Pillar A: CybersecurityA1

Governance, Risk & Compliance

Risk frameworks (NIST RMF, ISO 31000, FAIR), policy development, audit, regulatory compliance, third-party risk.

Part of Pillar A: Cybersecurity · Cybersecurity groups the disciplines that share methods, tools, and threat models with Governance, Risk & Compliance.

What is Governance, Risk & Compliance?

Governance, Risk, and Compliance (GRC) is the foundation of every security program. It's the discipline that connects cybersecurity to business objectives — ensuring that security investments are risk-informed, regulatory requirements are met, and the organization's risk posture is understood at every level from the SOC to the boardroom.

GRC professionals don't just check compliance boxes. They build risk frameworks that quantify cyber risk in financial terms, design policies that balance security with business agility, and create governance structures that ensure accountability. In a landscape where regulatory penalties can exceed hundreds of millions of dollars and a single breach can destroy market value, GRC is where security meets strategy.

The field is evolving rapidly with the introduction of AI-driven risk scoring, continuous compliance monitoring, and automated audit evidence collection. Frameworks like NIST CSF 2.0 and the EU's DORA regulation are reshaping how organizations think about cyber risk governance.

Why it matters

Every security decision is ultimately a risk decision. GRC ensures those decisions are informed, documented, and defensible — protecting the organization from both threats and regulators.

GRC sits at the intersection of cybersecurity, business strategy, and law. It provides the governance framework that all other security domains operate within.

Key topics

Risk frameworks (NIST RMF, ISO 31000, FAIR, OCTAVE)
Regulatory compliance (SOX, HIPAA, PCI DSS, GDPR, DORA)
Policy development and lifecycle management
Risk quantification and cyber risk economics
Third-party risk management (TPRM)
Audit preparation and evidence management
Security program maturity assessment
Board-level risk communication
Continuous compliance monitoring
Risk appetite and tolerance frameworks

People shaping this field

Researchers and practitioners worth following in this space.

Creator of the FAIR risk framework

NIST Fellow, architect of the Risk Management Framework

Curated resources

Authoritative sources we ground Governance, Risk & Compliance questions in — frameworks, research, guides, and tools.

WEFresearch

World Economic Forum Global Cybersecurity Outlook

Annual survey of cyber leaders on resilience, workforce, geopolitics, and emerging tech including AI. Excellent for leadership and strategy questions.

NISTframework

NIST SP 800-30 Rev. 1 — Guide for Conducting Risk Assessments

Risk assessment methodology: threat sources, vulnerabilities, likelihood, impact. Complements 800-37. Good for questions comparing quantitative vs. qualitative risk assessment.

Center for Internet Securityframework

CIS Controls v8

18 prioritized security controls organized into Implementation Groups (IG1, IG2, IG3). Practical and prescriptive — good for questions about prioritization and which controls matter most for different organization sizes.

The Open Group / FAIR Instituteframework

FAIR (Factor Analysis of Information Risk)

Quantitative risk analysis framework. Decomposes risk into Loss Event Frequency and Loss Magnitude. Questions on translating risk into business terms and comparing to qualitative methods.

NISTframework

NIST SP 800-37 Rev. 2 — Risk Management Framework

The 7-step RMF (Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor). Questions should test understanding of step sequencing, roles (AO, ISSO, ISSM), and continuous monitoring vs. point-in-time assessment.

NISTframework

NIST Risk Management Framework (SP 800-37)

Guide for applying the RMF to information systems and organizations. Covers categorization, control selection, implementation, assessment, authorization, and monitoring.

ISOframework

ISO 27001 — Information Security Management

International standard for establishing, implementing, maintaining, and continually improving an information security management system (ISMS).

FAIR Instituteframework

FAIR — Factor Analysis of Information Risk

Quantitative risk analysis framework. Provides a model for understanding, analyzing, and quantifying information risk in financial terms.

