CISM Β· Domain 1 of 4 Β· 17% of Exam

Information Security Governance

Security strategy alignment, governance frameworks, policy hierarchy, roles & responsibilities, and board reporting β€” the management foundation every CISM candidate must command.

Study with Practice Tests β†’
πŸ“‹ 150 Questions Β· 4 Hours 🎯 450/800 Passing Score πŸ“– Domain 1 of 4 ⚑ ISACA CISM
Information Security Governance

Domain 1 covers how organizations establish, direct, and oversee their information security programs at the executive and board level.

CISM Exam Focus (17%): Governance is the strategic foundation of CISM. Questions test your ability to think like a security manager advising senior leadership β€” not a technician implementing controls. Expect scenario-based questions about aligning security with business objectives, reporting to the board, and selecting appropriate governance structures.

βš–οΈ Governance vs. Management β€” The Most Critical Distinction
Governance
WhoBoard of Directors, Senior Executive Leadership
FocusDirection, oversight, accountability β€” WHAT and WHY
ActivitiesSet risk appetite, approve strategy, hold management accountable, review performance
COBIT termEDM β€” Evaluate, Direct, Monitor
FrequencyPeriodic (quarterly/annually)
Management
WhoCISO, Security Managers, IT Leadership
FocusPlanning, building, running, monitoring β€” HOW
ActivitiesImplement controls, manage incidents, report metrics, operate the security program
COBIT termAPO, BAI, DSS, MEA domains
FrequencyOngoing / daily operations

Exam tip: CISM questions often ask what the board or senior management "should" do. The answer almost always involves oversight, accountability, and strategic direction β€” NOT technical implementation.

🎯 Six Information Security Governance Outcomes (ISACA)
01
Strategic Alignment
Security aligned with business goals and objectives
02
Risk Management
Risk reduced to acceptable levels
03
Resource Management
Security resources used efficiently and effectively
04
Performance Management
Security activities measured and reported
05
Value Delivery
Security investments optimized for business value
06
Assurance Integration
Processes assure all requirements are met
⚑ High-Yield Facts for Exam Day
ConceptMust-Know Detail
Primary governance goalAlign information security with business objectives β€” not prevent all incidents or ensure compliance
Board accountabilityBoard sets risk appetite and is ultimately accountable; cannot delegate accountability (only responsibility)
CISO primary roleDevelop and manage the information security program; translate business risk into security requirements
Policy hierarchy orderPolicy β†’ Standard β†’ Procedure β†’ Guideline (Baseline sits alongside Standards)
Mandatory vs optionalPolicy, Standard, Procedure = MANDATORY; Guideline = advisory/optional
KGI vs KPI vs KRIKGI = goal achieved?; KPI = progress toward goal; KRI = risk level / early warning
Three lines of defense1st = Operations (own risk); 2nd = Risk/Compliance (oversight); 3rd = Internal Audit (assurance)
Security strategy first stepUnderstand business objectives and risk appetite FIRST β€” then gap analysis, then roadmap
Steering committee purposeCross-functional oversight body that provides strategic direction; not operational decision-making
COBIT governance domainEDM = Evaluate, Direct, Monitor (the governance domain, not management)
ISO 27001 requirementEstablish, implement, maintain, and continually improve an ISMS (Plan-Do-Check-Act cycle)
Centralized vs decentralizedCentralized = consistent controls, easier oversight; Decentralized = flexible, business-unit autonomy
Security Strategy & Alignment

How a CISM candidate develops, communicates, and aligns a security strategy with organizational business objectives.

