FlashGenius Logo FlashGenius
ISC2 CCSP · August 2026 Outline · Domains 5 & 6

CCSP Domains 5 & 6:
Cloud Security Operations + Legal, Risk & Compliance

30% of the exam — master SOC operations, SIEM/SOAR, IR lifecycle, digital forensics, GDPR, HIPAA, SOC 2 audits, and cloud contract design.

★ Domain 5: Cloud Security Ops — 17% ★ Domain 6: Legal, Risk & Compliance — 13%
30%Combined Weight
~30Exam Questions
700Passing Score
CATAdaptive Format
3 hrsExam Duration

Overview — Domains 5 & 6

Two domains, 30% of the exam — operations keeps the lights on securely; legal/compliance keeps the organization out of court.

🆕

What's New in the August 2026 Outline

  • Domain 5 weight increased from 16% → 17% — Cloud Security Operations gets more exam emphasis
  • Domain 4 weight decreased from 17% → 16% (offset shift)
  • AI-powered SIEM/SOAR explicitly called out in Domain 5 §5.6 — "Intelligent monitoring… including Artificial Intelligence (AI)"
  • New AI/ML subsection 1.6 in Domain 1; AI/ML data protection 2.9 in Domain 2
  • OWASP LLM Top-10 added to Domain 4
  • Digital Personal Data Protection Act (DPDPA) added to Domain 6 privacy regulations — India's new privacy law
  • CAT format since October 2025: adaptive 100–150 questions, 3-hour exam, Pearson VUE
🎓 Exam at a Glance — CCSP 2026
CATExam Format
100–150Questions
3 hoursDuration
700/1000Passing Score
#DomainWeight~Questions
1Cloud Concepts, Architecture & Design17%~17
2Cloud Data Security20%~20
3Cloud Platform & Infrastructure Security17%~17
4Cloud Application Security16%~16
★ 5Cloud Security Operations This page17%~17
★ 6Legal, Risk & Compliance This page13%~13
Total100%~100

Adaptive CAT format since October 2025. ~25 of 100–150 questions are unscored pretest items. Testing via Pearson VUE. Effective August 1, 2026 outline.

💡 Why Domains 5 & 6 Matter

Domain 5 — Security Operations (17%)

Operations is where theory meets reality. You'll be tested on running a SOC, managing incident response, conducting digital forensics in cloud environments, and operating security tools like SIEM and SOAR. The 2026 update explicitly adds AI-driven monitoring to the scope.

Domain 6 — Legal, Risk & Compliance (13%)

Cloud crosses borders, and so do laws. Domain 6 tests your ability to navigate conflicting international regulations (GDPR vs. CLOUD Act), design compliant contracts, understand audit report types (SOC 2 vs. SSAE 18), and apply risk treatment strategies in cloud engagements.

📚 CCSP Series Navigation

This page covers the final two domains. Use dedicated pages for the other four domains.

D1: Cloud Concepts & Architecture D2: Cloud Data Security D3: Platform & Infrastructure Security D4: Cloud Application Security ★ D5: Cloud Security Operations ← You are here ★ D6: Legal, Risk & Compliance ← You are here

Core Concepts

Organized by domain sub-objective — click each section to expand detailed content.

Domain 5: Cloud Security Operations 17% · ~17 Questions

Sections 5.1 – 5.6 | Build, operate, and manage cloud security infrastructure, incident response, and SOC operations