Roles where this matters

Career paths where this domain shows up as core or recommended.

📋GRC / Compliance AnalystCore

Manage risk, ensure regulatory compliance, and build governance frameworks. Where security meets business strategy.

👑CISO / Security LeaderCore

Lead security strategy, communicate risk to the board, and build security programs. Executive-level cybersecurity leadership.

🔒Privacy Engineer / DPORecommended

Build privacy into systems by design. Navigate GDPR, CCPA, and emerging AI privacy regulations.

🏭OT/ICS Security SpecialistRecommended

Protect critical infrastructure — power grids, water treatment, manufacturing. Where cyber meets the physical world.

🗝IAM / Identity EngineerCore

Design and operate the identity fabric that every other control inherits. Federated identity, MFA/passkeys, PAM, identity governance, and the policy glue between them.

🏛Security ArchitectCore

Senior design role — defines how pillar A components fit together across identity, crypto, network, cloud, and data — and, increasingly, how pillar C bolts into it.

🐛Vulnerability Management LeadRecommended

Owns the end-to-end find → prioritize → fix → verify loop at scale, now increasingly AI-driven.

AI Governance / AI Risk SpecialistCore

The policy/controls counterpart to the AI Security Engineer — owns risk frameworks, regulatory mapping (EU AI Act, NIST AI RMF), model documentation, and AI incident response policy.

🌐Threat Exposure Management / Attack Surface AnalystRecommended

External-first role: inventories what an attacker can see, tracks what's new, and drives closure through the org. The outside-in counterpart to vuln management.

Certifications that signal this domain

Credentials whose blueprint meaningfully covers this domain. Core means centrally covered; also touched means present in the blueprint but not the primary focus.

Core coverage

AAIAExpert·ISACAOfficial page →

Advanced in AI Audit

ISACA specialization for AI Audit. First certification worldwide specifically for auditing AI systems. Requires active CISA (or comparable audit certification). Three domains: AI Governance & Risk, AI Operations, AI Auditing.

AAIRExpert·ISACAOfficial page →

Advanced in AI Risk

ISACA specialization for AI risk management. Beta phase since April 2026. Requires active ISACA or equivalent certification. Focus on AI Risk Governance, AI Risk Program Management, and AI Life Cycle Risk Management.

AAISMExpert·ISACAOfficial page →

Advanced in AI Security Management

ISACA specialization for AI Security Management. Requires active CISM or CISSP. Focus on AI Governance & Program Management, AI Risk Management, and AI Technologies & Controls. For security leaders managing AI risks.

AIGPProfessional·IAPPOfficial page →

Artificial Intelligence Governance Professional

AI risk, governance, and regulatory literacy (EU AI Act, NIST AI RMF).

