CISM (Certified Information Security Manager) Framework Cheat Sheet

Introduction to CISM

The Certified Information Security Manager (CISM) framework is a globally recognized certification program developed by ISACA that focuses on information security governance and management. It validates an individual’s ability to develop and manage enterprise information security programs while aligning security objectives with organizational goals. The CISM framework is particularly valuable for IT professionals looking to transition from technical roles to management positions in information security.

Core Domains of CISM

The CISM framework consists of four primary domains:

DomainDescriptionWeight
Information Security GovernanceEstablishing and maintaining an information security governance framework24%
Information Risk ManagementManaging information risk to an acceptable level30%
Information Security Program Development & ManagementEstablishing and managing the information security program27%
Information Security Incident ManagementPlanning, establishing, and managing incident response capability19%

Domain 1: Information Security Governance

Key Concepts

  • Strategic Alignment: Ensuring security initiatives support business objectives
  • Value Delivery: Optimizing security investments to protect business assets
  • Resource Management: Effectively allocating security resources
  • Risk Management: Analyzing and mitigating information security risks
  • Performance Measurement: Monitoring security program effectiveness

Best Practices

  • Establish and maintain an information security strategy aligned with business objectives
  • Define clear roles and responsibilities for information security
  • Develop and implement information security policies, standards, and procedures
  • Ensure regulatory, legal, and contractual compliance
  • Regularly report security status to executive management

Domain 2: Information Risk Management

Risk Management Process

  1. Risk Identification: Discover and document potential risks
  2. Risk Assessment: Evaluate likelihood and impact of risks
  3. Risk Analysis: Determine risk levels and prioritize
  4. Risk Treatment: Select and implement control measures
  5. Risk Monitoring: Continuously track and reassess risks

Risk Treatment Options

  • Risk Acceptance: Acknowledge and formally accept the risk
  • Risk Avoidance: Eliminate the risk by removing the risk source
  • Risk Mitigation: Reduce likelihood or impact through controls
  • Risk Transfer: Share or shift the risk burden to another party

Common Risk Assessment Methods

  • Quantitative Risk Assessment (using numerical values)
  • Qualitative Risk Assessment (using descriptive categories)
  • Hybrid/Semi-quantitative Approaches

Domain 3: Information Security Program Development & Management

Security Program Lifecycle

  1. Program Planning: Align with business objectives and requirements
  2. Program Design: Develop security architecture and control framework
  3. Program Implementation: Deploy security controls and solutions
  4. Program Operations: Maintain day-to-day security activities
  5. Program Monitoring: Track security metrics and performance
  6. Program Improvement: Continuously enhance program effectiveness

Key Security Controls Categories

  • Administrative Controls: Policies, procedures, standards, guidelines
  • Technical Controls: Firewalls, encryption, access control systems
  • Physical Controls: Badges, locks, cameras, facility design

Information Classification Levels

LevelDescriptionExamples
PublicInformation approved for public disclosureMarketing materials, press releases
InternalInformation for internal use onlyEmployee directories, internal memos
ConfidentialSensitive business informationStrategic plans, financial data
RestrictedHighly sensitive informationCustomer PII, intellectual property

Domain 4: Information Security Incident Management

Incident Response Lifecycle

  1. Preparation: Establish procedures, train teams, deploy tools
  2. Detection & Analysis: Identify and assess security incidents
  3. Containment: Limit incident impact and prevent further damage
  4. Eradication: Remove the cause of the incident
  5. Recovery: Restore affected systems to normal operation
  6. Post-Incident Activities: Document lessons learned and improve processes

Key Incident Response Team Roles

  • Incident Response Manager: Oversees the entire response process
  • Technical Lead: Directs technical investigation and remediation
  • Communications Coordinator: Manages internal/external communications
  • Legal Counsel: Provides legal guidance and compliance advice
  • Business Representative: Represents business impact and priorities

Incident Classification Matrix

SeverityImpactResponse TimeEscalation Path
CriticalOrganization-wide, significant financial/reputational damageImmediateExecutive management
HighMultiple departments, moderate financial/reputational damageWithin 4 hoursDepartment heads
MediumSingle department, limited financial/reputational damageWithin 24 hoursTeam leaders
LowIndividual users, minimal financial/reputational damageWithin 48 hoursTeam members

Common Challenges and Solutions

Challenge 1: Gaining Executive Support

  • Solution: Demonstrate security ROI and align with business objectives
  • Approach: Use metrics and risk assessments to quantify security value

Challenge 2: Resource Constraints

  • Solution: Prioritize security initiatives based on risk assessment
  • Approach: Implement a phased approach to security program development

Challenge 3: Compliance vs. Security Balance

  • Solution: Develop a unified compliance and security framework
  • Approach: Map controls to multiple regulations to eliminate duplication

Challenge 4: Security Awareness

  • Solution: Implement comprehensive security awareness programs
  • Approach: Tailor training to different roles and use engaging formats

CISM Exam Preparation Tips

  • Focus on management concepts rather than technical details
  • Understand the relationships between the four domains
  • Practice applying concepts to real-world scenarios
  • Review ISACA’s CISM Review Manual and Question Database
  • Join study groups or forums to discuss challenging concepts
  • Complete at least 150 practice questions per domain

Key Frameworks and Standards Related to CISM

  • COBIT: IT governance and management framework
  • ISO/IEC 27001: Information security management system
  • NIST Cybersecurity Framework: Guidelines for managing cybersecurity risk
  • ITIL: IT service management framework
  • GDPR, HIPAA, PCI DSS: Regulatory compliance frameworks

Resources for Further Learning

  • ISACA CISM Review Manual (latest edition)
  • ISACA CISM Practice Question Database
  • ISACA’s Cybersecurity Nexus (CSX)
  • Information Systems Security Association (ISSA)
  • SANS Institute Reading Room
  • (ISC)² Resources and Community
  • NIST Special Publications (800 series)

CISM Certification Maintenance

  • Earn and report 120 Continuing Professional Education (CPE) credits over a 3-year period
  • Pay annual maintenance fees
  • Adhere to ISACA’s Code of Professional Ethics
  • Respond to periodic audits of CPE activities if selected

Remember that the CISM framework emphasizes management rather than technical aspects of information security, focusing on how security supports business objectives and adds value to the organization.

Scroll to Top