πŸ—ΊοΈ Security Strategy Development β€” Step by Step
1
Understand Business Objectives & Risk Appetite
Start with the business β€” what are the critical assets, processes, and objectives? What level of risk is acceptable? Security strategy must derive from business strategy, not the other way around.
2
Assess Current State (Gap Analysis)
Evaluate existing controls, capabilities, and maturity. Compare against a desired future state or benchmark (e.g., NIST CSF, ISO 27001). Identify gaps between where you are and where you need to be.
3
Define Desired Future State
Establish target security maturity, control objectives, and outcomes aligned with business risk appetite. Document what "secure enough" looks like for this organization.
4
Develop the Roadmap
Create a prioritized action plan to close identified gaps. Include timelines, resource requirements, and dependencies. Prioritize by risk reduction impact and business criticality.
5
Obtain Senior Management Approval & Resources
Present the strategy with a business case β€” frame security investments in terms of risk reduction and business value, not technical capabilities. Board/executive buy-in is critical.
6
Implement, Monitor & Communicate
Execute the roadmap, measure progress via KGIs and KPIs, report to governance bodies, and update the strategy as business objectives or the threat landscape evolves.
πŸ“Š Security Metrics β€” KGI, KPI, KRI
KGI
Key Goal Indicator
Measures whether a goal was ultimately achieved. Backward-looking outcome metric.
Example: "99.9% uptime achieved" or "Zero critical incidents this quarter"
KPI
Key Performance Indicator
Measures progress toward a goal. Leading indicator of whether KGIs will be met.
Example: "Patch compliance rate 94%" or "Mean time to detect = 4 hours"
KRI
Key Risk Indicator
Measures risk levels. Early warning signal when risk is approaching threshold β€” triggers action.
Example: "% systems unpatched >30 days" or "Number of phishing clicks per week"
BSC
Balanced Scorecard
Four perspectives: Financial, Customer, Internal Process, Learning & Growth β€” holistic view of program performance.
Useful for board reporting: links security to business value across all dimensions

Exam rule of thumb: If the question asks "how do you know if the security GOAL was achieved?" β†’ KGI. If it asks for an "early warning" or "risk level indicator" β†’ KRI. If it asks for "progress toward the goal" β†’ KPI.

πŸ“‹ Reporting to Senior Management & the Board
AudienceWhat They NeedLanguage to Use
Board of DirectorsRisk posture, strategic alignment, major incidents, regulatory exposure, budget overviewBusiness risk, financial impact, regulatory liability β€” NOT technical jargon
Senior Management (C-suite)Program effectiveness, KGIs vs targets, key risks requiring decisions, resource needsBusiness outcomes, risk reduction, ROI β€” frame in business terms
Steering CommitteeProgram status, prioritization decisions, cross-functional dependencies, escalationsProject status, risk appetite alignment, resource trade-offs
Operational ManagementKPIs, compliance status, incident metrics, control effectivenessOperational metrics, specific control gaps, action items

Key principle: Always translate security concepts into business risk language for senior audiences. "We have 200 unpatched servers" β†’ "We have a high likelihood of a breach that could cost $X and disrupt operations for Y days."

Governance Frameworks

The major frameworks used to structure information security governance programs β€” their purpose, scope, and key differentiators.

COBIT 2019

Control Objectives for Information and Related Technologies

IT governance and management framework by ISACA. Defines governance system with 40 governance/management objectives across 6 domains.

  • Governance domain (EDM): Evaluate, Direct, Monitor β€” board-level
  • Management domains: APO (align, plan, organize), BAI (build, acquire, implement), DSS (deliver, service, support), MEA (monitor, evaluate, assess)
  • Principle: Tailored to organization's needs using design factors
  • CISM connection: COBIT aligns governance with business objectives β€” core CISM concept

ISO/IEC 27001

Information Security Management System Standard

International standard for establishing, implementing, maintaining, and continually improving an ISMS. Only information security framework that offers third-party certification.

  • PDCA cycle: Plan β†’ Do β†’ Check β†’ Act (continual improvement)
  • Annex A: 93 security controls (ISO 27002 provides implementation guidance)
  • Requires formal risk assessment and Statement of Applicability (SoA)
  • ISO 27001 = requirements; ISO 27002 = code of practice/guidance

NIST Cybersecurity Framework (CSF)

NIST CSF v1.1 / v2.0

Voluntary framework for managing cybersecurity risk. Originally for critical infrastructure; now widely adopted. CSF 2.0 added a 6th function.