APMG 20000AProfessional·APMG-InternationalOfficial page →

APMG ISO/IEC 20000 Auditor

APMG ISO/IEC 20000 Auditor

APMG 20000FAssociate·APMG-InternationalOfficial page →

APMG ISO/IEC 20000 Foundation

APMG ISO/IEC 20000 Foundation

APMG 20000PProfessional·APMG-InternationalOfficial page →

APMG ISO/IEC 20000 Practitioner

APMG ISO/IEC 20000 Practitioner

APMG 27001AProfessional·APMG-InternationalOfficial page →

APMG ISO/IEC 27001 Auditor

APMG ISO/IEC 27001 Auditor

APMG 27001FAssociate·APMG-InternationalOfficial page →

APMG ISO/IEC 27001 Foundation

APMG ISO/IEC 27001 Foundation

APMG 27001PProfessional·APMG-InternationalOfficial page →

APMG ISO/IEC 27001 Practitioner

APMG ISO/IEC 27001 Practitioner

BCS FISMPAssociate·BCSOfficial page →

BCS Foundation Certifiate in Information Security Management Principles

BCS Foundation Certificate in Information Security Management Principles

BCS PCIAAProfessional·BCSOfficial page →

BCS Practitioner Certificate in Information Assurance Architecture

BCS Practitioner Certificate in Information Assurance Architecture

BCS PCIRMProfessional·BCSOfficial page →

BCS Practitioner Certificate in Information Risk Management

BCS Practitioner Certificate in Information Risk Management

C CS FAssociate·Mile2Official page →

IBITGQ Certified Cyber Security Foundation

IBITGQ Certified Cyber Security Foundation

C)HISSPProfessional·Mile2Official page →

Mile2 Certified Healthcare Information Systems Security Practitioner

Mile2 Certified Healthcare Information Systems Security Practitioner

C)ISCAPProfessional·Mile2Official page →

Mile2 Information Systems Certification and Accredidation Professional

Mile2 Information Systems Certification and Accreditation Professional

C)ISMS-LAProfessional·Mile2Official page →

Mile2 Certified Information security Management Systems Lead Auditor

Mile2 Certified Information security Management Systems Lead Auditor

C)ISRMProfessional·Mile2Official page →

Mile2 Certified Information Systems Risk Manager

Mile2 Certified Information Systems Risk Manager

C)ISSAProfessional·Mile2Official page →

Mile2 Certified Information Systems Security Auditor

Mile2 Certified Information Systems Security Auditor

C)ISSMProfessional·Mile2Official page →

Mile2 Certified Information Systems Security Manager

Mile2 Certified Information Systems Security Manager

C)ISSOProfessional·Mile2Official page →

Mile2 Certified Information Systems Security Officer

Mile2 Certified Information Systems Security Officer

CCProfessional·ISC2Official page →

ISC2 Certified in Cybersecurity

The CC is ISC2's entry-level certification without experience requirements and explicitly targets career starters, career changers, and students. Notably, ISC2 periodically offers CC training and the exam for free (as part of the 'One Million Certified' initiative), which has significantly increased market penetration. Content covers five domains: Security Principles, Incident Response, Access Control, Network Security, and Security Operations – at a solid but intentionally broad entry level. As a stepping stone to SSCP or CISSP it is well-suited; as a standalone credential it carries less weight than Security+. From September 2026, a new Exam Outline applies.

CCISOLeadership·EC-CouncilOfficial page →

Certified Chief Information Security Officer

Executive leadership — governance, program mgmt, finance, and strategic planning for security.

CCPProfessional·UnbekanntOfficial page →

EC First Certified CCMC Professional

EC First Certified CCMC Professional

CCRMPProfessional·Risk Management Society (RIMS)Official page →

IBITGQ Certified in Managing Cyber Security Risk

IBITGQ Certified in Managing Cyber Security Risk

CCSAProfessional·Check PointOfficial page →

EC First Certified Cyber Security Architect

EC First Certified Cyber Security Architect

CGEITLeadership·ISACAOfficial page →

Certified in the Governance of Enterprise IT

Board / executive-level IT governance and investment oversight.

CGRCProfessional·ISC2Official page →

(ISC)2 Certified in Governance, Risk and Compliance

(ISC)2 Certified in Governance, Risk and Compliance

CIISec ICSFAssociate·CIISecOfficial page →

CIISec Information and Cybersecurity Fundamentals

CIISec Information and Cybersecurity Fundamentals

CIPMProfessional·IAPPOfficial page →

Certified Information Privacy Manager

Running a privacy program end-to-end.

