Published March 3, 2026 ยท CISSP Domains

CISSP 8 Domains Explained: Weights, Topics & Study Tips (2026)

The CISSP Common Body of Knowledge spans 8 domains โ€” each one tested with a different weight on the exam. Here's exactly what each domain covers, how many questions to expect, and where to spend your study time.

๐Ÿ“– 12 min read

The CISSP exam tests you across all 8 domains of the Common Body of Knowledge (CBK). You don't get to skip any โ€” but you do get to know exactly how much each one matters. ISC2 publishes official domain weights that tell you precisely what percentage of exam questions come from each area.

If you're about to spend 300โ€“500 hours studying, you need to know this breakdown cold. A candidate who devotes equal time to all 8 domains is working against themselves. Domain 1 carries 60% more weight than Domains 2 or 8. That's not a small difference โ€” that's the difference between passing and rescheduling.

๐Ÿ”‘ Key Fact: 2024 Weight Changes Still Apply in 2026 ISC2 updated the CISSP exam weights effective April 15, 2024. Domain 1 (Security and Risk Management) increased from 15% to 16%. Domain 8 (Software Development Security) decreased from 11% to 10%. These are the current, official weights for 2026 exam takers.

CISSP Domain Overview & Exam Weights

The CISSP CAT exam delivers between 100 and 150 questions over 3 hours. Based on the official domain weights, here's how many questions you can expect from each domain at the 125-question midpoint:

Official CISSP Domain Weights (2024โ€“2026)

Domain 1: Security & Risk Mgmt
16%
Domain 2: Asset Security
10%
Domain 3: Security Architecture
13%
Domain 4: Network Security
13%
Domain 5: IAM
13%
Domain 6: Assessment & Testing
12%
Domain 7: Security Operations
13%
Domain 8: Software Dev Security
10%
# Domain Weight ~Questions (125 total) Priority
1 Security and Risk Management 16% ~20 ๐Ÿ”ด Highest
2 Asset Security 10% ~12โ€“13 ๐ŸŸก Lower
3 Security Architecture and Engineering 13% ~16 ๐ŸŸ  High
4 Communication and Network Security 13% ~16 ๐ŸŸ  High
5 Identity and Access Management 13% ~16 ๐ŸŸ  High
6 Security Assessment and Testing 12% ~15 ๐ŸŸ  High
7 Security Operations 13% ~16 ๐ŸŸ  High
8 Software Development Security 10% ~12โ€“13 ๐ŸŸก Lower

Notice that five domains tie at 13% โ€” Domains 3, 4, 5, 7, and Domain 6 at 12%. Together, those five represent 64% of your exam. Domain 1 adds another 16%. That means the first seven domains cover 90% of questions. Domain 8 and 2 split the remaining 20%.

Domain 1: Security and Risk Management (16%)

Domain 1 of 8
Security and Risk Management
16%
  • Security governance principles and frameworks (ISO 27001, NIST RMF)
  • Legal and regulatory compliance (GDPR, HIPAA, PCI-DSS)
  • Risk management: identification, assessment, treatment
  • Threat modeling and risk quantification (ALE, SLE, ARO)
  • Ethics and the ISC2 Code of Ethics
  • Business Continuity Planning (BCP) vs. Disaster Recovery Planning (DRP)
  • Personnel security policies: separation of duties, least privilege
  • Security awareness and training programs
Highest Priority โ€” 20 questions

Domain 1 is the biggest on the exam and also one of the most conceptual. It's not about configuring firewalls โ€” it's about understanding why security decisions get made at an organizational level. You need to think like a Chief Information Security Officer (CISO) who's accountable to the board.

What trips candidates up: Risk management math. You must know ALE (Annual Loss Expectancy = SLE ร— ARO), how to calculate risk reduction after safeguards, and the difference between risk avoidance, transference, mitigation, and acceptance. ISC2 loves quantitative risk scenarios.

โœ… Domain 1 Study Tip Don't memorize frameworks โ€” understand what problem each one solves. NIST RMF is about federal systems. ISO 27001 is about certification. COBIT is about IT governance. The exam asks which framework applies to a given scenario, not just to list them.

Domain 2: Asset Security (10%)

Domain 2 of 8
Asset Security
10%
  • Information and asset classification schemes
  • Data ownership: owner, custodian, steward, processor
  • Data lifecycle management and retention
  • Data security controls: encryption at rest, in transit, in use
  • Data remanence and sanitization (clearing, purging, destruction)
  • Privacy protection: PII, PHI, data minimization
  • Scoping and tailoring security controls
Standard Priority โ€” ~12 questions

Asset Security covers how organizations classify, handle, and protect their data throughout its entire lifecycle โ€” from creation to disposal. The key concept is that the data owner determines the classification level, while the custodian (usually IT) implements the controls.

What trips candidates up: Data remanence. Know the difference between clearing (reusing media within the organization), purging (destroying data so it can't be recovered even with lab equipment), and destruction (physical elimination of media). The exam often describes a scenario and asks which sanitization method is appropriate.

