Technology30 min read

CRISC Exam Guide 2026: FREE ISACA Study Plan + Practice

Complete 2026 ISACA CRISC guide (Nov 2025 Job Practice refresh). 4 domains, $575/$760 fee, 450 passing score, 4-hour exam, 150 questions. FREE practice questions, 12-week study plan, and risk-first coaching.

Ran Chen, EA, CFP®April 23, 2026

Key Facts

  • The 2026 ISACA CRISC exam costs $575 for ISACA members and $760 for non-members.
  • CRISC has 150 multiple-choice questions with a 4-hour time limit, delivered by PSI Services.
  • CRISC uses a scaled scoring system from 200 to 800 with a passing score of 450.
  • CRISC domain weights per the November 2025 Job Practice are Governance 26%, Risk Assessment 22%, Risk Response and Reporting 32%, and Technology and Security 20%.
  • CRISC requires 3 years of cumulative experience in at least 2 of the 4 CRISC domains, with no experience waivers available.
  • CRISC maintenance requires 120 CPE hours every 3 years with a minimum of 20 CPE hours per year.
  • The CRISC annual maintenance fee is $45 for ISACA members and $85 for non-members.
  • ISACA membership costs $135 per year plus a one-time $50 application fee, saving $185 on CRISC exam fees.
  • A $50 CRISC application processing fee applies after passing to convert the exam pass into active certification.
  • CRISC retakes require a 90-day cooling-off period and are capped at 4 attempts per 12-month window.

CRISC in 2026: The Only Guide You Need

The ISACA CRISC (Certified in Risk and Information Systems Control) is the most recognized IT risk management credential on the planet. Global Knowledge / Skillsoft salary surveys have repeatedly placed it among the top 5 highest-paying IT certifications worldwide, and in 2026 it is more valuable than ever — every large enterprise needs certified risk professionals who can identify, assess, respond to, and monitor IT risk under rising regulatory pressure (SEC cyber disclosure, DORA, NIS2, EU AI Act, state privacy laws). That is the CRISC mandate, and this guide is built to beat every other CRISC resource on the web.

This guide covers the 2026 exam at full depth including the November 2025 Job Practice refresh: cost, format, eligibility, the 4 current Job Practice Domains (Governance 26%, Risk Assessment 22%, Risk Response and Reporting 32%, Technology and Security 20%), a 12-16 week study plan, pass rates, salary data, and the risk-first coaching that separates candidates who pass on the first try from those who retake. Every detail was cross-referenced against isaca.org/credentialing/crisc and the current CRISC Exam Content Outline.

free CRISC practice questionsPractice questions with detailed explanations

CRISC Exam At-a-Glance (2026)

DetailInformation
Certification BodyISACA (Information Systems Audit and Control Association)
Exam DeliveryPSI Services — online proctored OR PSI test center
Questions150 multiple-choice
Duration4 hours (240 minutes)
FormatLinear on-the-fly — back-navigation and answer changes allowed
Passing Score450 on a 200-800 scaled scale
Cost$575 ISACA member / $760 non-member
Application Fee$50 one-time (after passing)
LanguagesEnglish (primary); additional languages announced per cycle
Experience Requirement3 years cumulative performing CRISC tasks in at least 2 of 4 domains (1 must be Governance or Risk Response & Reporting); no waivers or substitutions
Experience Window5 years from passing to verify and certify
Validity3 years, renewable
CPE Requirement120 CPE hours every 3 years (minimum 20/year)
Annual Maintenance Fee$45 member / $85 non-member
Exam WindowsContinuous testing, any day of the year
Retake Policy90-day cooling-off, max 4 attempts per 12 months
Job PracticeRefreshed 3 November 2025 — 4 domains: Governance 26%, Risk Assessment 22%, Risk Response and Reporting 32%, Technology and Security 20%

FREE CRISC Prep: Practice Before You Pay

Before committing to the $760 non-member fee, prove to yourself that you can actually pass. The biggest mistake CRISC candidates make is buying a $500 bootcamp, studying for 3 months, and then failing because they never consistently scored 75%+ on timed practice exams beforehand.