CIPPProfessional·IAPPOfficial page →

IAPP Certified Information Privacy Professional

IAPP Certified Information Privacy Professional

CIS FAssociate·IBITGQOfficial page →

IBITGQ Certified ISO 27001 Information Security Management Specialist Foundation

IBITGQ Certified ISO 27001 Information Security Management Specialist Foundation

CIS IAProfessional·IBITGQOfficial page →

IBITGQ Certified ISO 27001 Information Security Management Specialist Internal Auditor

IBITGQ Certified ISO 27001 Information Security Management Specialist Internal Auditor

CIS LAProfessional·IBITGQOfficial page →

IBITGQ Certified ISO 27001 Information Security Management Specialist Lead Auditor

IBITGQ Certified ISO 27001 Information Security Management Specialist Lead Auditor

CIS RMProfessional·IBITGQOfficial page →

IBITGQ Certified ISO 27005 Information Security Management Specialist Risk Management

IBITGQ Certified ISO 27005 Information Security Management Specialist Risk Management

CISAProfessional·ISACAOfficial page →

Certified Information Systems Auditor

IS audit, governance, control testing, and assurance.

CISMLeadership·ISACAOfficial page →

Certified Information Security Manager

Security program management, risk, governance, and incident governance. The manager / CISO-track signal.

CISSPExpert·ISC2Official page →

Certified Information Systems Security Professional

Breadth across security engineering, architecture, operations, and governance at senior-IC / manager level. The default senior-generalist signal.

CISSP-ISSAPExpert·ISC2Official page →

CISSP Information Systems Security Architecture Professional

Architecture concentration on top of CISSP — trust boundaries, identity / crypto / network composition, defense-in-depth design.

CITGPAssociate·Identity Management InstituteOfficial page →

IBITGQ Certified in Implementing IT Governance - Foundation & Principles

IBITGQ Certified in Implementing IT Governance - Foundation & Principles

CLCSMProfessional·PECBOfficial page →

PECB Lead Cloud Security Manager

PECB Lead Cloud Security Manager

CM)ISSOExpert·Mile2Official page →

Mile2 Certified Master Information Systems Security Officer

Mile2 Certified Master Information Systems Security Officer

CRAGEProfessional·EC-CouncilOfficial page →

Certified Responsible AI Governance & Ethics

EC-Council certification for responsible AI governance and ethics. Focus on oversight, risk management, regulatory alignment (NIST AI RMF, ISO 42001), accountability across the AI lifecycle. Brand new since February 2026.

CRAIProfessional·ISACAOfficial page →

ISACA Certified in Risk of Artificial Intelligence (emerging)

AI risk management and governance — emerging blueprint, expect revisions.

CRISCProfessional·ISACAOfficial page →

Certified in Risk and Information Systems Control

Enterprise risk identification, assessment, and response + IT controls.

