CCSP
Certified Cloud Security Professional
Cloud security architecture: shared responsibility, identity, data protection, crypto, and cloud-native detection.
› Quality score
Four-axis SecProve rubric, each 0–10. SecProve editorial assessment — each axis carries a written justification so you can push back on any single call without dismissing the whole score.
› Market signals
public, citable inputs to the recognition score› Built for these roles
› Exam format
125 multiple-choice questions over 3 hours, English. Pearson VUE proctored. Endorsement step from an existing ISC2 member required after passing.
30 / 60 / 90 day waits for retakes 1/2/3 in a rolling 12-month window.
› Recertification
90 CPEs over three years (avg 30/yr) plus the $135/yr Annual Maintenance Fee shared with other ISC2 credentials. Holding both CCSP and CISSP costs a single AMF.
› 3-year cost of ownership
Excludes study materials, training, retake risk, and lost-wage opportunity. Use as a floor estimate.
› NICE Framework work roles
The NIST NICE work-role IDs this cert maps to. NICCS lookup.
› Core domains covered
The 6 domains this cert is centrally about. Passing the exam demonstrates working knowledge of each.
AWS/Azure/GCP security controls, IAM policies, CSPM, container security, shared responsibility model.
AuthN/AuthZ, SSO, MFA, PAM, RBAC/ABAC, identity governance, FIDO2/passkeys, plus non-human identity: service accounts, workload identity, agent / plugin identities.
Data classification, encryption-at-rest/in-transit, DLP, tokenization, privacy-by-design, plus the regulatory stack (GDPR, CCPA, HIPAA) that sets the bar.
Symmetric/asymmetric, PKI, TLS/SSL, hashing, post-quantum cryptography, key management.
Reference architectures, control frameworks (NIST SP 800-53, CIS Controls), secure-by-design patterns, threat modeling, trust-boundary design, technology standards.
Backup integrity, immutable snapshots, cyber-recovery vaults, restore orchestration, BCM/DR, tabletop exercises, ransom-scenario restoration drills.
› Also touched
Present in the blueprint but not the primary focus — you’ll be introduced but shouldn’t expect depth.
Zero trust principles, micro-segmentation, NIST SP 800-207, ZTNA, continuous verification, BeyondCorp.
SBOM, vendor risk assessment, software supply chain attacks, dependency management.
SOC operations, SIEM tuning, SOAR playbooks, alert triage, log analysis, runbook development.
SIGMA/YARA/Suricata rule writing, hypothesis-driven hunting, log deep-dives, detection gap analysis.
› Known coverage gaps
Domains this cert does not meaningfully address. Plan follow-up learning here if your role touches any of them.
› Prerequisites
Five years of IT experience with three years in infosec and one year in cloud security (CISSP satisfies the experience requirement).
- Cloud concepts (IaaS, PaaS, SaaS) and shared responsibility model
- Cloud IAM, encryption, and data protection
- Cloud architecture and governance
› Progression
requiredrecommendedWhere this cert fits in the typical learning path. Required edges are vendor-gated; recommended edges reflect de facto industry progression.
No vendor-gated prereqs.
No certs require this one.
No follow-on certs reference this one yet.
› Study materials
Curated starting points. Not exhaustive — vet each against your learning style and the current exam version.
- Official (ISC)² CCSP Study Guide, 4th Ed. — Sybex
- Official (ISC)² CCSP Practice Tests, 3rd Ed. — Sybex
› Version & lifecycle
Six CBK domains; next refresh expected ~2025-2026.
› Salary signal
Cloud security engineer / architect, US, 4+ years.
ISC2 Workforce Study + Robert Half Salary Guide · 2024 · US base only · p25–p75 range
› How it compares
CCSK is the vendor-neutral entry point; CCSP is broader and includes ISC2's experience-verification gate.
↔ Compare side-by-side› Careers that commonly pursue this cert
Design, build, and maintain security infrastructure. The architects of an organization's defensive posture.
Secure cloud infrastructure across AWS, Azure, and GCP. Specialize in the shared responsibility model and cloud-native controls.
Prepare for the post-quantum era. Understand quantum threats and lead cryptographic migration efforts.
Senior design role — defines how pillar A components fit together across identity, crypto, network, cloud, and data — and, increasingly, how pillar C bolts into it.
Secures the platform that trains, stores, and serves ML models — multi-tenant GPU isolation, pipeline integrity, feature-store hygiene, secrets management in ML workflows.
See this cert’s domains highlighted on the interactive map, or compare it against the rest of the catalog.