  • CSF 1.1 β€” 5 Functions: Identify, Protect, Detect, Respond, Recover
  • CSF 2.0 β€” 6 Functions: Added Govern as the overarching function
  • Framework Core, Tiers (1–4), and Profiles
  • Voluntary; not a certification standard; excellent for gap analysis

NIST SP 800-53

Security and Privacy Controls for Federal Systems

Comprehensive control catalog for US federal information systems (FISMA compliance). Widely used beyond government as a detailed control reference.

  • 20 control families (AC, AU, AT, CA, CM, CP, IA, IR, MA, MP, PE, PL, PM, PS, RA, SA, SC, SI, SR, PT)
  • Three impact levels: Low, Moderate, High
  • Rev 5 added privacy controls and supply chain risk management
  • More prescriptive than NIST CSF β€” used for compliance, not just assessment

ISO/IEC 31000

Risk Management β€” Guidelines

Enterprise risk management framework β€” not security-specific. Provides principles and guidelines for risk management applicable across any organization.

  • Principles, Framework, and Process
  • Risk process: Scope β†’ Assessment β†’ Treatment β†’ Monitoring β†’ Communication
  • Used by CISM candidates to contextualize security risk within enterprise risk
  • Predecessor to many organization-specific ERM frameworks

ITIL 4

Information Technology Infrastructure Library

IT service management framework β€” not security-specific but overlaps with security governance through service design and continual improvement.

  • Service value system (SVS) and four dimensions model
  • Security management practice is one of 34 ITIL practices
  • CISM relevance: ITIL processes underpin many security operations (incident, change, problem management)
  • Complementary to ISO 27001 β€” ITIL handles the service delivery context
πŸ“Š Framework Quick Comparison
FrameworkFocusCertification?Mandatory?Best Used For
COBIT 2019IT Governance & ManagementNo (audits possible)NoAligning IT/security with business; governance structure
ISO 27001ISMS / Information SecurityYes βœ“Sometimes contractualDemonstrating security maturity to customers/regulators
NIST CSFCybersecurity RiskNoNo (voluntary)Gap analysis, risk communication, US critical infrastructure
NIST 800-53Security ControlsNo (FISMA compliance)Yes (US federal)Detailed control requirements; federal agency compliance
ISO 31000Enterprise Risk ManagementNoNoEnterprise-wide risk framework; ERM integration
ITIL 4IT Service ManagementYes (individual)NoService management processes; operational integration
πŸ›‘οΈ Three Lines of Defense Model
1st
Business Operations
IT teams, business unit managers, employees
Own and manage risks daily. Implement and operate controls. First to identify and respond to control failures.
2nd
Risk & Compliance
Information Security, Risk Management, Legal, Compliance
Oversight and challenge function. Sets policy, monitors first-line controls, reports to management. Security function sits here.
3rd
Internal Audit
Internal Audit function
Independent assurance to the board and audit committee. Evaluates effectiveness of first and second line controls. Must remain independent.

CISM exam note: The information security function sits in the second line. It provides oversight of the business (first line) but is itself subject to audit by the third line. The board receives assurance from all three lines, but especially the third.

Roles, Responsibilities & Policy Hierarchy

Who is accountable for what β€” and how the policy framework cascades from board direction to operational procedures.