5.1 — Build and Implement Physical and Logical Infrastructure

HSM · TPM · Hypervisors
  • HSM (Hardware Security Module): Dedicated tamper-resistant cryptographic hardware. Generates, stores, and manages encryption keys in hardware — cannot be exported. Used for PKI root CAs, payment processing, cloud KMS backing.
  • TPM (Trusted Platform Module): Chip embedded in hardware for secure boot verification, attestation, and key storage. Ensures the boot process hasn't been tampered with.
  • Secure by default: Disable unnecessary services, change all default credentials, apply hardening baselines (CIS Benchmarks) before any deployment to production.
  • Hypervisor Type 1 (bare metal): Runs directly on hardware — VMware ESXi, Microsoft Hyper-V, Xen. Higher performance, preferred in enterprise cloud.
  • Hypervisor Type 2 (hosted): Runs on top of an OS — VirtualBox, VMware Workstation. Lower performance, used for dev/test.
  • Virtual hardware security: SDN (software-defined networking) for network virtualization, storage virtualization, memory isolation between VMs, CPU pinning to prevent side-channel attacks.
  • Guest OS toolsets: VMware Tools / Hyper-V Integration Services improve performance, enable snapshot coordination, and support secure guest-host communication.
  • Management plane: Orchestration tools (Terraform, Ansible, cloud-native APIs) — must be secured; compromise of management plane = full cloud takeover.

5.2 — Operate and Maintain Physical and Logical Infrastructure

Patching · HA · Monitoring
  • Access controls: RDP (Windows remote management), SSH (Unix/Linux), bastion hosts/jumpboxes (single hardened entry point), SSO (single sign-on for admin access), console access (out-of-band management).
  • Secure network configuration: VLANs for traffic segmentation, TLS 1.2+ for encrypted transport, DHCP snooping to prevent rogue DHCP, DNSSEC for DNS integrity, VPN tunnels for secure remote access.
  • Network security controls:
    ControlFunction
    Stateful FirewallTracks connection state; blocks unsolicited traffic
    Next-Gen Firewall (NGFW)Deep packet inspection, app awareness, IPS integration
    IDSDetects and alerts on threats — passive monitoring
    IPSDetects and blocks threats inline — active prevention
    HoneypotDecoy system to lure and study attackers
    Network Security GroupsCloud-native L3/L4 traffic filtering (AWS SG, Azure NSG)
  • OS hardening: CIS Benchmark baselines for Windows/Linux/VMware; remove unnecessary packages, disable unused ports, configure audit logging, monitor for configuration drift.
  • Patch management cycle: Vulnerability identified → assess severity (CVSS) → test patch in non-prod → deploy → verify remediation. Emergency patching bypasses test for critical CVEs.
  • High availability: Clustered hosts with DRS (Dynamic Resource Scheduling), VMware HA, storage clusters (shared SAN/NAS). Maintenance mode migrates VMs before host downtime.
  • Performance monitoring: Network throughput, CPU utilization, storage IOPS, response time, disk health (SMART data), CPU temperature, fan speed — holistic infrastructure health view.
  • Backup and restore: Host-level and guest-OS-level backups, snapshot management (not a substitute for backups), regular restore testing to validate RTO/RPO.

5.3 — Implement Operational Controls and Standards

NIST · ISO 27001 · ITIL
FrameworkPurposeKey Detail
NIST SP 800 SeriesUS federal security standardsSP 800-53 (controls), 800-37 (RMF), 800-171 (CUI)
ISO 27001ISMS standard (certifiable)Annex A controls, PDCA cycle, management commitment required
ISO 27002Security controls catalogImplementation guidance for ISO 27001 Annex A
HIPAAUS healthcare dataAdministrative, Physical, Technical safeguards; BAA required
COBITIT governanceAligns IT with business; governance vs. management processes
CIS ControlsPrioritized security actions18 controls, Implementation Groups 1/2/3; formerly SANS Top 20
COSOInternal control / ERMFive components: Control Environment, Risk Assessment, Control Activities, Information & Communication, Monitoring
ITILIT service managementService lifecycle: Strategy → Design → Transition → Operation → CSI
ISO/IEC 20000-1IT service management standardCertifiable equivalent of ITIL practices

5.4 — Support Digital Forensics

Order of Volatility · Chain of Custody

Order of Volatility — collect most volatile evidence first:

  1. CPU registers & cache (most volatile — lost instantly on shutdown)
  2. RAM / main memory (process data, active connections, encryption keys)
  3. Swap space / virtual memory
  4. Local disk storage
  5. Remote logs / network storage
  6. Archives / backup media (least volatile)
  • Write blockers: Hardware or software tools that prevent any writes to the evidence drive during forensic imaging — maintains integrity.
  • Forensic imaging: Bit-for-bit copy of storage media (dd command, FTK Imager). Hash (MD5/SHA-256) taken before and after — must match to prove integrity.
  • Chain of custody: Document every person who handles evidence — who, what, when, where, why. Break in chain = evidence potentially inadmissible.
  • Cloud forensics challenges:
    • Multi-tenancy: Evidence co-mingled with other tenants' data — isolation and separation required
    • Jurisdiction: Data stored across multiple countries — legal authority to access varies
    • Ephemeral instances: Auto-scaling and serverless resources may terminate before forensics can be conducted
    • CSP cooperation: Cloud provider must be engaged; legal process (subpoena/warrant) may be required
  • Cloud-specific tools: Cloud provider APIs for audit log/trail extraction, snapshot acquisition for VM forensics, VPC flow logs for network forensics.
  • ISO standards: ISO/IEC 27037 (identification/collection), 27041 (assurance), 27042 (analysis), 27043 (investigation principles).

5.5 — Manage Communication with Relevant Parties

Breach Notification · Stakeholders
StakeholderCommunication Focus
Vendors/CSPSLA reporting, security incident notification, audit access coordination
CustomersTransparency about incidents, GDPR 72-hour breach notification, service status pages
PartnersShared responsibility model coordination, API security, supply chain incidents
RegulatorsMandatory breach reporting, audit cooperation, compliance documentation requests
Board/ExecutivesBusiness risk framing, incident summaries, financial impact, reputational risk
Legal/PRLitigation hold notices, media communications during incidents, attorney-client privilege

Key: GDPR requires breach notification to supervisory authority within 72 hours of becoming aware. Notification to affected individuals required if likely to result in high risk.

5.6 — Manage Security Operations AI Added 2026

SOC · SIEM · SOAR · IR · Pen Test
  • SOC structure: Tier-based analyst model — L1 (triage/alert screening) → L2 (investigation/correlation) → L3 (threat hunting/forensics). 24/7 monitoring with documented playbooks.
  • AI/ML in SOC (2026 explicit): Artificial intelligence for anomaly detection, UEBA (User and Entity Behavior Analytics) to baseline normal behavior and flag deviations, ML-powered threat detection in SIEM/SOAR.
  • SIEM: Centralized log aggregation, correlation across systems, real-time alerting, threat intelligence integration (IOCs, TTPs). Examples: Splunk, Microsoft Sentinel, IBM QRadar.
  • SOAR: Security Orchestration, Automation and Response — automates repetitive SOC tasks, orchestrates response playbooks, integrates with SIEM and other tools. Reduces MTTR (mean time to respond).
  • Incident Response (PICERL):
    1. Preparation — policies, playbooks, tools, training
    2. Identification — detect and confirm incident exists
    3. Containment — limit spread (short-term: isolate; long-term: rebuild)
    4. Eradication — remove root cause (malware, backdoors, vulnerabilities)
    5. Recovery — restore and verify systems back to normal
    6. Lessons Learned — post-incident review, update procedures
  • Vulnerability assessments: Scheduled scanning, authenticated (inside view) vs. unauthenticated (attacker view), cloud-native tools (AWS Inspector, Azure Defender for Cloud, GCP Security Command Center).
  • Penetration testing: Black box (no knowledge), gray box (partial), white box (full knowledge). Cloud-specific: must notify CSP before testing — cloud providers have rules of engagement; unauthorized pentesting violates ToS.
  • ITSM processes tested in this domain: Change management, Incident management, Problem management (root cause analysis), Configuration management (CMDB), Release management, Service-level management, Availability management, Capacity management, Continual Service Improvement (CSI).