CSBAProfessional·ISBOKOfficial page →

QAI Certified Software Business Analyst

QAI Certified Software Business Analyst

CSCSProfessional·TigerschemeOfficial page →

EC First Certified Security Compliance Specialist

EC First Certified Security Compliance Specialist

CTPRAProfessional·Shared AssessmentsOfficial page →

Shared Assessment Certified Third-Party Risk Assessor

Shared Assessment Certified Third-Party Risk Assessor

CTPRPProfessional·Shared AssessmentsOfficial page →

Shared Assessment Certified Third-Party Risk Professional

Shared Assessment Certified Third-Party Risk Professional

DACRPAssociate·DRI InternationalOfficial page →

DRI Associate Cyber Resilience Professional

DRI Associate Cyber Resilience Professional

DCBCAProfessional·INE/eLearnSecurityOfficial page →

DRI Certified Business Continuity Auditor

DRI Certified Business Continuity Auditor

DCBCLAProfessional·INE/eLearnSecurityOfficial page →

DRI Certified Business Continuity Lead Auditor

DRI Certified Business Continuity Lead Auditor

DCCRPProfessional·DRI InternationalOfficial page →

DRI Certified Cyber Resilience Professional

DRI Certified Cyber Resilience Professional

DCRMPProfessional·Risk Management Society (RIMS)Official page →

DRI Certified Risk Management Professional

DRI Certified Risk Management Professional

ECSSProfessional·EC-CouncilOfficial page →

EC Council Certified Security Specialist

EC Council Certified Security Specialist

EISMProfessional·EC-CouncilOfficial page →

EC Council Information Security Manager

EC Council Information Security Manager

EXIN 27001EExpert·EXINOfficial page →

EXIN ISO/IEC 27001 Expert

EXIN ISO/IEC 27001 Expert

EXIN 27001FAssociate·EXINOfficial page →

EXIN ISO/IEC 27001 Foundation

EXIN ISO/IEC 27001 Foundation

EXIN 27001PProfessional·EXINOfficial page →

EXIN ISO/IEC 27001 Professional

EXIN ISO/IEC 27001 Professional

EXIN CITProfessional·EXINOfficial page →

EXIN Cyber & IT Security

EXIN Cyber & IT Security

Fair FdnAssociate·The Open GroupOfficial page →

Fair Institute Analysis Fundamentals

Fair Institute Analysis Fundamentals

FEXINAssociate·EXINOfficial page →

EXIN Information Security Foundation

EXIN Information Security Foundation

GCCCProfessional·GIACOfficial page →

GIAC Critical Controls Certification

GIAC Critical Controls Certification

GCIPProfessional·GIACOfficial page →

GIAC Critical Infrastructure Protection

GIAC Critical Infrastructure Protection

GFACTAssociate·GIACOfficial page →

GIAC Foundational Cybersecurity Technologies

GIAC Foundational Cybersecurity Technologies

GISFAssociate·GIACOfficial page →

GIAC Information Security Fundamentals

GIAC Information Security Fundamentals

GISPProfessional·GIACOfficial page →

GIAC Information Security Professional

GIAC Information Security Professional

GLEGProfessional·GIACOfficial page →

GIAC Law of Data Security & Investigations

GIAC Law of Data Security & Investigations

GRCAProfessional·OCEGOfficial page →

OCEG Governance, Risk, and Compliance Auditor

OCEG Governance, Risk, and Compliance Auditor

GRCPProfessional·OCEGOfficial page →

OCEG Governance, Risk, and Compliance Professional

OCEG Governance, Risk, and Compliance Professional

GSNAProfessional·GIACOfficial page →

GIAC Systems and Network Auditor

GIAC Systems and Network Auditor

GSTRTLeadership·GIACOfficial page →

GIAC Strategic Planning, Policy and Leadership

GIAC Strategic Planning, Policy and Leadership

HCISPPProfessional·ISC2Official page →

HealthCare Information Security and Privacy Practitioner

ISC2 certification for healthcare security and privacy. Will be retired in December 2026. Focus on data protection, compliance, and risk management in healthcare. Relevant in the US (HIPAA), less so in Europe.

IIA CIAProfessional·IIAOfficial page →

The Institute of Internal Auditors Certified Internal Auditor

The Institute of Internal Auditors Certified Internal Auditor

IIBA CCAProfessional·IIBAOfficial page →

IIBA Certification in Cybersecurity Analysis

IIBA Certification in Cybersecurity Analysis

IS20Professional·Mile2Official page →

Mile2 IS20 Controls

Mile2 IS20 Controls

ISO 42001 LAProfessional·PECBOfficial page →

PECB ISO/IEC 42001 Lead Auditor

PECB certification for auditing AI Management Systems according to ISO/IEC 42001. Complementary to Lead Implementer. Growing demand through third-party AI audits and regulatory requirements.

ISO 42001 LIProfessional·PECBOfficial page →

PECB ISO/IEC 42001 Lead Implementer

The PECB ISO/IEC 42001 Lead Implementer certificate qualifies professionals to establish and lead an AI Management System (AIMS) according to the international standard ISO/IEC 42001 within an organization—analogous to the well-known ISO 27001 Lead Implementer in the ISMS domain. It is the implementation-oriented counterpart to the Lead Auditor and targets individuals responsible for AIMS rollout. Strength: Strong anchoring in the ISO framework, internationally recognized as a compliance reference for AI governance; practical focus on project management and implementation. Weakness: PECB is a commercial provider with less market recognition than IAPP or CompTIA; the certificate requires substantial professional experience and is therefore not an entry-level certification. The market for ISO-42001-compliant AIMS implementations is still young, which currently limits demand for the certificate.