Domain 3: Security Architecture and Engineering (13%)

Domain 3 of 8
Security Architecture and Engineering
13%
  • Security models: Bell-LaPadula, Biba, Clark-Wilson, Brewer-Nash
  • Cryptography: symmetric, asymmetric, hashing, PKI
  • Physical security controls and site design
  • Trusted computing: TPM, HSM, secure enclaves
  • Cloud computing security architecture
  • Virtualization and containerization security
  • Security by design principles: least privilege, fail-secure, defense-in-depth
  • Vulnerability assessments vs. penetration testing
High Priority โ€” ~16 questions

This is the most technically broad domain. It covers everything from formal security models developed in the 1970s to modern cloud architecture. Cryptography alone can feel like a full certification โ€” you need to understand not just which algorithm does what, but when to use each and why.

What trips candidates up: Security models. Bell-LaPadula enforces confidentiality (no read up, no write down). Biba enforces integrity (no read down, no write up). The exam will give you a scenario and ask which model applies. Practice until the distinction is automatic.

๐Ÿ’ก Cryptography Quick Reference Symmetric (AES, 3DES) = fast, same key both directions, great for bulk encryption. Asymmetric (RSA, ECC) = slow, key pair, great for key exchange and digital signatures. Hashing (SHA-256, MD5) = one-way, integrity verification. Know which to use and why โ€” expect 4โ€“6 crypto questions minimum.

Domain 4: Communication and Network Security (13%)

Domain 4 of 8
Communication and Network Security
13%
  • OSI and TCP/IP models โ€” and where attacks happen at each layer
  • Firewalls: packet filtering, stateful, next-generation (NGFW)
  • VPNs, TLS/SSL, IPSec tunneling protocols
  • Network attack types: DoS, DDoS, ARP poisoning, DNS spoofing
  • Wireless security: WPA2, WPA3, 802.1X, EAP protocols
  • Network segmentation: DMZ, VLAN, microsegmentation
  • SD-WAN, SASE, and zero-trust network access
  • Network monitoring: IDS vs. IPS, SIEM integration
High Priority โ€” ~16 questions

Domain 4 is where networking knowledge matters most. But the CISSP doesn't test you on how to configure a Cisco switch โ€” it tests you on why specific network security architectures are chosen. You need to know how protocols work, what they're vulnerable to, and how controls mitigate those vulnerabilities.

What trips candidates up: Confusing IDS and IPS. An IDS (Intrusion Detection System) detects and alerts โ€” it's passive. An IPS (Intrusion Prevention System) detects and blocks โ€” it's inline. The exam loves asking which is more appropriate given a scenario. If availability is the priority, IDS. If stopping attacks is the priority, IPS.

Domain 5: Identity and Access Management (13%)

Domain 5 of 8
Identity and Access Management (IAM)
13%
  • Authentication factors: something you know, have, are, do, where you are
  • Access control models: DAC, MAC, RBAC, ABAC, PBAC
  • Federation: SAML, OAuth 2.0, OpenID Connect
  • Directory services: LDAP, Active Directory, Kerberos
  • Privileged Access Management (PAM) and just-in-time access
  • Identity lifecycle: provisioning, review, deprovisioning
  • Zero trust: "never trust, always verify"
  • Biometrics: FAR, FRR, and the crossover error rate (CER)
High Priority โ€” ~16 questions

Identity is the new perimeter. Domain 5 reflects how modern security has shifted from protecting the network boundary to verifying identities at every access point. Understanding the differences between access control models is non-negotiable.

What trips candidates up: Access control models. DAC (Discretionary) โ€” the owner controls access, flexible but risky. MAC (Mandatory) โ€” labels and clearances, used in government systems. RBAC (Role-Based) โ€” access based on job function, most common in enterprise. ABAC (Attribute-Based) โ€” fine-grained policies. Know the use case for each.

โœ… Domain 5 Study Tip For biometrics: low FAR (False Acceptance Rate) = high security. Low FRR (False Rejection Rate) = high usability. The CER (Crossover Error Rate) is where FAR and FRR are equal โ€” a lower CER means a more accurate system. The exam often asks which metric matters most for a given security goal.

Domain 6: Security Assessment and Testing (12%)

Domain 6 of 8
Security Assessment and Testing
12%
  • Vulnerability assessments: scanning, tools, output interpretation
  • Penetration testing phases: reconnaissance, scanning, exploitation, reporting
  • Types of pen tests: white box, gray box, black box
  • Security audits: internal vs. external, compliance vs. risk-based
  • Log management and SIEM analysis
  • Code review and application security testing (SAST, DAST)
  • Disaster recovery testing: tabletop, walkthrough, simulation, parallel, full cutover
  • SOC 2, SSAE 18 / AT-C 320 (formerly SAS 70) audit standards
High Priority โ€” ~15 questions

Domain 6 tests whether you understand how organizations verify that their security controls actually work. It's not just about running a Nessus scan โ€” it's about choosing the right assessment methodology, interpreting results, and communicating findings to the right stakeholders.