Domain 6: Legal, Risk and Compliance 13% · ~13 Questions

Sections 6.1 – 6.5 | Navigate international law, privacy regulations, audit frameworks, risk management, and cloud contract design

6.1 — Legal Requirements and Unique Cloud Risks

Jurisdiction · CLOUD Act · eDiscovery
  • Conflicting international legislation: Data stored in Country A is subject to Country A's laws — even if the data belongs to a citizen of Country B. US CLOUD Act allows US authorities to demand data from US companies regardless of where stored, potentially conflicting with GDPR.
  • Jurisdiction analysis: Where is the data physically stored? Which country's law applies to disputes? What are the legal remedies available? Critical in multi-cloud, multi-region deployments.
  • Legal holds: When litigation is anticipated, automatic deletion and retention policies must be suspended to preserve potentially relevant data (litigation hold). Cloud automation can inadvertently destroy evidence.
  • Privacy laws by geography:
    LawJurisdictionKey Feature
    GDPREU/EEA72-hr notification, right to erasure, data portability
    CCPA/CPRACalifornia, USARight to know, opt-out of sale, non-discrimination
    LGPDBrazilSimilar to GDPR; ANPD enforcement authority
    PIPLChinaData localization requirements; consent-heavy
    PDPASingaporeConsent model, breach notification within 3 days
  • eDiscovery in cloud: ISO/IEC 27050 governs eDiscovery guidance. Challenges: distributed storage across regions, encrypted data (must preserve keys), third-party holds, API-based data retrieval.
  • Forensics ISO standards: 27037 (identification/collection), 27041 (assurance/investigation), 27042 (analysis/interpretation), 27043 (incident investigation principles).

6.2 — Privacy Requirements

GDPR · HIPAA · DPDPA (New 2026)
  • PHI (Protected Health Information): Regulated by HIPAA — 18 identifiers, de-identification standards, BAA (Business Associate Agreement) required for cloud processors.
  • PII (Personally Identifiable Information): Regulated by GDPR, CCPA, and others — any information that identifies or can identify an individual.
  • FERPA: Family Educational Rights and Privacy Act — US student education records; schools must have written consent before disclosing records.
  • PIPEDA: Canada's Personal Information Protection and Electronic Documents Act — consent-based, breach notification requirements.
  • GDPR key obligations: Lawful basis for processing, data minimization, purpose limitation, storage limitation, 72-hour breach notification to supervisory authority, data subject rights (access, erasure, portability, rectification).
  • DPDPA (Digital Personal Data Protection Act) New 2026: India's comprehensive privacy law — data fiduciaries (controllers), data principals (individuals), consent framework, data localization considerations, significant data fiduciary designation.
  • Cross-border transfer mechanisms: GDPR Standard Contractual Clauses (SCCs), adequacy decisions, Binding Corporate Rules (BCRs) for intra-group transfers.
  • Privacy Impact Assessment (PIA) / DPIA: GDPR mandates Data Protection Impact Assessments for high-risk processing activities (large-scale, sensitive data, systematic monitoring). Must be completed before processing begins.
  • ISO/IEC 27018: Code of practice for PII protection in public cloud — controls for cloud processors acting as PII processors.
  • GAPP: Generally Accepted Privacy Principles — 10 principles from AICPA/CPA Canada used as privacy framework baseline.

6.3 — Audit Processes and Cloud Adaptations

SOC 2 Type I vs. II · SSAE 18 · ISAE 3402
Report TypeStandardScopeKey Detail
SOC 1SSAE 18Financial reporting controlsControls relevant to user entity's financial statements
SOC 2 Type ISSAE 18Trust Service CriteriaControls designed appropriately — point-in-time assessment
SOC 2 Type IISSAE 18Trust Service CriteriaControls operating effectively — covers 6–12 month period; most relevant for cloud
SOC 3SSAE 18Public summarySimplified SOC 2 result — shareable publicly, no detailed control descriptions
ISAE 3402InternationalService org controlsInternational equivalent of SSAE 18 SOC 1

Trust Service Criteria (TSC): Security, Availability, Processing Integrity, Confidentiality, Privacy — all or subset can be in scope for SOC 2.