πŸ‘₯ Security Governance Roles & Responsibilities
RoleAccountability / ResponsibilityCISM Key Points
Board of DirectorsUltimate accountability for the organization including security; fiduciary duty; sets risk appetiteCannot delegate accountability β€” only responsibility. Receives reports from management and audit.
CEO / Executive LeadershipOrganizational accountability for security program; approves security strategy and budget; sets cultureAccountable to the board; delegates management of security to CISO
Steering CommitteeCross-functional oversight body; strategic direction; prioritization; escalation path; bridges security and businessNot operational β€” provides strategic guidance and removes barriers. Typically includes CISO, CIO, CFO, business unit heads.
CISODevelop and manage the information security program; advise senior management; translate risk to business impactPrimary CISM role β€” responsible for the program, accountable to executive leadership
Information Security ManagerDay-to-day management of security operations, controls, teams, and projectsImplements what the CISO defines; manages operational security activities
Data/Information OwnerBusiness executive accountable for specific data sets; approves access, classification, and useAccountability for data β€” not the IT team. The business owns its data.
Data CustodianIT/technical staff responsible for implementing and maintaining controls defined by the data ownerResponsibility without accountability; implements the owner's decisions
UsersComply with security policies; report incidents; protect assets they useFirst line of defense; security awareness training targets this group
Internal AuditIndependent assurance that controls are effective; reports to audit committee of the boardMust remain independent β€” should NOT report to the CISO
πŸ“„ Security Policy Hierarchy
Policy
High-level statements of management intent, direction, and principles. States what must be achieved and why. Approved by senior management or board. Technology-neutral.
MANDATORY
Standard
Specific, measurable requirements that support the policy. States how much β€” minimum levels, required configurations, specific controls. Uniform across the organization.
MANDATORY
Baseline
Minimum security configuration levels for systems, platforms, or technologies. Often derived from standards (e.g., CIS Benchmarks). Technology-specific floor of security.
MANDATORY
Procedure
Step-by-step instructions for performing specific tasks to achieve the standard. States how. Operational and often system-specific. May change frequently.
MANDATORY
Guideline
Recommended (but not mandatory) practices. Provides flexibility and best-practice suggestions. Users should follow guidelines but are not required to.
ADVISORY

Mnemonic: Please Send Better Policy Guidance β€” Policy, Standard, Baseline, Procedure, Guideline. Only the Guideline is optional.

✏️ What a Good Information Security Policy Contains

Statement of Purpose

Why the policy exists β€” the business rationale and what it protects. Establishes the intent and context for all requirements that follow.

Scope & Applicability

Who and what the policy applies to β€” all employees? Contractors? Specific systems? Define boundaries explicitly to avoid ambiguity.

Roles & Responsibilities

Who is responsible for compliance, enforcement, exceptions, and maintenance of the policy. Assigns clear ownership.

Compliance & Enforcement

Consequences of non-compliance; how violations are reported and handled; exception process for approved deviations.

References

Related standards, procedures, regulations, and other policies that support or are supported by this policy. Provides the governance linkage.

Review & Maintenance

How often the policy is reviewed, who approves revisions, and what triggers an out-of-cycle review (new regulation, major incident, etc.).

πŸ—οΈ Security Governance Organizational Structures
StructureDescriptionAdvantagesDisadvantages
CentralizedSingle security team controls all security decisions and standards across the orgConsistent controls; efficient; easier oversight; clear accountabilityLess business-unit flexibility; may be seen as bottleneck; slower response to local needs
DecentralizedEach business unit manages its own security with its own staff and controlsFlexible; business-unit ownership; faster local decisionsInconsistent controls; duplication of effort; harder to ensure enterprise-wide standards
Hybrid (Federated)Central team sets standards and frameworks; business units implement locally with central oversightBalances consistency with flexibility; scalable; most common in large organizationsComplex coordination; requires strong governance mechanisms to ensure consistency

CISM exam preference: Hybrid/federated model is generally the "best answer" for large or multinational organizations β€” balances control with business agility.

Practice Quiz

10 CISM-style scenario questions covering Domain 1: Information Security Governance.

Memory Hooks

Mnemonics and mental models built for the CISM management mindset.