Our free CRISC practice question bank covers all 4 domains with ISACA-style "best answer" questions that emphasize risk-first judgment — the defining characteristic of the CRISC exam. Every question includes a detailed explanation of why the correct answer aligns with the risk framework, why the distractors look plausible but miss the governance frame, and which domain concept the question tests.

Start CRISC practice questions nowPractice questions with detailed explanations

What CRISC Actually Is — And Why It Is Not CISM or CISA

CRISC was created by ISACA in 2010 for people whose job is IT risk. The certification validates your ability to identify, assess, respond to, and monitor IT and information systems risk, and to design and implement information systems controls that keep the organization within its risk appetite. It is the only vendor-neutral credential dedicated exclusively to IT risk management.

Here is the single most important thing to internalize before you open the Review Manual:

CRISC is a risk exam, not a security exam and not an audit exam.

Every question on the CRISC is answered by asking: What would an IT risk practitioner — one who advises risk owners, reports to the board, and is accountable for risk process quality — do here? It is not: What is the most secure technical configuration? That is CISSP / CISM territory. It is not: What would an independent auditor evaluate? That is CISA territory. It is: What aligns IT risk with enterprise risk, communicates it to the right owner, and drives the right response?

If you are a security engineer or IT auditor who has never run a risk program, you will find CRISC counterintuitive. You will want to say "add more controls," or "document the deficiency." The CRISC correct answer is almost always: "understand the risk, present response options (mitigate, transfer, avoid, accept) to the risk owner, track with KRIs, and report to governance." Learn that rhythm and you pass. Miss it and you retake.

The 2026 CRISC Market

Three forces have made 2026 the best year yet to earn CRISC:

1. Regulatory convergence on risk. SEC Cybersecurity Disclosure Rule (10-K / 4-day 8-K), EU DORA (Digital Operational Resilience Act, January 2025), NIS2, EU AI Act, and state privacy laws all require demonstrable IT risk management. Every large organization needs certified risk practitioners to own the framework.

2. AI, cloud, and third-party risk exploded. AI governance (NIST AI RMF 1.0, ISO/IEC 42001:2023, EU AI Act), cloud concentration risk, and supply chain risk management have piled onto the IT risk professional's plate. CRISC's risk-first framing is exactly the mindset this work requires.

3. CRO and risk officer talent shortage is acute. Global Knowledge's annual IT Skills and Salary Report has consistently placed CRISC among the highest-paying IT certifications for a decade. Demand continues to outpace supply, and CRISC appears in an ever-increasing share of IT Risk Manager, Operational Risk Officer, and GRC Manager job postings.


Who Should Take CRISC

CRISC is the right credential for people who make — or will soon make — risk-based decisions about IT and information systems. Sweet spot: 3-7 years of IT, security, audit, or GRC experience with exposure to risk methodology.

RoleWhy CRISC Fits
IT Risk ManagerCanonical CRISC role — literally in the name.
Operational Risk Officer (IT focus)Bridge between enterprise risk and IT risk.
GRC Manager / DirectorGovernance, risk, compliance — two out of three are CRISC.
Chief Risk Officer (IT / Cyber focus)CRISC is the most recognized credential for IT-side CROs.
Information Systems Control OwnerDesigning, testing, monitoring controls to manage risk.
Third-Party / Vendor Risk ManagerTPRM is a fast-growing CRISC-adjacent discipline.
Internal Auditor moving into riskNatural pivot — similar methodology, different deliverable.
Security manager adding risk depthCommon CISM + CRISC stack.

CRISC is not the right first cert for technical specialists (OSCP, GCIH instead), entry-level analysts (Security+ first), pure IT auditors (CISA), or security program managers (CISM is more direct).


CRISC vs CISM vs CISA — The ISACA Decision Matrix

All three ISACA credentials share the 200-800 scaled scoring system and the 450 cut score. They diverge sharply on role and content.

