Question 1 of 20 Domain
0%

Exam Complete!

You answered 0 out of 20 questions correctly

Ready for the Complete Exam?

Get access to all 1,500 practice questions across 12 full practice exams

About the ISSEP Exam

The Information Systems Security Engineering Professional (ISSEP) is one of three CISSP concentration credentials offered by ISC2, designed for CISSPs who specialize in applying engineering principles and processes to achieve system security. Unlike ISSAP (which focuses on security architecture design) or ISSMP (which focuses on security management), ISSEP validates expertise in the discipline of Systems Security Engineering (SSE)—the systematic application of engineering processes to identify and address security risks throughout the engineering lifecycle of complex systems. ISSEP is particularly valued in U.S. federal government, defense, intelligence community, and critical infrastructure environments where formal systems engineering processes are integral to acquisition and development programs.

The ISSEP exam consists of 125 questions to complete in 3 hours, with a passing score of 700 out of 1000. The exam costs $599 USD and requires an active CISSP certification—there is no path to ISSEP without first holding CISSP. The concentration is grounded in NIST Special Publication 800-160 (Systems Security Engineering), which defines the processes and considerations for engineering trustworthy, secure systems. ISSEP holders typically work as systems security engineers, information assurance engineers, senior security engineers on complex government programs, or technical leads on defense acquisition programs requiring formal SSE processes.

ISSEP 5 Domains and Weighting:

  • Domain 1: Systems Security Engineering Foundations (15%) - Systems security engineering concepts and principles (NIST SP 800-160), applying engineering problem-solving to security challenges, system lifecycle models (waterfall, spiral, agile, DevSecOps), system stakeholder requirements and needs analysis, systems thinking applied to security problems, and the relationship between systems engineering and systems security engineering processes
  • Domain 2: Risk Management (19%) - Applying risk management to systems engineering processes, integrating NIST Risk Management Framework (SP 800-37) with systems engineering lifecycle, threat analysis (threat identification, threat modeling, threat assessment), vulnerability analysis in system engineering contexts, risk assessment methodologies appropriate for complex engineered systems, and residual risk management and authorization decisions
  • Domain 3: Security Planning, Design and Implementation (23%) - Translating security requirements into system design specifications, applying security design principles to complex systems (defense in depth, fail-safe defaults, economy of mechanism), security-relevant hardware and software component selection, implementing security in system interfaces and interconnections, integrating common controls and inherited security capabilities, and managing security during system integration and test
  • Domain 4: Secure Operations, Maintenance and Disposal (21%) - Operating and maintaining system security throughout the operational lifecycle, configuration management with security impact analysis, security monitoring and continuous assessment of operational systems, managing security patches and updates for complex systems, incident response for engineered systems, secure decommissioning and disposal of systems and sensitive components (e.g., cryptographic modules, media)
  • Domain 5: Systems Security Engineering Technical Management (22%) - Managing technical security in program and project contexts, security planning and documentation for acquisition programs, security requirements traceability and verification, independent validation and verification (IV&V) for security, security testing and evaluation (ST&E) in formal acquisition programs, and managing security activities in contractor and subcontractor relationships

ISSEP is maintained in conjunction with CISSP, with ISSEP CPE credits counting toward CISSP renewal. The concentration carries particular prestige in U.S. government and defense contractor communities where it is recognized under DoD Directive 8570.01-M for certain senior technical security roles. ISSEP holders often serve as the primary technical security authority on major acquisition programs, providing the engineering-based security analysis and documentation required for formal system authorization.

Why Take This Certification?

