learn more about CAP experience requirements and how to account
for part-time work and internships at www.isc2.org/Certifications/CAP/experience-requirements.
Accreditation
CAP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard 17024.
Total: 100%
» Familiarize with governmental, organizational and international regulatory security and privacy requirements
(e.g., International Organization for Standardization (ISO) 27001, Federal Information Security Modernization
Act (FISMA), Federal Risk and Authorization Management Program (FedRAMP), General Data Protection
Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA))
» Familiarize with other applicable security-related mandates
» Identify the information types processed, stored or transmitted by the information system
» Determine the impact level on confidentiality, integrity, and availability for each information type
(e.g., Federal Information Processing Standards (FIPS) 199, International Organization for Standardization/
International Electrotechnical Commission (ISO/IEC) 27002, data protection impact assessment)
» Determine information system categorization and document results
3.4 Review and approve security plan/Information Security Management System (ISMS)
» Determine mandatory configuration settings and verify implementation in accordance with current industry
standards (e.g., Information Technology Security Guidance ITSG-33 – Annex 3A, Technical Guideline for
Minimum Security Measures, United States Government Configuration Baseline (USGCB), National Institute
of Standards and Technology (NIST) checklists, Security Technical Implementation Guides (STIGs), Center for
Internet Security (CIS) benchmarks, General Data Protection Regulation (GDPR))
» Ensure that implementation of controls is consistent with the organizational architecture and associated
security and privacy architecture
» Coordinate implementation of inherited controls with control providers
» Determine and implement compensating/alternate security controls
» Document inputs to the planned controls, their expected behavior, and expected outputs or deviations
» Verify the documented details of the controls meet the purpose, scope and risk profile of the information
system
» Obtain and document implementation details from appropriate organization entities
(e.g., physical security, personnel security, privacy)
» Compile required security and privacy documentation to support authorization/approval decision by the
designated official
» Identify potential threat and impact to operation of information system and environment
» Analyze risk due to proposed changes accounting for organizational risk tolerance
» Approve and document proposed changes (e.g., Change Control Board (CCB), technical review board)
» Implement proposed changes
» Validate changes have been correctly implemented
» Ensure change management tasks are performed
» Monitor network, physical and personnel activities (e.g., unauthorized assets, personnel and related activities)
» Ensure vulnerability scanning activities are performed
» Review automated logs and alerts for anomalies (e.g., security orchestration, automation and response)
7.3 Review supply chain risk analysis monitoring activities (e.g., cyber threat reports, agency
reports, news reports)
» Ensure response activities are coordinated with internal and external stakeholders
» Update documentation, strategies and tactics incorporating lessons learned
7.5 Revise monitoring strategies based on changes to industry developments introduced through
legal, regulatory, supplier, security and privacy updates
7.6 Keep designated officials updated about the risk posture for continuous authorization/approval