What trips candidates up: DR testing types. Tabletop exercises are discussions โ€” no systems are involved. Parallel tests run both old and new systems simultaneously. Full cutover (or failover) is the real thing โ€” highest risk, most realistic. Know the risk and resource profile of each.

Domain 7: Security Operations (13%)

Domain 7 of 8
Security Operations
13%
  • Incident response lifecycle: preparation, detection, containment, eradication, recovery
  • Investigations: digital forensics, chain of custody, evidence handling
  • Patch and change management processes
  • Configuration management and asset inventory
  • Identity and access provisioning in operations context
  • Preventive vs. detective vs. corrective controls
  • Malware analysis: types, behaviors, and response
  • Physical security operations: guards, lighting, CCTV, locks
High Priority โ€” ~16 questions

Domain 7 is where security concepts meet day-to-day operations. It's the largest "practical" domain โ€” covering how security teams actually run, respond to incidents, and maintain controls. If you work in a SOC or IT operations role, this domain may feel familiar but still requires the CISSP managerial perspective.

What trips candidates up: Incident response order. The NIST phases are: Preparation โ†’ Detection & Analysis โ†’ Containment โ†’ Eradication โ†’ Recovery โ†’ Post-Incident Activity. The exam will ask what you do first, second, or next in a given scenario. Containment always comes before eradication.

โš ๏ธ Domain 7 Forensics Trap When handling digital evidence, the first priority is always preservation โ€” not investigation. CISSP questions will describe an incident and ask what to do immediately. The answer is almost never "start analyzing logs." Secure and preserve the evidence first. Document chain of custody before touching anything.

Domain 8: Software Development Security (10%)

Domain 8 of 8
Software Development Security
10%
  • SDLC phases and security integration at each stage
  • Secure coding practices: input validation, parameterized queries, error handling
  • Common vulnerabilities: OWASP Top 10, buffer overflows, injection attacks
  • DevSecOps and shifting security left
  • Code review: static (SAST), dynamic (DAST), interactive (IAST)
  • Software supply chain security
  • Agile vs. waterfall vs. spiral SDLC models
  • API security and third-party library risks
Standard Priority โ€” ~12 questions

Domain 8 dropped from 11% to 10% in the 2024 update โ€” reflecting a slight deprioritization relative to risk and operations topics. But don't skip it. OWASP Top 10 vulnerabilities, SDLC integration, and the DevSecOps mindset are all testable and increasingly relevant.

What trips candidates up: Mixing up code testing methods. SAST (Static Application Security Testing) analyzes source code without running it โ€” like a code review done by a scanner. DAST (Dynamic Application Security Testing) runs the application and attacks it from the outside. Know which finds what category of bugs.

Which CISSP Domains to Study First

The instinct is to work through Domains 1โ€“8 in order. That's not optimal. Here's a better approach based on exam weight and conceptual dependencies:

Phase 1: Foundation (Start Here)

Phase 2: Technical Core (Middle)

Phase 3: Fill the Gaps

8
Domains tested
16%
Largest domain (D1)
64%
D3+D4+D5+D6+D7 combined
90%
First 7 domains cover

FAQ: CISSP Domains

Are the CISSP domain weights changing in 2026?

Not currently. ISC2 updated the CISSP exam outline effective April 15, 2024 โ€” that's the current version for 2026 exam takers. Domain 1 went up to 16%, Domain 8 dropped to 10%. Unless ISC2 announces a new Job Task Analysis (JTA), these weights remain in effect.

Do I need to pass each domain separately?

No. The CISSP is a single cumulative exam โ€” there's no domain-by-domain passing threshold. The CAT algorithm evaluates your overall competency across all domains. However, severe weakness in any domain can hurt your overall score since the algorithm tests breadth, not just aggregate knowledge.

How many questions come from each domain?

ISC2 doesn't specify exact per-domain question counts โ€” you'll see between 100 and 150 total questions depending on when the CAT algorithm achieves statistical confidence in your ability. Using the published weights as percentages against 125 questions gives the estimates in the table above.

Which domain is hardest?

Domain 3 (Security Architecture and Engineering) consistently gets cited as the most difficult due to cryptography depth. Domain 1 (Security and Risk Management) is cited as the most important and most conceptually challenging for candidates without a management background. Domain 7 (Security Operations) trips up candidates who answer from a technical rather than managerial perspective.

How is the CISSP different from CCSP or CISM?

The CISSP is the broadest of the three โ€” covering all 8 security domains from governance to technical implementation. The CCSP focuses on 6 cloud-specific domains (cloud concepts, architecture, data security, platform security, operations, and legal). The CISM focuses on 4 management domains (governance, risk management, incident management, program management). If you're a security manager, you may pursue CISM. If you're in cloud security, CCSP. CISSP works as a foundation for both.

Practice All 8 CISSP Domains

CISSP.app delivers adaptive practice questions mapped to each domain's official weight. You'll know exactly which domains need the most work โ€” before exam day.

Start Free 7-Day Trial โ†’

No credit card required ยท Includes CCSP and CISM access