  • Recognized Under DoD 8570 for Senior Technical Security Roles: ISSEP is recognized by the U.S. Department of Defense under DoD Directive 8570.01-M for Information Assurance Technical (IAT) Level III roles and certain Information Assurance Management (IAM) roles, making it directly applicable for DoD positions requiring the highest technical security credentials. For security professionals working in defense contracting, intelligence community programs, or federal civilian agencies with formal security engineering requirements, ISSEP provides the specific credential that satisfies program security requirements that CISSP alone does not address.
  • Validates Formal Systems Security Engineering for Complex Programs: Many high-stakes systems—weapons systems, critical infrastructure control systems, national security systems, large enterprise IT programs—require formal systems engineering processes to achieve security assurance. NIST SP 800-160 (Systems Security Engineering) defines the processes, practices, and considerations for engineering trustworthy systems, and ISSEP validates mastery of applying these processes. For security engineers on programs where informal security approaches are insufficient, ISSEP demonstrates the rigorous engineering discipline that formal acquisition programs and high-assurance system development require.
  • Critical Infrastructure and OT Security Demand is Growing: Operational Technology (OT) security—protecting industrial control systems (ICS), SCADA systems, power grids, water treatment facilities, and manufacturing systems—requires engineering-based security approaches that differ significantly from IT security. ISSEP's grounding in systems engineering processes and risk analysis methodologies applicable to complex, long-lifecycle systems makes ISSEP holders well-positioned for OT/ICS security engineering roles. As critical infrastructure protection becomes a national security priority and regulatory requirements (TSA security directives, CISA advisories, NERC CIP) expand, the demand for security engineers who understand both the engineering and security disciplines is growing rapidly.
  • Distinguished Technical Credential for Defense and Intelligence Professionals: In the U.S. defense and intelligence community, technical security credentials carry significant weight in career advancement and program staffing decisions. ISSEP demonstrates that a CISSP has developed deep technical security engineering expertise beyond the management and governance knowledge that CISSP validates. For security engineers aspiring to chief engineer roles, program security officer positions, or senior technical advisory roles on major defense acquisition programs, ISSEP provides the specialized credential that differentiates candidates in competitive program staffing evaluations.

What You'll Learn in the ISSEP Exam

The ISSEP exam tests mastery of Systems Security Engineering (SSE) processes and their application to complex system development, acquisition, operation, and disposal. The exam builds directly on CISSP foundational knowledge, applying security principles within formal engineering processes rather than in IT administration or governance contexts. Candidates must demonstrate understanding of how security requirements are derived from threat analysis, how they flow through design and implementation, how they are verified through testing and evaluation, and how they are maintained throughout the operational life of complex systems. NIST SP 800-160 is the primary reference framework.

Systems Security Engineering Foundations and Risk Management

  • SSE Process and NIST SP 800-160: Understanding the Systems Security Engineering (SSE) processes defined in NIST SP 800-160 Volume 1 and 2, applying SSE processes throughout system lifecycle models (from concept through disposal), understanding how SSE integrates with overall systems engineering (SE) processes, applying security-relevant engineering problem-solving approaches, and understanding the role of assurance and trustworthiness as system security objectives distinct from simple functionality requirements.
  • Threat and Risk Analysis in Engineering Contexts: Conducting structured threat analysis to identify adversary capabilities, intentions, and potential attack paths against complex systems, performing vulnerability analysis that considers system components, interfaces, and operational environments, applying risk quantification approaches appropriate for complex engineered systems, integrating risk management throughout system lifecycle decisions (design trade-offs, testing priorities, operational monitoring), and developing residual risk positions that support system authorization decisions.
  • Security Planning and Technical Management: Developing system security plans and security concept of operations (CONOPS) for complex programs, managing security requirements traceability from stakeholder needs through design to test verification, planning and executing Security Test and Evaluation (ST&E) activities, supporting formal Authorization to Operate (ATO) decisions with technical security documentation, and managing security in contractor and subcontractor relationships through security requirements in contracts and oversight of contractor security activities.