  • Cloud audit challenges: Multi-tenancy prevents physical inspection of infrastructure; CSPs restrict scope of penetration testing; shared responsibility means audit scope is split.
  • Right-to-audit clause: Contract provision giving the customer the right to audit the CSP's security controls — critical in cloud contracts. Without it, customers must rely solely on third-party audit reports.
  • Gap analysis: Compare current control posture against target framework — identifies missing or deficient controls. Risk and Control Self-Assessment (RCSA) is the internal version.
  • ISO 27001 ISMS: Plan (scope, risk assessment) → Do (implement controls) → Check (monitor, audit) → Act (correct, improve) — continuous PDCA cycle.

6.4 — Cloud Implications for Enterprise Risk Management

Data Roles · Risk Treatment · KRIs

Data Roles:

RoleResponsibilityGDPR Term
OwnerAccountable for data; determines classification
ControllerDetermines purpose and means of processingData Controller
ProcessorProcesses data on behalf of controller (e.g., CSP)Data Processor
CustodianDay-to-day management, backup, access controls
StewardData quality, metadata management

Risk Treatment Options (AMSTA):

  • Avoid: Don't perform the risky activity at all
  • Mitigate: Implement controls to reduce likelihood or impact
  • Share: Distribute risk across parties (shared responsibility model)
  • Transfer: Shift financial risk to a third party — cyber insurance, contractual liability
  • Accept: Tolerate the residual risk; document the decision
  • Risk frameworks: ISO 31000 (risk management principles), NIST RMF (federal), FAIR (quantitative risk analysis), OCTAVE (asset-centric, operationally focused).
  • KRIs (Key Risk Indicators): Metrics that signal increasing risk — patch lag time, open critical vulnerabilities, failed access attempts. Different from KPIs (performance) and KCIs (control effectiveness).
  • Risk appetite vs. tolerance: Appetite = how much risk the organization is willing to accept strategically. Tolerance = the acceptable deviation from risk appetite before action is required.
  • Regulatory transparency: GDPR 72-hour breach notification; HIPAA 60-day notification to HHS; SOX financial controls disclosure; state breach notification laws vary widely.

6.5 — Outsourcing and Cloud Contract Design

SLA · MSA · Vendor Management
Contract TypePurpose
SLA (Service-Level Agreement)Defines uptime guarantees, performance metrics, remedies/credits for failure
MSA (Master Service Agreement)Overarching legal terms governing the relationship — liability, IP, data ownership
SOW (Statement of Work)Specific deliverables, timelines, and milestones for a particular engagement
BAA (Business Associate Agreement)HIPAA-required agreement between covered entities and processors of PHI

Critical contract clauses for cloud security:

  • Right-to-audit: Customer may audit or commission audit of CSP controls
  • Data ownership & portability: Who owns the data; export formats; data return on termination
  • Termination clauses: Notice periods, data deletion timelines, transition assistance
  • Breach notification: CSP obligations to notify customer within defined timeframes
  • Escrow agreements: Source code or data in escrow in case CSP goes bankrupt
  • Cyber risk insurance: Coverage requirements, incident response coverage
  • Litigation support: CSP obligations to preserve evidence for legal holds
  • Vendor lock-in risk: Proprietary APIs, data formats — mitigate with portability requirements and open standards
  • ISO/IEC 27036: Standard for information security in supplier relationships — governs the risk management approach for outsourcing and cloud procurement.

Memory Hooks

Six proven mnemonics to lock in the most exam-critical concepts from Domains 5 and 6.