ISSEPExpert·ISC2Official page →

Information Systems Security Engineering Professional

ISC2 specialization for security engineering, developed in cooperation with NSA. Focus on Systems Security Engineering, Risk Management, and Security Planning. Particularly relevant in US Government/Defense context.

ISSMPExpert·ISC2Official page →

Information Systems Security Management Professional

ISC2 specialization for security management. Requires CISSP. Focus on Leadership, Risk Management, Security Operations, and Compliance Management. For CISOs and senior security executives.

IT-Grundschutz-BeraterProfessional·BSIOfficial page →

BSI Zertifizierter IT-Grundschutz-Berater

Personnel certification by the Federal Office for Information Security (BSI). The exam is administered exclusively by the BSI in Bonn — 80 questions in 90 minutes with case studies. Strict prerequisites: min. 5 years IT professional experience, including 2 years in information security, plus proven IT-Grundschutz project leadership. Only approx. 287 certified consultants listed nationwide. The BSI follows ISO 17024 but is not DAkkS-accredited — the certificate is issued by governmental authority. In government agencies and KRITIS environments the strongest German credential for IT-Grundschutz competence.

IT-Grundschutz-PraktikerProfessional·BSI / SchulungsanbieterOfficial page →

BSI IT-Grundschutz-Praktiker

Entry-level qualification in BSI IT-Grundschutz. 3-day training with a BSI-recognized provider followed by an exam administered by the provider (not by the BSI itself). No professional experience required, no expiration date. Teaches fundamentals of the BSI framework and is a prerequisite for the IT-Grundschutz-Berater. Relevant in German government agencies and KRITIS environments, but not a strong standalone credential. More of a training certificate than a certification.

ITIL FdnAssociate·AxelosOfficial page →

ITIL Foundation

ITIL Foundation is the established entry point into IT service management and teaches the common vocabulary and core principles of the ITIL framework. The certification is widely recognized globally and is required by many organizations as a baseline qualification for IT operations roles. In February 2026, ITIL Version 5 was released with AI-native enhancements and a unified product and service lifecycle model; ITIL-4 holders can transition via a shortened upgrade path. The exam content itself is conceptual and practice-oriented, but not a technical deep-dive – candidates without IT operations experience typically find it more challenging than expected. For pure cybersecurity careers, the certificate has limited depth, but is valuable for anyone working in security-relevant service management roles.

