CSSLP Exam Outline November 2023 English
CSSLP Exam Outline November 2023 English
The broad spectrum of topics included in the CSSLP body of knowledge ensure its relevancy across all
disciplines in the field of cybersecurity. Successful candidates are competent in the following eight
domains:
Experience Requirements
A candidate is required to have a minimum of four years of cumulative paid SDLC professional work
experience in one or more of the eight domains of the ISC2 CSSLP outline, or three years of cumulative paid
SDLC professional work experience in one or more of the eight domains of the CSSLP outline with a four-year
degree leading to a Baccalaureate, or regional equivalent in Computer Science, Information Technology (IT)
or related fields.
If you don’t have the required experience to become a CSSLP, you may become an Associate of ISC2 by
successfully passing the CSSLP examination. You will then have five years to earn the four years required
experience. You can learn more about CSSLP experience requirements and how to account for part-time work
and internships at www.isc2.org/Certifications/CSSLP/experience-requirements.
Accreditation
CSSLP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard 17024.
Total: 100%
» Least privilege (e.g., access control, need-to-know, run-time privileges, Zero Trust)
» Segregation of Duties (SoD) (e.g., multi-party control, secret sharing, split knowledge)
» Defense in depth (e.g., layered controls, geographical diversity, technical diversity, distributed systems)
» Resiliency (e.g., fail safe, fail secure, no single point of failure, failover)
» Economy of mechanism (e.g., single sign-on (SSO), password vaults, resource efficiency)
» Complete mediation (e.g., cookie management, session management, caching of credentials)
» Open design (e.g., Kerckhoffs’s principle, peer review, open source, crowd source)
» Least common mechanism (e.g., compartmentalization/isolation, allow/accept list)
» Psychological acceptability (e.g., password complexity, passwordless authentication, screen layouts,
Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA))
» Component reuse (e.g., common controls, libraries)
2.2 Identify and adopt security standards (e.g., implementing security frameworks,
promoting security awareness)
2.5 Define security metrics (e.g., criticality level, average remediation time, complexity, Key
Performance Indicators (KPI), objectives and key results)
» End of Life (EOL) policies (e.g., credential removal, configuration removal, license cancellation, archiving,
service-level agreements (SLA))
» Data disposition (e.g., retention, destruction, dependencies)
2.7 Create security reporting mechanisms (e.g., reports, dashboards, feedback loops)
» Regulations, standards and guidelines (e.g., International Organization for Standardization (ISO), Payment
Card Industry (PCI), National Institute of Standards and Technology (NIST), Open Web Application Security
Project (OWASP), Software Assurance Forum for Excellence in Code (SAFECode), Software Assurance
Maturity Model (SAMM), Building Security in Maturity Model (BSIMM))
» Legal (e.g., intellectual property, breach notification)
» Risk management (e.g., risk assessment, risk analysis)
» Technical risk vs. business risk
» Regulatory authority
» Legal
» Industry-specific (e.g., defense, healthcare, commercial, financial, Payment Card Industry (PCI))
» Company-wide (e.g., development tools, standards, frameworks, protocols)
» User provisioning
» Service accounts
» Reapproval process
4.7 Define secure operational architecture (e.g., deployment topology, operational interfaces,
Continuous Integration and Continuous Delivery (CI/CD))
5.3 Implement security controls (e.g., watchdogs, file integrity monitoring, anti-malware)
6.3 Verify and validate documentation (e.g., installation and setup instructions, error
messages, user guides, release notes)
6.5 Analyze security implications of test results (e.g., impact on product management,
prioritization, break/build criteria)
» Hardware
» Baseline configuration
» Version control/patching
» Documentation practices
» Secure Continuous Integration and Continuous Delivery (CI/CD) pipeline (e.g., DevSecOps)
» Application security toolchain
» Build artifact verification (e.g., code signing, hashes)
» Credentials
» Secrets
» Keys/certificates
» Configurations
» Incident triage
» Forensics
» Remediation
» Root cause analysis
7.11 Incorporate runtime protection (e.g., Runtime Application Self Protection (RASP),
web application firewall (WAF), Address Space Layout Randomization (ASLR), dynamic
execution prevention)
» Certifications
» Assessment reports (e.g., cloud controls matrix)
» Origin and support
8.4 Ensure and verify supplier security requirements in the acquisition process
8.5 Support contractual requirements (e.g., intellectual property ownership, code escrow,
liability, warranty, End-User License Agreement (EULA), service-level agreements (SLA))
Legal Info
For any questions related to ISC2’s legal policies, please contact the ISC2 Legal
Department at [email protected].
Any Questions?
Contact ISC2 Candidate Services in your region:
Americas
Tel: +1-866-331-4722
Email: [email protected]
Asia-Pacific
Tel: +852-5803-5662
China: +86-10-5873-2896
Japan: +81-3-5322-2837
Email: [email protected]
v7/2023 16