DimensionCRISCCISMCISA
Primary roleIT Risk Manager, GRC, CRO trackSecurity Manager, CISO trackIT Auditor, SOX, SOC
PerspectiveRisk practitioner advising risk ownersProgram manager running securityIndependent assurance provider
DomainsGovernance, Risk Assessment, Risk Response & Reporting, Technology & SecurityGovernance, Risk Mgmt, Security Program, Incident MgmtIS Audit Process, Governance, Acquisition, Operations, Protection
Experience3 years in 2+ of 4 domains5 years InfoSec + 3 in mgmt5 years IS audit/control/security
Best if youOwn the risk register, report to board on riskRun the security programAudit controls independently
Stack withCISM + CRISC for risk-heavy security leadersCISM + CISA for security + audit perspectiveCISA + CRISC for auditors moving into risk

Quick decision rule:

  • Your current or target title includes "risk" → CRISC
  • Your current or target title includes "security manager," "CISO," or "director of security" → CISM
  • Your current or target title includes "auditor," "SOX," or "assurance" → CISA

Many senior GRC leaders hold two or all three. When in doubt, search your target job titles on LinkedIn and count which cert appears most in requirements.


Eligibility & the CRISC Experience Rule

Here is where most candidates get confused: you do NOT need 3 years of experience to sit the exam. You need it to become certified after you pass, and you have 5 years from the pass date to submit the paperwork.

The Experience Requirement

To earn the CRISC, you need:

  1. 3 years of cumulative work experience performing CRISC domain tasks, AND
  2. Experience must span at least 2 of the 4 CRISC domains (Governance, Risk Assessment, Risk Response & Reporting, Technology & Security), AND
  3. At least 1 of those 2 domains must be Governance OR Risk Response and Reporting.

Experience must be gained within the 10-year period preceding application OR within 5 years after passing the exam.

No Substitutions or Waivers

Unlike CISA and CISM, CRISC does not offer any experience waivers or substitutions — no credits for holding CISM, CISA, CGEIT, a master's degree, or any other credential. The 3 years of CRISC-domain experience is a hard requirement. Always verify current rules at isaca.org/credentialing/crisc.

What Counts as "CRISC Experience"

ISACA defines CRISC-qualifying experience as work that involves at least one of the following per domain:

  • Governance: Developing or maintaining the IT risk management governance framework; aligning IT risk with enterprise risk management; advising on risk appetite and tolerance.
  • Risk Assessment: Identifying IT risk scenarios; performing qualitative or quantitative risk analysis; maintaining the risk register; evaluating inherent vs residual risk.
  • Risk Response and Reporting: Recommending and implementing risk responses (mitigate, transfer, avoid, accept); designing, testing, and monitoring controls; reporting KRIs and KPIs to risk owners and governance.
  • Technology and Security: Understanding IT architecture, components, frameworks, and security controls enough to assess and manage their risk.

Hands-on technical work (patching, tool administration, firewall rule writing) does not count as CRISC experience on its own — it must be framed in risk methodology.

The Experience Verification Process

After you pass the exam, you have 5 years to:

  1. Complete the CRISC application through your ISACA account.
  2. Pay the $50 application processing fee.
  3. List relevant experience with employer, dates, responsibilities, and a verifier (usually your supervisor).
  4. Wait 4-8 weeks for ISACA to review and verify with your listed contacts.
  5. Receive your certification number and digital badge.

If you do not apply within 5 years, your passing score expires and you must retake the exam.


The 4 CRISC Domains (Current Job Practice — Refreshed 3 November 2025)

ISACA refreshed the CRISC Job Practice on 3 November 2025. The current 4-domain structure and weights — applicable to all 2026 exam attempts — are below. Always confirm at the CRISC Exam Content Outline.

#DomainWeightApprox. Question Count
1Governance26%~39
2Risk Assessment22%~33
3Risk Response and Reporting32%~48
4Technology and Security20%~30
Total100%150

What changed in November 2025: Risk Assessment grew from 20% → 22%; Technology and Security shrank from 22% → 20%. Governance (26%) and Risk Response and Reporting (32%) held steady. Material published before November 2025 will still show the old weights — be careful when using older courses or review manuals.