πŸ“„ Policy Hierarchy

"Please Send Better Policy Guidance"

Policy β†’ Standard β†’ Baseline β†’ Procedure β†’ Guideline. Everything except the Guideline is mandatory. Policy = WHAT, Standard = HOW MUCH, Procedure = HOW, Guideline = SUGGESTION.

βš–οΈ Governance vs Management

"Board = WHAT & WHY. CISO = HOW."

The Board and senior executives govern β€” they set direction, approve strategy, hold people accountable. The CISO and security team manage β€” they plan, build, and run the program. COBIT's EDM (Evaluate, Direct, Monitor) = governance domain.

πŸ“Š Metric Types

"KGI = Did we win? KPI = Are we winning? KRI = Are we in danger?"

KGI measures goal achievement (backward-looking). KPI measures progress toward goals (leading indicator). KRI measures risk levels and triggers early warning when thresholds are breached. All three serve different audiences and purposes.

πŸ›‘οΈ Three Lines of Defense

"Operate β†’ Oversee β†’ Assure"

1st Line = Business operations (own and manage risk). 2nd Line = Security & compliance (oversee and challenge). 3rd Line = Internal audit (independent assurance to board). Security sits in the 2nd line β€” it oversees but is itself overseen by audit.

🎯 Security Strategy β€” First Step

"Business first. Always."

The FIRST step in developing a security strategy is ALWAYS understanding the business objectives and risk appetite. Never start with technology, compliance requirements, or penetration testing. Security strategy must derive from and support business strategy.

πŸ“£ Board Communication

"Translate risk into dollars and decisions"

Never present technical metrics to the board. Translate everything into business risk, financial impact, and required decisions. "200 unpatched servers" β†’ "High probability of breach resulting in $X loss and regulatory fines." The board needs to decide, not understand.

πŸ“‹ Complete High-Yield Reference
TopicKey Fact
Primary governance objectiveAlign security with business objectives
6 governance outcomesStrategic Alignment, Risk Management, Resource Management, Performance Management, Value Delivery, Assurance Integration
Board cannot delegateAccountability (only responsibility can be delegated)
COBIT governance functionsEDM = Evaluate, Direct, Monitor
ISO 27001 cyclePDCA = Plan, Do, Check, Act
NIST CSF v2.0 new functionGovern (added as 6th function; the other 5 are Identify, Protect, Detect, Respond, Recover)
Only mandatory in hierarchyPolicy, Standard, Baseline, Procedure are mandatory; Guideline is advisory
Data owner vs custodianOwner = business accountability; Custodian = technical responsibility for protection
Internal audit independenceMust NOT report to the CISO β€” reports to board/audit committee
KRI purposeEarly warning indicator β€” triggers action before risk threshold is breached
Steering committeeCross-functional strategic oversight β€” not operational; bridges security and business
Best governance structure (large org)Hybrid/federated β€” central standards with business-unit implementation
Flashcards

Click a card to flip it and reveal the answer.

Governance Fundamentals
What is the PRIMARY objective of an information security governance program, and how does it differ from management?
Tap to reveal ↓
Answer
Primary objective: Align information security with business objectives to protect and deliver value to the organization.

Governance (Board/Executives) = sets direction, risk appetite, accountability β€” WHAT & WHY
Management (CISO/Teams) = plans, implements, operates the program β€” HOW

COBIT: Governance = EDM (Evaluate, Direct, Monitor). Management = APO/BAI/DSS/MEA.
Policy Hierarchy
What is the correct order of the security policy hierarchy from highest to lowest, and which elements are mandatory vs optional?
Tap to reveal ↓
Answer
Policy β†’ Standard β†’ Baseline β†’ Procedure β†’ Guideline

All MANDATORY except Guideline (advisory/optional).