ITS-CProfessional·TestOut / PearsonOfficial page →

Certiport IT Specialist - Cybersecurity

Certiport IT Specialist - Cybersecurity

M_o_R FdnAssociate·AxelosOfficial page →

Axelos M_o_R Framework Foundation

Axelos M_o_R Framework Foundation

M_o_R PProfessional·AxelosOfficial page →

Axelos M_o_R Practitioner Risk Management

Axelos M_o_R Practitioner Risk Management

NCSC CCPLPProfessional·NCSCOfficial page →

NCSC Certified Cybersecurity Professional - Lead Practitioner

NCSC Certified Cybersecurity Professional - Lead Practitioner

NCSC CCPPProfessional·NCSCOfficial page →

NCSC Certified Cybersecurity Professional - Practitioner

NCSC Certified Cybersecurity Professional - Practitioner

NCSC CCPSPProfessional·NCSCOfficial page →

NCSC Certified Cybersecurity Professional - Senior Practitioner

NCSC Certified Cybersecurity Professional - Senior Practitioner

PCCETProfessional·Palo AltoOfficial page →

Palo Alto Networks Certified Cybersecurity Entry-level Technician

Palo Alto Networks Certified Cybersecurity Entry-level Technician

PCI QSAProfessional·PCI Security Standards CouncilOfficial page →

PCI Qualified Security Assessor

PCI Qualified Security Assessor

PECB 27001FAssociate·PECBOfficial page →

PECB ISO/IEC 27001 Foundation

PECB ISO/IEC 27001 Foundation

PECB 27001LAProfessional·PECBOfficial page →

PECB ISO/IEC 27001 Lead Auditor

The PECB ISO/IEC 27001 Lead Auditor is aimed at professionals who want to independently lead or conduct ISMS audits according to ISO 27001. The certificate is well established in Europe and is recognized by many organizations as proof of audit competence. The exam is demanding and combines standards knowledge with practical auditor expertise. Compared to ISO auditor certifications from other providers, PECB positions itself in the mid-price segment with broad international distribution. For beginners without audit experience, the Foundation level is recommended first.

PECB 27001LIProfessional·PECBOfficial page →

PECB ISO/IEC 27001 Lead Implementer

The PECB ISO/IEC 27001 Lead Implementer qualifies holders to establish, implement, and manage an ISMS according to ISO 27001. The certificate is the implementation counterpart to the Lead Auditor and is aimed at individuals who lead ISMS projects internally or as external consultants. It is valued by organizations looking to introduce or maintain ISO 27001. The exam is designed to be practical but requires a solid understanding of the standard. Without real project experience, the learning material often remains abstract.

PECB 27005FAssociate·PECBOfficial page →

PECB ISO/IEC 27005 Foundation

PECB ISO/IEC 27005 Foundation

PECB 27005LMProfessional·PECBOfficial page →

PECB ISO/IEC 27005 Lead Risk Manager

PECB ISO/IEC 27005 Lead Risk Manager

PECB 27005RMProfessional·PECBOfficial page →

PECB ISO/IEC 27005 Risk Manager

PECB ISO/IEC 27005 Risk Manager

PECB 27032CMProfessional·PECBOfficial page →

PECB ISO/IEC 27032 Lead Cybersecurity Manager

PECB ISO/IEC 27032 Lead Cybersecurity Manager

PECB 27032FAssociate·PECBOfficial page →

PECB ISO/IEC 27032 Foundation

PECB ISO/IEC 27032 Foundation

S-ISFAssociate·SECOOfficial page →

SECO Information Security Foundation

SECO Information Security Foundation

S-ISMEExpert·SECOOfficial page →

SECO Information Security Management Expert

SECO Information Security Management Expert

S-ISPProfessional·SECOOfficial page →

SECO Information Security Practitioner

SECO Information Security Practitioner

SABSA SCFAssociate·SABSAOfficial page →

SABSA Chartered Security Architect - Foundation Certificate

SABSA Chartered Security Architect - Foundation Certificate

SABSA SCMExpert·SABSAOfficial page →

SABSA Chartered Security Architect - Master Certificate

SABSA Chartered Security Architect - Master Certificate

SABSA SCPProfessional·SABSAOfficial page →

SABSA Chartered Security Architect - Practitioner Certificate

The SABSA Chartered Practitioner (SCP) certification is the most internationally recognized qualification for risk-based security architecture at enterprise level. The SABSA framework pursues a consistently business-driven, attribute-based approach to security architecture, clearly distinguishing itself from technology-heavy frameworks. The market for SABSA is niche but highly specialized: the certification is known and valued particularly in large enterprises, the financial sector, and critical infrastructure. The assignment-based exam requires real practical application and cannot be passed through mere memorization – this increases the credibility of the credential. Limited adoption and lengthy training paths are the main limitations.

SACPProfessional·SAFe / Scaled AgileOfficial page →

The H Layer Security Awareness and Culture Professional

The H Layer Security Awareness and Culture Professional

SailPoint Identity EngineerProfessional·SailPointOfficial page →

SailPoint Certified Identity Security Engineer

Designs and engineers SailPoint identity solutions across IdentityIQ and Identity Security Cloud (ISC).

