CGRC Exam Outline
CGRC Exam Outline
About CGRC
Certified in Governance, Risk and Compliance (CGRCTM) cybersecurity professionals have the knowledge and
skills to integrate governance, performance management, risk management and regulatory compliance within
the organization while helping the organization achieve objectives, address uncertainty and act with integrity.
CGRC professionals align IT goals with organizational objectives as they manage cyber risks and achieve
regulatory needs. They utilize frameworks to integrate security and privacy with the organization’s overall
objectives, allowing stakeholders to make informed decisions regarding data security and privacy risks.
The broad spectrum of topics included in the CGRC Common Body of Knowledge (CBK®) ensure its relevancy
across all disciplines in the field of information security. Successful candidates are competent in the following
seven domains:
Experience Requirements
Candidates must have a minimum of two years cumulative work experience in one or more of the seven
domains of the CGRC CBK.
A candidate that doesn’t have the required experience to become a CGRC may become an Associate of
(ISC)² by successfully passing the CGRC examination. The Associate of (ISC)² will then have three years to
earn the two year required experience. You can learn more about CGRC experience requirements and how to
account for part-time work and internships at www.isc2.org/Certifications/CGRC/experience-requirements.
Accreditation
The certification is accredited by ANAB as being in compliance with the stringent requirements of
ISO/IEC 17024:2012.
Total: 100%
Domain 1:
Information Security Risk
Management Program
1.1 Understand the foundation of an organization information security risk
management program
» Familiarize with governmental, organizational and international regulatory security and privacy requirements
(e.g., International Organization for Standardization (ISO) 27001, Federal Information Security Modernization
Act (FISMA), Federal Risk and Authorization Management Program (FedRAMP), General Data Protection
Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA))
» Familiarize with other applicable security-related mandates
Domain 2:
Scope of the Information System
» Identify the information types processed, stored or transmitted by the information system
» Determine the impact level on confidentiality, integrity, and availability for each information type
(e.g., Federal Information Processing Standards (FIPS) 199, International Organization for Standardization/
International Electrotechnical Commission (ISO/IEC) 27002, data protection impact assessment)
» Determine information system categorization and document results
Domain 3:
Selection and Approval of Security
and Privacy Controls
3.1 Identify and document baseline and inherited controls
3.4 Review and approve security plan/Information Security Management System (ISMS)
Domain 4:
Implementation of Security and
Privacy Controls
4.1 Implement selected controls
» Determine mandatory configuration settings and verify implementation in accordance with current industry
standards (e.g., Information Technology Security Guidance ITSG-33 – Annex 3A, Technical Guideline for
Minimum Security Measures, United States Government Configuration Baseline (USGCB), National Institute
of Standards and Technology (NIST) checklists, Security Technical Implementation Guides (STIGs), Center for
Internet Security (CIS) benchmarks, General Data Protection Regulation (GDPR))
» Ensure that implementation of controls is consistent with the organizational architecture and associated
security and privacy architecture
» Coordinate implementation of inherited controls with control providers
» Determine and implement compensating/alternate security controls
» Document inputs to the planned controls, their expected behavior, and expected outputs or deviations
» Verify the documented details of the controls meet the purpose, scope and risk profile of the information
system
» Obtain and document implementation details from appropriate organization entities
(e.g., physical security, personnel security, privacy)
Domain 5:
Assessment/Audit of Security and
Privacy Controls
5.1 Prepare for assessment/audit
Domain 6:
Authorization/Approval of
Information System
6.1 Compile security and privacy authorization/approval documents
» Compile required security and privacy documentation to support authorization/approval decision by the
designated official
Domain 7:
Continuous Monitoring
» Identify potential threat and impact to operation of information system and environment
» Analyze risk due to proposed changes accounting for organizational risk tolerance
» Approve and document proposed changes (e.g., Change Control Board (CCB), technical review board)
» Implement proposed changes
» Validate changes have been correctly implemented
» Ensure change management tasks are performed
» Monitor network, physical and personnel activities (e.g., unauthorized assets, personnel and related activities)
» Ensure vulnerability scanning activities are performed
» Review automated logs and alerts for anomalies (e.g., security orchestration, automation and response)
7.3 Review supply chain risk analysis monitoring activities (e.g., cyber threat reports, agency
reports, news reports)
» Ensure response activities are coordinated with internal and external stakeholders
» Update documentation, strategies and tactics incorporating lessons learned
7.5 Revise monitoring strategies based on changes to industry developments introduced through
legal, regulatory, supplier, security and privacy updates
7.6 Keep designated officials updated about the risk posture for continuous authorization/approval
Legal Information
For any questions related to (ISC)2’s legal policies, please contact the (ISC)2 Legal
Department at legal@isc2.org.
Any Questions?
Contact (ISC)2 Candidate Services in your region:
Americas
Phone: +1-866-331-ISC2 (4722)
Email: info@isc2.org
Asia Pacific
Phone: +852-5803-5662
Email: isc2asia@isc2.org
CGRC Certification
v9/2023 Exam Outline 11