30% of the exam — master SOC operations, SIEM/SOAR, IR lifecycle, digital forensics, GDPR, HIPAA, SOC 2 audits, and cloud contract design.
Two domains, 30% of the exam — operations keeps the lights on securely; legal/compliance keeps the organization out of court.
| # | Domain | Weight | ~Questions |
|---|---|---|---|
| 1 | Cloud Concepts, Architecture & Design | 17% | ~17 |
| 2 | Cloud Data Security | 20% | ~20 |
| 3 | Cloud Platform & Infrastructure Security | 17% | ~17 |
| 4 | Cloud Application Security | 16% | ~16 |
| ★ 5 | Cloud Security Operations This page | 17% | ~17 |
| ★ 6 | Legal, Risk & Compliance This page | 13% | ~13 |
| Total | 100% | ~100 | |
Adaptive CAT format since October 2025. ~25 of 100–150 questions are unscored pretest items. Testing via Pearson VUE. Effective August 1, 2026 outline.
Operations is where theory meets reality. You'll be tested on running a SOC, managing incident response, conducting digital forensics in cloud environments, and operating security tools like SIEM and SOAR. The 2026 update explicitly adds AI-driven monitoring to the scope.
Cloud crosses borders, and so do laws. Domain 6 tests your ability to navigate conflicting international regulations (GDPR vs. CLOUD Act), design compliant contracts, understand audit report types (SOC 2 vs. SSAE 18), and apply risk treatment strategies in cloud engagements.
This page covers the final two domains. Use dedicated pages for the other four domains.
Organized by domain sub-objective — click each section to expand detailed content.
Sections 5.1 – 5.6 | Build, operate, and manage cloud security infrastructure, incident response, and SOC operations
| Control | Function |
|---|---|
| Stateful Firewall | Tracks connection state; blocks unsolicited traffic |
| Next-Gen Firewall (NGFW) | Deep packet inspection, app awareness, IPS integration |
| IDS | Detects and alerts on threats — passive monitoring |
| IPS | Detects and blocks threats inline — active prevention |
| Honeypot | Decoy system to lure and study attackers |
| Network Security Groups | Cloud-native L3/L4 traffic filtering (AWS SG, Azure NSG) |
| Framework | Purpose | Key Detail |
|---|---|---|
| NIST SP 800 Series | US federal security standards | SP 800-53 (controls), 800-37 (RMF), 800-171 (CUI) |
| ISO 27001 | ISMS standard (certifiable) | Annex A controls, PDCA cycle, management commitment required |
| ISO 27002 | Security controls catalog | Implementation guidance for ISO 27001 Annex A |
| HIPAA | US healthcare data | Administrative, Physical, Technical safeguards; BAA required |
| COBIT | IT governance | Aligns IT with business; governance vs. management processes |
| CIS Controls | Prioritized security actions | 18 controls, Implementation Groups 1/2/3; formerly SANS Top 20 |
| COSO | Internal control / ERM | Five components: Control Environment, Risk Assessment, Control Activities, Information & Communication, Monitoring |
| ITIL | IT service management | Service lifecycle: Strategy → Design → Transition → Operation → CSI |
| ISO/IEC 20000-1 | IT service management standard | Certifiable equivalent of ITIL practices |
Order of Volatility — collect most volatile evidence first:
| Stakeholder | Communication Focus |
|---|---|
| Vendors/CSP | SLA reporting, security incident notification, audit access coordination |
| Customers | Transparency about incidents, GDPR 72-hour breach notification, service status pages |
| Partners | Shared responsibility model coordination, API security, supply chain incidents |
| Regulators | Mandatory breach reporting, audit cooperation, compliance documentation requests |
| Board/Executives | Business risk framing, incident summaries, financial impact, reputational risk |
| Legal/PR | Litigation hold notices, media communications during incidents, attorney-client privilege |
Key: GDPR requires breach notification to supervisory authority within 72 hours of becoming aware. Notification to affected individuals required if likely to result in high risk.
Sections 6.1 – 6.5 | Navigate international law, privacy regulations, audit frameworks, risk management, and cloud contract design
| Law | Jurisdiction | Key Feature |
|---|---|---|
| GDPR | EU/EEA | 72-hr notification, right to erasure, data portability |
| CCPA/CPRA | California, USA | Right to know, opt-out of sale, non-discrimination |
| LGPD | Brazil | Similar to GDPR; ANPD enforcement authority |
| PIPL | China | Data localization requirements; consent-heavy |
| PDPA | Singapore | Consent model, breach notification within 3 days |
| Report Type | Standard | Scope | Key Detail |
|---|---|---|---|
| SOC 1 | SSAE 18 | Financial reporting controls | Controls relevant to user entity's financial statements |
| SOC 2 Type I | SSAE 18 | Trust Service Criteria | Controls designed appropriately — point-in-time assessment |
| SOC 2 Type II | SSAE 18 | Trust Service Criteria | Controls operating effectively — covers 6–12 month period; most relevant for cloud |
| SOC 3 | SSAE 18 | Public summary | Simplified SOC 2 result — shareable publicly, no detailed control descriptions |
| ISAE 3402 | International | Service org controls | International equivalent of SSAE 18 SOC 1 |
Trust Service Criteria (TSC): Security, Availability, Processing Integrity, Confidentiality, Privacy — all or subset can be in scope for SOC 2.