System Design, Operations, and Disposal

  • Security-Relevant Design Implementation: Translating security requirements into hardware and software design specifications, applying security design principles to complex multi-component systems, managing security at system interfaces and interconnections (cross-domain solutions, data guards, protocol converters), selecting and specifying security-relevant hardware components (cryptographic modules per FIPS 140-3, hardware security modules), and implementing common controls and inherited security capabilities in the system security design.
  • Secure Operations and Maintenance: Establishing security monitoring programs for operational systems that extend beyond IT monitoring to include system-level security metrics, managing configuration changes in operational systems with formal security impact analysis, coordinating security patch management for complex systems with long patching cycles and availability requirements, supporting security-relevant incident investigations with forensic capabilities appropriate for complex engineered systems, and managing security during system upgrades and modifications that may affect security posture.
  • Secure Decommissioning and Disposal: Planning and executing secure decommissioning processes for systems containing sensitive information or classified components, managing cryptographic key material during system disposal (key zeroization procedures, COMSEC material accountability), disposing of storage media in accordance with NSA/CSS Policy Manual 9-12 and NIST SP 800-88 (Guidelines for Media Sanitization), decommissioning cryptographic hardware per FIPS 140 requirements, and maintaining documentation of disposal activities for audit and accountability purposes.

How to Prepare for the ISSEP Exam

ISSEP preparation typically requires 3-5 months for active CISSPs with systems security engineering experience. The exam is notably specialized—with heavy emphasis on NIST SP 800-160 SSE processes and formal engineering approaches to security—making it less accessible to candidates without genuine systems engineering or formal acquisition program experience. Candidates from DoD, intelligence community, or defense contractor backgrounds who have worked on formal acquisition programs often find the exam validates skills they apply regularly. Candidates with general IT security backgrounds who lack systems engineering experience must invest significantly more time in learning SSE processes and formal engineering frameworks.

  1. Master NIST SP 800-160 and the Official ISSEP Study Guide (4-6 weeks): Unlike most certifications where study guides are primary resources, for ISSEP the direct study of NIST SP 800-160 (Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems) is essential. Read Volume 1 (the main publication) carefully, paying attention to the SSE processes (stakeholder needs and requirements definition, system requirements definition, architecture definition, design definition, system analysis, implementation, integration, verification, transition, operation, maintenance, and disposal) and how security considerations are integrated into each process. Study the Official ISC2 ISSEP Study Guide as your framework text, using SP 800-160 as the authoritative reference for process details.
  2. Review DoD Security Engineering Documentation and Processes (3-4 weeks): ISSEP has a strong DoD acquisition program orientation. Review DoD security engineering resources: the DoD Cybersecurity Policy Chart, Defense Acquisition University (DAU) cybersecurity materials, the Program Protection Plan (PPP) framework, and the Risk Management Framework implementation guidance for DoD programs (DoDI 8510.01). Understanding how formal acquisition programs implement security requirements—from program protection planning through test and evaluation working groups (TEWGs) to Authorizations to Operate—provides the practical context that makes ISSEP exam scenarios more intuitive. If you have experience with defense acquisition programs, review relevant program security documentation to connect your experience to the ISSEP domain framework.
  3. Complete Practice Questions with SSE Process Focus (3-4 weeks): Work through at least 500 practice questions, focusing particularly on Domain 3 (Security Planning, Design and Implementation, 23%) and Domain 5 (Technical Management, 22%), which together represent 45% of the exam. ISSEP questions frequently test knowledge of SSE process sequence, documentation artifacts (system security plans, security concept of operations, ST&E plans, risk assessment reports), and the technical management activities required for formal acquisition programs. Track performance by domain and spend additional study time on domains scoring below 70%. Many candidates find Domain 1 (SSE Foundations) questions about NIST SP 800-160 process theory most challenging if they lack direct SSE practice experience.
  4. Review Secure Disposal, Cryptographic Module Management, and Recent SSE Developments (final 2 weeks): In the final preparation phase, ensure strong preparation in Domain 4 (Secure Operations, Maintenance and Disposal)—particularly NIST SP 800-88 media sanitization guidelines, FIPS 140-3 cryptographic module requirements and lifecycle management, and NSA COMSEC material accountability procedures. These topics are specialized enough that many candidates underinvest in them. Review NIST SP 800-160 Volume 2 (Developing Cyber-Resilient Systems: A Systems Security Engineering Approach), which introduces the cyber resiliency engineering framework increasingly referenced in ISSEP content. Take 2-3 full-length timed practice exams and target 75%+ before scheduling. Review the official ISC2 ISSEP certification page.