β€’ Policy = WHAT & WHY (management intent)
β€’ Standard = HOW MUCH (specific requirements)
β€’ Baseline = minimum secure config (system-specific)
β€’ Procedure = HOW (step-by-step)
β€’ Guideline = recommended but not required
Metrics
What is the difference between KGI, KPI, and KRI? Give an example of each in a security context.
Tap to reveal ↓
Answer
KGI (Key Goal Indicator): Was the goal achieved? Backward-looking. Ex: "Zero critical incidents this quarter"

KPI (Key Performance Indicator): Progress toward the goal? Leading. Ex: "94% patch compliance rate"

KRI (Key Risk Indicator): Risk level / early warning. Ex: "% systems unpatched >30 days" β€” triggers action before threshold is breached
Roles
What is the difference between a data owner and a data custodian? Which role has accountability?
Tap to reveal ↓
Answer
Data Owner: Business executive who has accountability for specific data β€” approves access rights, classification, and acceptable use. Typically a business manager, not IT.

Data Custodian: IT/technical staff with responsibility for implementing and maintaining the controls the owner defined. No accountability β€” just stewardship.

Key: Accountability cannot be delegated. The owner is accountable; the custodian is responsible.
Frameworks
Which information security framework offers third-party certification, and what does it require organizations to establish?
Tap to reveal ↓
Answer
ISO/IEC 27001 is the only major security framework that offers formal third-party certification.

Requires establishing, implementing, maintaining, and continually improving an ISMS (Information Security Management System) using the PDCA cycle (Plan-Do-Check-Act).

Also requires a formal risk assessment and a Statement of Applicability (SoA) documenting which Annex A controls apply and why.
Three Lines of Defense
In the three lines of defense model, where does the information security function sit, and why must internal audit be independent?
Tap to reveal ↓
Answer
Information Security sits in the 2nd line (Risk & Compliance) β€” it provides oversight and challenge to the business (1st line) but does NOT own operational risk.

Internal audit (3rd line) must be independent because it provides assurance to the board and audit committee about whether all controls β€” including security β€” are effective. If audit reported to the CISO, it couldn't independently assess security effectiveness.
COBIT
What do the letters EDM stand for in COBIT 2019, and what governance body performs these functions?
Tap to reveal ↓
Answer
EDM = Evaluate, Direct, Monitor

This is COBIT's governance domain (not management). Performed by the Board of Directors and senior executive leadership:

β€’ Evaluate: Assess current and future needs, options, and constraints
β€’ Direct: Set priorities, make resource decisions, establish direction
β€’ Monitor: Track performance and compliance against set direction

Management domains (APO/BAI/DSS/MEA) handle HOW β€” executed by the CISO and teams.
Security Strategy
What is the FIRST step a CISM candidate should take when developing an information security strategy?
Tap to reveal ↓
Answer
The FIRST step is always to understand the organization's business objectives and risk appetite.

Security strategy must be derived from and in support of business strategy β€” never start with technology selection, compliance requirements, or security assessments in isolation.

After understanding business objectives: perform a gap analysis (current vs. desired state) β†’ define the desired future state β†’ develop the roadmap β†’ build the business case β†’ obtain approval.
AI Study Advisor

Personalized guidance for Domain 1.

πŸ“Œ Exam Strategy
⚠️ Common Mistakes
⚑ Quick Review
πŸ”¬ Deep Dive
🎯 Practice Tips

πŸ“Œ Exam Strategy β€” Domain 1

  • Domain 1 is only 17% of the exam but sets the mindset for everything else. CISM tests management judgment, not technical knowledge β€” always think "what would a senior security manager advise?"
  • When a question offers multiple correct-sounding answers, look for the one that aligns security with business objectives, involves appropriate senior stakeholders, or takes a risk-based approach.
  • If a question asks what the CISO should do FIRST, the answer is almost always some form of "understand the business" or "assess current state" before taking action.
  • Board and senior management questions: they set direction, approve strategy, and hold others accountable. They do NOT implement controls or investigate incidents.
  • Policy vs Standard vs Guideline: know which is mandatory and which is optional β€” these distinctions appear directly in exam questions.