Hook 1 — Domain 5.6

IR Lifecycle — PICERL

PICERL
Preparation → Identification → Containment → Eradication → Recovery → Lessons Learned
"Please Identify Contained Enemies, Return Lessons"
Hook 2 — Domain 6.3

SOC 2 Types — I vs. II

I · II
Type I = Controls designed correctly RIGHT NOW (point-in-time)
Type II = Controls working correctly OVER TIME (6–12 months)
"I is Instant, II is Interval"
Hook 3 — Domain 6.4

Data Roles — OCPCS

OCPCS
Owner → Controller → Processor → Custodian → Steward
"Organizations Control Processing, Custodians Steward"
Hook 4 — Domain 6.1 & 6.2

GDPR Key Numbers

72-30-✗
72 hours — breach notification to supervisory authority
30 days — respond to subject access requests
Right to erasure — "right to be forgotten"
"72-30-erase — GDPR's three big numbers"
Hook 5 — Domain 6.4

Risk Treatment — AMSTA

AMSTA
Avoid → Mitigate → Share → Transfer → Accept
"A Manager Sometimes Takes Action"
Hook 6 — Domain 5.4

Order of Volatility

CRSDRA
CPU registers → RAM → Swap → Disk → Remote logs → Archives
"Cops Really Should Document Records Always"
⚡ Quick-Reference: Critical Numbers & Thresholds
ItemValueContext
GDPR breach notification72 hoursTo supervisory authority from awareness
HIPAA breach notification60 daysTo HHS and affected individuals
SOC 2 Type II period6–12 monthsOperational effectiveness observation window
CCSP passing score700/1000CAT adaptive scoring
CCSP exam duration3 hours100–150 questions (~25 unscored)
Domain 5 weight (2026)17%Increased from 16% in August 2026 update
Order of Volatility — startCPU registersMost volatile — collect first
Cloud pentest — mandatory stepNotify CSP firstRequired before any authorized pen test

Vignette Quiz

10 scenario-based questions. Select an answer, then click Submit to check — then advance to the next question.

Flashcards

Click any card to flip it and reveal the answer. 8 cards covering the highest-yield topics from Domains 5 and 6.

Domain 6.3
📋
What is the difference between SOC 2 Type I and SOC 2 Type II?
Tap to flip
Answer
Type I: Auditor validates that controls are designed appropriately — assessed at a single point in time. "Are controls present and correct?"

Type II: Auditor validates that controls operated effectively over a 6–12 month period. "Did the controls actually work consistently?" — Most relevant and trusted for cloud security procurement.
Tap to flip back
Domain 5.4
🔬
What is the Order of Volatility in digital forensics?
Tap to flip
Answer
Collect most volatile evidence first:

1. CPU registers & cache
2. RAM / main memory
3. Swap space / virtual memory
4. Local disk storage
5. Remote logs / network storage
6. Archives & backup media

Mnemonic: CRSDRA — "Cops Really Should Document Records Always"
Tap to flip back
Domain 6.2
⏱️
What is the GDPR 72-hour rule and who is it owed to?
Tap to flip
Answer
Under GDPR Article 33, a data controller must notify the supervisory authority (the relevant Data Protection Authority) within 72 hours of becoming aware of a personal data breach — if it's likely to result in a risk to individuals' rights and freedoms.

Notification to affected individuals (Article 34) is required only when there is a high risk to their rights — and must be done "without undue delay."
Tap to flip back
Domain 6.5
📝
What is a Right-to-Audit clause and why is it critical in cloud contracts?
Tap to flip
Answer
A right-to-audit clause gives the cloud customer (or a designated third party) the contractual right to audit the CSP's security controls, processes, and compliance posture.

Critical because: In cloud, customers lose direct control over infrastructure. Without this clause, the customer must rely solely on the CSP's own audit reports (SOC 2). The clause may be negotiated to allow review of SOC 2 reports in lieu of direct physical audit.
Tap to flip back
Domain 5.6
📡
What is the difference between SIEM and SOAR?
Tap to flip
Answer
SIEM (Security Information and Event Management): Centralized log aggregation, correlation across data sources, real-time alerting, dashboards. Detects and surfaces threats to analysts. Examples: Splunk, Microsoft Sentinel, IBM QRadar.

SOAR (Security Orchestration, Automation and Response): Automates response workflows, orchestrates multi-tool actions via playbooks, reduces MTTR. Responds to threats automatically or with minimal analyst effort.

