CSSLP Exam Outline-V1013
CSSLP Exam Outline-V1013
CSSLP Exam Outline-V1013
The broad spectrum of topics included in the CSSLP Common Body of Knowledge (CBK) ensure its relevancy
across all disciplines in the field of information security. Successful candidates are competent in the following
eight domains:
Experience Requirements
A candidate is required to have a minimum of 4 years of cumulative paid full-time Software Development
Lifecycle (SDLC) professional work experience in 1 or more of the 8 domains of the (ISC)2® CSSLP CBK, or 3
years of cumulative paid full-time SDLC professional work experience in 1 or more of the 8 domains of the
CSSLP CBK with a 4-year degree leading to a Baccalaureate, or regional equivalent in Computer Science,
Information Technology (IT) or related fields.
If you don’t have the required experience to become a CSSLP, you may become an Associate of (ISC)²
by successfully passing the CSSLP examination. You will then have 5 years to earn the 4 years required
experience.
Accreditation
CSSLP meets the stringent requirements of ANSI/ISO/IEC Standard 17024.
Total: 100%
»» Least privilege (e.g., access control, need-to- »» Open design (e.g., peer reviewed algorithm)
know, run-time privileges) »» Least common mechanism (e.g.,
»» Separation of duties (e.g., multi-party control, compartmentalization/isolation)
secret sharing and splitting) »» Psychological acceptability (e.g., password
»» Defense in depth (e.g., layered controls, input complexity, screen layouts)
validation, security zones) »» Leveraging existing components (e.g., common
»» Fail safe (e.g., exception handling, non-verbose controls, libraries)
errors, deny by default) »» Eliminate single point of failure
»» Economy of mechanism (e.g., single sign-on)
»» Complete mediation (e.g., cookie management,
session management, caching of credentials)
»» Functional
»» Non-functional
»» Policy decomposition (e.g., internal and external requirements)
»» Legal, regulatory, and industry requirements
»» Data anonymization
»» User consent
»» Disposition
»» Understand common threats (e.g., APT, insider threat, common malware, third party/supplier)
»» Attack surface evaluation
»» Credential management (e.g., X.509 and SSO) »» Trusted computing (e.g., TPM, TCB)
»» Flow control (e.g., proxies, firewalls, protocols, »» Database security (e.g., encryption, triggers,
queuing) views, privilege management)
»» Data loss prevention (DLP) »» Programming language environment (e.g.,
CLR, JVM)
»» Virtualization (e.g., software defined network,
hypervisor) »» Operating system controls and services
»» Privacy
»» Referential integrity
»» Credentials
»» Secrets
»» Keys/certificates
»» Configurations
7.7 Perform Security Monitoring (e.g., managing error logs, audits, meeting SLAs, CIA
metrics)
Legal Info
For any questions related to (ISC)²’s legal policies, please contact the (ISC)2 Legal
Department at legal@isc2.org.
Any Questions?
(ISC)² Candidate Services
311 Park Place Blvd, Suite 400
Clearwater, FL 33759
(ISC)² Americas
Tel: +1.727.785.0189
Email: info@isc2.org
(ISC)² EMEA
Tel: +44 (0)203 300 1625
Email: info-emea@isc2.org
CSSLP Certification
v1013 Exam Outline 13