⚠️ Common Mistakes to Avoid

  • Confusing governance with management: governance = board-level (WHAT/WHY); management = CISO-level (HOW). Many candidates mix these up under pressure.
  • Saying internal audit reports to the CISO β€” it doesn't. Audit must be independent and report to the audit committee of the board.
  • Thinking "prevent all incidents" is the goal of governance. It's not β€” the goal is aligning security with business objectives and managing risk to acceptable levels.
  • Choosing compliance-first answers: CISM views compliance as a by-product of good governance, not the primary goal. Risk-based approaches outrank compliance-based ones.
  • Forgetting that accountability cannot be delegated. The board is always ultimately accountable β€” they can delegate responsibility to the CISO, but not accountability.
  • Mixing up data owner (business accountability) with data custodian (technical responsibility). On the exam, "who is accountable for data?" = the business owner, not IT.

⚑ Quick Review β€” 5-Minute Refresh

  • Primary goal: Align security with business objectives
  • 6 outcomes: Strategic Alignment, Risk Mgmt, Resource Mgmt, Performance Mgmt, Value Delivery, Assurance Integration
  • Governance vs Mgmt: Board = EDM (WHAT/WHY); CISO = HOW
  • Policy hierarchy: Policy β†’ Standard β†’ Baseline β†’ Procedure β†’ Guideline (Guideline = optional)
  • KGI/KPI/KRI: Goal achieved / Progress toward goal / Risk level (early warning)
  • 3 Lines: Operations / Risk+Security / Internal Audit
  • Data owner: Business accountability; Data custodian: technical responsibility
  • ISO 27001: Only certifiable ISMS standard; PDCA cycle; needs SoA
  • COBIT EDM: Board-level governance domain
  • Strategy first step: Understand business objectives and risk appetite

πŸ”¬ Deep Dive β€” Advanced Concepts

  • Risk appetite vs risk tolerance vs risk threshold: Appetite = overall amount of risk the organization is willing to accept. Tolerance = acceptable variance around the appetite. Threshold = the point at which action is triggered. All three are board-level decisions that the CISO must operationalize.
  • Security program charter: A formal document that establishes the information security program β€” defines its purpose, authority, scope, responsibilities, and resources. The charter is the governance foundation that gives the CISO authority to act. Without it, the CISO has no mandate.
  • NIST CSF 2.0 "Govern" function: Added in CSF 2.0, this function sits above and informs all other functions. It encompasses organizational context, risk management strategy, roles and responsibilities, policy, oversight, and supply chain risk management β€” exactly Domain 1 of CISM.
  • Segregation of duties in security governance: The CISO should not also be the data owner, auditor, or risk owner for assets they manage. Proper segregation ensures objective oversight and prevents conflicts of interest.

🎯 Practice Tips β€” How to Study This Domain

  • Practice translating technical security scenarios into business risk language. For every technical issue, ask: "What's the business impact? What decision does leadership need to make?" This is how CISM questions are written.
  • Study the CISM Review Manual's governance chapter and memorize the six governance outcomes β€” they underpin many exam scenarios.
  • Create flashcards for role comparisons: board vs. CISO, data owner vs. custodian, steering committee vs. audit committee. CISM loves testing these distinctions in scenarios.
  • Practice identifying when an answer involves governance (board/strategic) vs. management (CISO/operational). When in doubt, governance answers involve direction-setting, accountability, and oversight β€” not implementation.
  • Read ISACA's published CISM practice questions β€” the language and framing of Domain 1 questions follow a consistent pattern that rewards understanding over memorization.

Ready to Pass CISM Domain 1?

Test your knowledge with full-length CISM practice exams on FlashGenius β€” scenario-based questions built on the ISACA job practice framework.

Unlock Full Practice Tests on FlashGenius β†’