ISSEP is the most specialized of the CISSP concentrations and the most directly applicable to U.S. government, defense, and critical infrastructure security engineering careers. It rewards professionals who combine CISSP's broad security foundation with formal systems engineering discipline and practical experience on complex acquisition or critical infrastructure programs. Budget 150-250 hours of focused study, with significant investment in NIST SP 800-160 and DoD acquisition security frameworks that form the core of the ISSEP Body of Knowledge.

Frequently Asked Questions

No. All Nex Arc practice questions are original content created by certified professionals based on official exam guides and publicly available documentation. We do not offer brain dumps, leaked questions, or actual exam content. Using or distributing real exam questions violates certification provider agreements and can result in certification revocation. Our questions are designed to test the same knowledge and skills as the real exam, using different scenarios and wording.
The ISSEP exam consists of 125 multiple-choice questions to complete in 3 hours. Each question has one correct answer. The exam uses a scaled scoring model with a passing score of 700 out of 1000. Our premium course includes 1,500 practice questions across 12 full practice exams with detailed explanations.
The passing score is 700 out of 1000 on a scaled scoring model. ISSEP focuses heavily on NIST SP 800-160 SSE processes, risk management in engineering contexts, and technical management for acquisition programs. Candidates with formal systems security engineering or DoD acquisition program experience find the exam validates familiar work contexts.
Click on the "Buy Now" button in the sidebar to purchase the complete course. After payment, you'll have instant access to all 12 practice exams with 1,500 questions with detailed explanations and lifetime access.
ISSEP requires an active, current CISSP certification. You cannot sit for ISSEP without first earning and maintaining CISSP. This is a firm prerequisite with no exceptions—ISSEP is specifically designed as a CISSP concentration for CISSPs specializing in systems security engineering. There is no additional work experience requirement beyond what CISSP already requires (5 years), but practical systems engineering or acquisition program experience is strongly correlated with ISSEP exam success.
The ISSEP certification is valid for 3 years, aligned with the CISSP renewal cycle. ISSEP CPE credits count toward the CISSP 120-credit requirement, so you do not need separate CPE efforts for each credential. An active CISSP is required to maintain ISSEP status—if CISSP lapses, ISSEP automatically becomes inactive as well. Maintaining CISSP through annual maintenance fees and CPE requirements automatically supports ISSEP maintenance.
The ISSEP exam costs $599 USD. If you don't pass on your first attempt, you must wait 30 days before retaking. After the second failed attempt, wait 90 days. After the third failed attempt, wait 180 days (6 months). There is no limit to the number of attempts, but you pay the full $599 fee for each attempt. ISC2 does not offer refunds. Given the specialized nature of ISSEP and its strong DoD/defense community orientation, candidates with direct systems security engineering experience have significantly higher first-attempt pass rates.
The three CISSP concentrations represent distinct specializations: ISSEP (Engineering Professional) is for CISSPs specializing in applying formal engineering processes and NIST SSE frameworks to achieve security in complex systems—most valuable in DoD, defense contracting, intelligence community, and critical infrastructure sectors. ISSAP (Architecture Professional) is for CISSPs specializing in enterprise security architecture design—most valuable in large enterprises, financial institutions, and technology companies building comprehensive security architectures. ISSMP (Management Professional) is for CISSPs specializing in security program leadership and organizational governance—most valuable for those in CISO, security director, or security program management roles. Choose ISSEP if your work involves formal engineering disciplines, government acquisition programs, or critical infrastructure security engineering. Choose ISSAP if your work centers on designing security architectures. Choose ISSMP if your work centers on managing security programs and teams.
Loading...