They are complementary — SIEM detects, SOAR responds.
Tap to flip back
Domain 5.1
🔐
What is an HSM (Hardware Security Module) and what is its primary security benefit?
Tap to flip
Answer
An HSM is a dedicated, tamper-resistant cryptographic hardware device that generates, stores, and manages cryptographic keys in hardware.

Primary security benefit: Keys cannot be exported in plaintext — all cryptographic operations occur inside the HSM. Physical tampering triggers automatic key destruction.

Use cases: PKI root CA protection, payment card processing, cloud KMS backing (AWS CloudHSM, Azure Dedicated HSM), code signing.
Tap to flip back
Domain 6.4
👥
What is the GDPR distinction between a Data Controller and a Data Processor?
Tap to flip
Answer
Data Controller: Determines the purposes and means of processing personal data. Bears primary compliance obligations under GDPR. Example: the organization that collects customer data.

Data Processor: Processes personal data on behalf of the controller, following the controller's instructions. Example: the cloud provider or SaaS vendor storing/processing the data.

Processors must sign a Data Processing Agreement (DPA) with the controller. Both can face GDPR fines for violations.
Tap to flip back
Domain 5.6
🚨
List the six phases of the PICERL Incident Response lifecycle in order.
Tap to flip
Answer
1. Preparation — policies, playbooks, tools, training before incident
2. Identification — detect and confirm an incident exists
3. Containment — limit spread (short-term isolation; long-term stabilization)
4. Eradication — remove root cause (malware, backdoors, vulnerabilities)
5. Recovery — restore and verify systems to normal operation
6. Lessons Learned — post-incident review; update procedures and controls

Mnemonic: PICERL — "Please Identify Contained Enemies, Return Lessons"
Tap to flip back

Study Advisor

Select the topic areas where you feel least confident — your personalized readiness score and study priorities will appear below.

☁️ Cloud Security Ops & SOC

5.6 — SOC tiers, SIEM/SOAR, AI monitoring, IR PICERL phases, pen testing rules

🔬 Digital Forensics & Evidence

5.4 — Order of volatility, chain of custody, cloud forensics challenges, ISO 27037

⚖️ Legal Frameworks & Privacy Laws

6.1, 6.2 — GDPR, HIPAA, CCPA, DPDPA (India), LGPD, PIPL, eDiscovery, DPIAs

📊 Audit Types — SOC 2, SSAE, ISAE

6.3 — SOC 1/2/3 differences, Type I vs. II, ISAE 3402, gap analysis, ISMS PDCA

📋 Risk Management & Cloud Contracts

6.4, 6.5 — Risk treatment AMSTA, data roles, KRIs, SLA/MSA/SOW, right-to-audit

Estimated Readiness for Domains 5 & 6

Resources

Official documentation, frameworks, and study materials for CCSP Domains 5 and 6.

📖 Key Standards Referenced in Domains 5 & 6
StandardTopicDomain
ISO/IEC 27001Information Security Management System (ISMS)5.3, 6.3
ISO/IEC 27002Security controls catalog5.3
ISO/IEC 27018PII protection in public cloud6.2
ISO/IEC 27036Supplier/outsourcing security6.5
ISO/IEC 27037Digital evidence identification & collection5.4, 6.1
ISO/IEC 27041Forensic investigation assurance5.4, 6.1
ISO/IEC 27042Digital evidence analysis & interpretation5.4, 6.1
ISO/IEC 27043Incident investigation principles5.4, 6.1
ISO/IEC 27050eDiscovery guidance6.1
ISO/IEC 20000-1IT service management standard5.3
ISO 31000Risk management principles6.4
SSAE 18SOC 1, SOC 2, SOC 3 reporting standard6.3
ISAE 3402International equivalent of SSAE 18 SOC 16.3
NIST SP 800-53Security and privacy controls5.3
NIST RMF (SP 800-37)Risk Management Framework6.4
⚡ FlashGenius

Ready to Ace the CCSP Exam?

Adaptive AI-powered flashcards and vignette practice for all 6 CCSP domains — plus 30+ other certs.