Data Roles:
| Role | Responsibility | GDPR Term |
|---|---|---|
| Owner | Accountable for data; determines classification | — |
| Controller | Determines purpose and means of processing | Data Controller |
| Processor | Processes data on behalf of controller (e.g., CSP) | Data Processor |
| Custodian | Day-to-day management, backup, access controls | — |
| Steward | Data quality, metadata management | — |
Risk Treatment Options (AMSTA):
| Contract Type | Purpose |
|---|---|
| SLA (Service-Level Agreement) | Defines uptime guarantees, performance metrics, remedies/credits for failure |
| MSA (Master Service Agreement) | Overarching legal terms governing the relationship — liability, IP, data ownership |
| SOW (Statement of Work) | Specific deliverables, timelines, and milestones for a particular engagement |
| BAA (Business Associate Agreement) | HIPAA-required agreement between covered entities and processors of PHI |
Critical contract clauses for cloud security:
Six proven mnemonics to lock in the most exam-critical concepts from Domains 5 and 6.
| Item | Value | Context |
|---|---|---|
| GDPR breach notification | 72 hours | To supervisory authority from awareness |
| HIPAA breach notification | 60 days | To HHS and affected individuals |
| SOC 2 Type II period | 6–12 months | Operational effectiveness observation window |
| CCSP passing score | 700/1000 | CAT adaptive scoring |
| CCSP exam duration | 3 hours | 100–150 questions (~25 unscored) |
| Domain 5 weight (2026) | 17% | Increased from 16% in August 2026 update |
| Order of Volatility — start | CPU registers | Most volatile — collect first |
| Cloud pentest — mandatory step | Notify CSP first | Required before any authorized pen test |
10 scenario-based questions. Select an answer, then click Submit to check — then advance to the next question.
Click any card to flip it and reveal the answer. 8 cards covering the highest-yield topics from Domains 5 and 6.
Select the topic areas where you feel least confident — your personalized readiness score and study priorities will appear below.
5.6 — SOC tiers, SIEM/SOAR, AI monitoring, IR PICERL phases, pen testing rules
5.4 — Order of volatility, chain of custody, cloud forensics challenges, ISO 27037
6.1, 6.2 — GDPR, HIPAA, CCPA, DPDPA (India), LGPD, PIPL, eDiscovery, DPIAs
6.3 — SOC 1/2/3 differences, Type I vs. II, ISAE 3402, gap analysis, ISMS PDCA
6.4, 6.5 — Risk treatment AMSTA, data roles, KRIs, SLA/MSA/SOW, right-to-audit
Official documentation, frameworks, and study materials for CCSP Domains 5 and 6.
Official certification page — exam outline, requirements, endorsement process, and August 2026 updates.
isc2.org →Full regulation text and GDPR.eu guides — essential for Domain 6.2 privacy requirements.
gdpr.eu →Official AICPA guidance on SOC 1, SOC 2, and SOC 3 — Trust Service Criteria and report types.
aicpa.org →NIST RMF documentation, SP 800-37, and SP 800-53 security controls — Domain 6.4 risk frameworks.
nist.gov →Information security in supplier relationships — foundational for Domain 6.5 cloud contract design.
iso.org →Adaptive flashcards and vignette questions for CCSP and 30+ other certification exams.
flashgenius.net/register →| Standard | Topic | Domain |
|---|---|---|
| ISO/IEC 27001 | Information Security Management System (ISMS) | 5.3, 6.3 |
| ISO/IEC 27002 | Security controls catalog | 5.3 |
| ISO/IEC 27018 | PII protection in public cloud | 6.2 |
| ISO/IEC 27036 | Supplier/outsourcing security | 6.5 |
| ISO/IEC 27037 | Digital evidence identification & collection | 5.4, 6.1 |
| ISO/IEC 27041 | Forensic investigation assurance | 5.4, 6.1 |
| ISO/IEC 27042 | Digital evidence analysis & interpretation | 5.4, 6.1 |
| ISO/IEC 27043 | Incident investigation principles | 5.4, 6.1 |
| ISO/IEC 27050 | eDiscovery guidance | 6.1 |
| ISO/IEC 20000-1 | IT service management standard | 5.3 |
| ISO 31000 | Risk management principles | 6.4 |
| SSAE 18 | SOC 1, SOC 2, SOC 3 reporting standard | 6.3 |
| ISAE 3402 | International equivalent of SSAE 18 SOC 1 | 6.3 |
| NIST SP 800-53 | Security and privacy controls | 5.3 |
| NIST RMF (SP 800-37) | Risk Management Framework | 6.4 |