Domains 3 and 1 together are 58% of the exam. If you prioritize study time incorrectly, this is where you lose points.


Domain 1 — Governance (26%)

Domain 1 establishes the structures within which IT risk is managed. It covers enterprise governance, IT risk governance, and the organizational context that shapes every downstream risk decision.

Core Topics

TopicWhat You Must Know
Enterprise Risk Management (ERM)COSO ERM 2017 framework (8 components, integrated with strategy); ISO 31000:2018 principles
IT Risk Governance FrameworksCOBIT 2019 (Governance vs Management — EDM vs APO/BAI/DSS/MEA), ISO/IEC 27005 (information security risk), NIST RMF (SP 800-37 Rev 2)
Organizational Strategy & ContextMapping IT risk to business objectives, mission, and value chain
Risk CultureTone at the top; risk-aware behavior; rewarding escalation
Three Lines of Defense Model (IIA 2020)1st line (operational owners), 2nd line (risk & compliance), 3rd line (internal audit)
Governance vs Management (COBIT)EDM (Evaluate, Direct, Monitor) = governance; APO/BAI/DSS/MEA = management
Roles & ResponsibilitiesBoard, executive, CRO, CISO, CIO, data owners, risk owners, control owners
Policies, Standards, Procedures, GuidelinesPolicy hierarchy, approval authorities, exception management
Risk Appetite vs Risk ToleranceAppetite = strategic, board-level; tolerance = tactical, operational bounds around appetite
Regulatory and Legal ContextGDPR, CCPA/CPRA, HIPAA, PCI-DSS 4.0, SOX, NYDFS Part 500, SEC cyber disclosure, DORA, NIS2, EU AI Act
ISACA Code of Professional EthicsDirectly tested

High-Yield: Governance vs Management

This distinction (straight from COBIT 2019) appears repeatedly on CRISC:

  • Governance (EDM — Evaluate, Direct, Monitor): The board and executive management set direction for IT risk, evaluate performance against that direction, and monitor compliance. Governance is about oversight.
  • Management (Plan, Build, Run, Monitor): The risk practitioner and risk owners execute against direction set by governance. Management is about operation.

When a CRISC question asks "who should decide X," apply this frame:

  • Setting risk appetite → governance (board / executive)
  • Approving risk management framework → governance (executive)
  • Performing risk assessments → management (risk practitioner)
  • Accepting a specific residual risk → the risk owner (management, typically business process owner with budget authority — NOT the risk practitioner)

Risk Appetite vs Risk Tolerance (Tested Every Exam)

ConceptDefinitionWho Sets ItExample
Risk AppetiteThe amount and type of risk the organization is willing to accept in pursuit of objectivesBoard / executive"We will accept operational disruptions of up to $5M aggregate per year."
Risk ToleranceSpecific, tactical bounds around appetite — thresholds for individual risks or processesExecutive / senior management"No single incident may cause more than $500K loss."
Risk CapacityThe maximum amount of risk the organization could bear before existential damageBoard (implied)Total equity / reserves / balance sheet capacity

Domain 2 — Risk Assessment (22%)

Domain 2 is where the risk methodology gets rigorous. Every question is, at its core, about how risk is identified, analyzed, and evaluated before any response is chosen.

