Cisa I
Cisa I
APPLICANT INFORMATION
CISA applicants are required to have passed the CISA exam in the last five years. If you have not yet passed the CISA exam,
you can register online at: https://www.isaca.org/credentialing/cisa#register.
EXAM PASS YEAR: 2023
To qualify for CISA, you must have five years of information systems auditing, control, assurance or security work experience
within the past ten years of the application submission date. This experience must be in at least one CISA Job Practice
Domain Area, available to view on page V-2. If you do not meet the five-year experience requirements within Section 2A, you
may also opt to submit waivers for experience in section 2B and/or 2C (up to a maximum of three years).
Please list related work experience you are claiming below, beginning with your current or most recent position. Do not leave
dates blank. If you are currently employed, please write today’s date for the End Date.
To apply for a waiver in general information systems or general audit work, please fill out the details below. Must be minimum one
year to qualify. This experience can not have been earned during dates of employment already claimed in Section A.
Type of Experience Waiver (Select one if applicable) General Audit General Information Systems
PAGE A-1
Version V5-0723
CISA Certification Application
Applicants who Passed CISA Exam June 2019 and Later
Please use Adobe Reader when filling out this application electronically.
To apply for an education experience waiver, check the appropriate box below and enter the school information, if applicable.
*Attach a copy of your degree, transcript or letter from your college or university with the application.
**Attach a copy of your CIMA or ACCA certificate with the application.
1-year waiver for an associate degree
2-year waiver for a bachelor’s, master’s or doctorate degree in any field of study
3-year waiver for a master’s degree in Information Systems or a related field*
2-year waiver for CIMA – Chartered Institute of Management Accountants, full certification**
2-year waiver for ACCA member status from the Association of Chartered Certified Accountants**
Total experience from Sections A, B & C must be five years or more to apply for CISA certification
Using the Experience Verification Form on pages V-1 and V-2 of this application, please ask an employer to verify all
experience in Step 2. If more than one verifier is needed, you may fill out an additional application form (only pages V-1 and
V-2 are needed from the additional form).
All applicants must pay a US $50.00 Application Processing Fee before the application can be fully processed. Submit your
payment at: www.isaca.org/credentialing/cisa/verify-application-fee
PAGE A-2
Version V5-0723
CISA Certification Application
Applicants who Passed CISA Exam June 2019 and Later
Please use Adobe Reader when filling out this application electronically.
I understand that the decision as to whether I qualify for certification rests solely and exclusively with ISACA and that
the decision of ISACA is final. I have read and understand these statements and I intend to be legally bound by them.
Please submit your application and verification form(s) online at: https://isaca.force.com/support/s/application-submission.
Submitted applications take approximately two-to-three weeks to process. Upon approval, you will be notified via email. A
certification packet, including a letter of approval, a CISA Certificate, and a metal CISA pin, will be sent to you via postal mail to
the primary address in your MyISACA Profile at: www.isaca.org/myisaca. Please allow four-to-eight weeks for delivery.
PAGE A-3
Version V5-0723
CISA Experience Verification Form
Applicants who Passed CISA Exam June 2019 and Later
Please use Adobe Reader when filling out this application electronically.
APPLICANT DETAILS
The applicant (named above) is applying for CISA certification through ISACA. ISACA requires the applicant’s work experience
to be independently verified by a supervisor, manager, colleague or client with whom they have worked. Verifiers cannot be
immediate or extended family, nor can they work in the Human Resources department.
You must attest to the applicant’s work experience as noted on their attached application form (page A-1) and as described by
the CISA Domains and task statements (page V-2).
Please return the form to the applicant for their submission. For any questions, please contact ISACA at
https://support.isaca.org.
VERIFIER INFORMATION
VERIFIER QUESTIONS
1. I am attesting to the following work experience earned by the applicant, as indicated on page A- (check all that apply):
Section A: Company 1 Section A: Company 3
Section A: Company 2 Section A: Company 4
2. I am attesting to the following waivers as indicated on page A-1, sections B and/or C (check all that apply):
Section B: Work Experience Waiver Section C: Educational Degree
3. I have functioned in the following role(s) to the applicant:
Supervisor Manager
Colleague Client
4. I can also attest that the tasks performed by the applicant, as listed on page A-1 and V-2 of this form, are correct to the best
of my knowledge.
Yes No
VERIFIER AGREEMENT
I hereby confirm that the information on page A-1, V-1 and V-2 is correct to the best of my knowledge and there is no reason
this applicant should not be certified as an information systems auditor. I am also willing, if required, to answer questions from
ISACA about the above information.
VERIFIER SIGNATURE: DATE: 20 Sept 2023
A handwritten signature or verifiable digital signature is required.
PAGE V-1
Version V5-0723
CISA Experience Verification Form
Applicants who Passed CISA Exam June 2019 and Later
Please use Adobe Reader when filling out this application electronically.
Applicant is required to check any domain in which any or all tasks have been completed.
Task Statements:
• Plan audit to determine whether information systems are • Conduct audit follow-up to evaluate whether risks have been
protected, controlled, and provide value to the organization. sufficiently addressed.
• Conduct audit in accordance with IS audit standards and a risk- • Utilize data analytics tools to streamline audit processes.
based IS audit strategy. • Provide consulting services and guidance to the organization in
• Communicate audit progress, findings, results, and order to improve the quality and control of information systems.
recommendations to stakeholders.
Task Statements:
• Ensure that processes are in place to manage the lifecycle of IT • Ensure the alignment of IT resource management processes with
resources and capabilities. the enterprise’s resources management processes.
• Incorporate sourcing strategies into the framework for the • Ensure that processes are in place for the assessment and
governance of enterprise IT to ensure optimization and control. development of personnel to align with business needs.
Task Statements:
• Evaluate whether the business case for proposed changes to • Evaluate the readiness of information systems for implementation
information systems meet business objectives. and migration into production.
• Evaluate the organization’s project management policies and • Conduct post-implementation review of systems to determine
practices. whether project deliverables, controls, and requirements are met.
• Evaluate controls at all stages of the information systems
development lifecycle.
Task Statements:
• Evaluate IT operations to determine whether they are controlled • Evaluate change, configuration, release, and patch management
effectively and continue to support the organization’s objectives. policies and practices.
• Evaluate IT maintenance practices to determine whether they are • Evaluate end user computing to determine whether the processes
controlled effectively and continue to support the organization’s are effectively controlled.
objectives. • Evaluate the organization’s ability to continue business operations.
• Evaluate database management practices. • Evaluate policies and practices related to asset lifecycle
• Evaluate data governance policies and practices. management.
• Evaluate problem and incident management policies and
practices.
Task Statements:
• Evaluate the organization’s information security and privacy • Evaluate data classification practices for alignment with the
policies and practices. organization’s policies and applicable external requirements.
• Evaluate physical and environmental controls to determine • Perform technical security testing to identify potential threats and
whether information assets are adequately safeguarded. vulnerabilities.
• Evaluate logical security controls to verify the • Evaluate potential opportunities and threats associated with
confidentiality,integrity, and availability of information. emerging technologies, regulations, and industry practices.
PAGE V-2
Version V5-0723