SailPoint IdentityIQ AdminProfessional·SailPointOfficial page →

Identity governance and administration (IGA) at enterprise scale.

SC-900Associate·MicrosoftOfficial page →

Microsoft Certified: Security, Compliance, and Identity Fundamentals

Microsoft Certified: Security, Compliance, and Identity Fundamentals

T.I.S.P.Professional·TeleTrusTOfficial page →

TeleTrusT Information Security Professional

High-quality German professional certification for IT security, supported by Bundesverband IT-Sicherheit (TeleTrusT). Examination by DAkkS-accredited bodies (DEKRA, PersCert TÜV). 180 questions in 4 hours, exclusively in German. Covers network security, cryptography, security management (ISO 27001, BSI IT-Grundschutz), IT law (DSGVO/GDPR, NIS-2), and system security. Particularly relevant in government agencies, KRITIS environments, and regulated German enterprises. Not internationally recognized, but a clear quality indicator in Germany. Since 2004, over 2,400 graduates.

TUV AuditorProfessional·T\xdcVOfficial page →

TUV Rheinland IT Security Auditor (GERMAN)

TUV Rheinland IT Security Auditor (GERMAN)

TUV CySecProfessional·T\xdcVOfficial page →

TUV Rheinland Cybersecurity Specialist (GERMAN)

TUV Rheinland Cybersecurity Specialist (GERMAN)

TUV ITSMProfessional·T\xdcVOfficial page →

TUV IT Security Manager (GERMAN)

TUV IT Security Manager (GERMAN)

TUV MSAProfessional·T\xdcVOfficial page →

TUV Rheinland Mobile Security Analyst (GERMAN)

TUV Rheinland Mobile Security Analyst (GERMAN)

Also touched

AWS Security SpecialtyProfessional·Amazon Web ServicesOfficial page →

AWS Certified Security — Specialty (SCS-C02)

Deep AWS security: IAM, data protection, detection, incident response within AWS primitives.

CIPP/CProfessional·IAPPOfficial page →

Certified Information Privacy Professional / Canada

Canadian privacy-law expertise — PIPEDA, provincial regimes (Quebec Law 25, Alberta/BC PIPA), and federal sectoral rules.

CIPP/EProfessional·IAPPOfficial page →

Certified Information Privacy Professional / Europe

GDPR and European privacy law expertise.

CIPP/USProfessional·IAPPOfficial page →

Certified Information Privacy Professional / United States

US federal and state privacy-law expertise.

CSA CZTProfessional·Cloud Security AllianceOfficial page →

Certified Zero Trust (CCZT)

Vendor-neutral Zero Trust architecture and governance — NIST SP 800-207, ZTA pillars, and program implementation.

CyberArk DefenderAssociate·CyberArkOfficial page →

CyberArk Defender — PAM (CDE-PAM)

Day-to-day administration of CyberArk PAM — the dominant enterprise privileged-access platform.

CyberArk GuardianExpert·CyberArkOfficial page →

CyberArk Guardian — PAM

Top-tier CyberArk practitioner — leads complex PAM programs and contributes back to the community.

CyberArk SentryProfessional·CyberArkOfficial page →

CyberArk Sentry — PAM

Designs and deploys CyberArk PAM at enterprise scale — vault architecture, HA/DR, and complex onboarding.

SC-300Associate·MicrosoftOfficial page →

Microsoft Certified: Identity and Access Administrator Associate

Entra ID deployment, conditional access, privileged access, identity governance.

Security+Entry·CompTIAOfficial page →

CompTIA Security+

Broad entry-level knowledge across threats, ops, IAM, network, and crypto basics.

Browse all certifications → — pick a cert on the interactive map to highlight every domain it covers.

More in Cybersecurity

Test what you know about Governance, Risk & Compliance

40 questions available. Beginner to expert questions, scored against the global leaderboard.