Core Topics

TopicWhat You Must Know
Risk Identification TechniquesAsset-based, threat-based, vulnerability-based, scenario-based, process-based, control-based
Threat ModelingSTRIDE, PASTA, LINDDUN, Attack Trees
Risk Analysis MethodsQualitative (heat maps, matrices), Quantitative (ALE = SLE × ARO, FAIR), Semi-quantitative
Risk RegisterRequired fields: risk ID, scenario, owner, likelihood, impact, inherent/residual, response, KRI, status
Inherent vs Residual vs Current vs Projected RiskThe four risk states CRISC tests explicitly
Heat Maps / Risk MatricesLikelihood × Impact; 3x3, 4x4, 5x5; limitations (clustering near center)
Quantitative Risk (FAIR)Loss Event Frequency (LEF) × Loss Magnitude (LM); Primary Loss vs Secondary Loss
ALE CalculationsSLE = AV × EF; ALE = SLE × ARO; ROSI = (ALE_before − ALE_after − Cost) / Cost
Risk ScenariosStructured narratives with threat, actor, asset, event, consequence
Emerging RiskAI/ML model risk, cloud concentration, quantum computing threat to cryptography, supply chain
Third-Party / Vendor RiskDue diligence, SOC 2 Type II, continuous monitoring, SBOM
BIA (Business Impact Analysis)RPO, RTO, MTD, WRT; financial and non-financial impact

The Four Risk States (Memorize Precisely)

StateMeaningExample
Inherent RiskRisk BEFORE any controls (gross risk)90% likelihood of breach without MFA
Current RiskRisk TODAY given actual implemented controls30% likelihood — MFA partially deployed
Residual RiskRisk AFTER planned/designed controls fully operate10% likelihood — MFA everywhere, fully tested
Projected RiskExpected future risk given planned changes / emerging threatsRises to 15% if AI-phishing volume doubles

CRISC questions are often resolved by correctly identifying which risk state the question is asking about.

The Quantitative Risk Formulas

  • SLE (Single Loss Expectancy) = Asset Value × Exposure Factor
  • ALE (Annual Loss Expectancy) = SLE × ARO
  • ARO (Annual Rate of Occurrence) = expected incidents per year
  • ROSI (Return on Security Investment) = (ALE_before − ALE_after − Control Cost) / Control Cost

Example: An asset worth $500,000 has a 20% exposure factor per incident and an expected 3 incidents per year. SLE = $100,000. ALE = $300,000. A $200,000 annual control reduces ARO to 0.5. New ALE = $50,000. ROSI = ($300,000 − $50,000 − $200,000) / $200,000 = 25%.

Qualitative vs Quantitative — When to Use Which

MethodStrengthsWeaknessesUse When
QualitativeFast, low-cost, intuitiveSubjective, not financially defensibleEarly-stage, low-data, broad risk surveys
QuantitativeFinancial, defensible, decision-readyData-hungry, slow, requires actuarial inputsMajor investments, capital decisions, board-level
Semi-quantitativeBalances bothNeither fully precise nor fully fastCommon default for mature programs

Domain 3 — Risk Response and Reporting (32%)

Domain 3 is the largest single domain on CRISC — 32% of the exam, roughly 48 questions. This is where risk assessment becomes action: choosing a response, designing/testing controls, and reporting to governance.

Core Topics

TopicWhat You Must Know
Risk Response OptionsMitigate (treat/modify), Transfer (share), Avoid, Accept (retain) — ISO 31000 terminology
Control DesignPreventive, Detective, Corrective, Deterrent, Compensating; Administrative/Technical/Physical
Control CategoriesEntity-level, process-level, activity-level; IT General Controls (ITGC) vs Application Controls
Control TestingDesign effectiveness vs Operating effectiveness; sample sizing; evidence retention
Control MonitoringContinuous control monitoring (CCM), automated testing, exception reporting
Key Risk Indicators (KRIs)Leading indicators of risk materialization (e.g., % of privileged accounts without MFA)
Key Performance Indicators (KPIs)Operational measures of process performance (e.g., mean time to patch)
Key Control Indicators (KCIs)Measures of control effectiveness (e.g., % access reviews completed on time)
Three Lines of DefenseResponsibilities for each line; independence requirements
Risk ReportingTo risk owners, executive management, audit committee, board; cadence and content
Risk Register MaintenanceUpdating on change, event, or periodic cycle
Exception ManagementPolicy exceptions, temporary acceptances, compensating controls
Project and Program RiskIntegrating risk into SDLC, agile, DevOps, cloud migrations

The Risk Response Decision Framework

OptionWhen to UseExample
Mitigate (Modify / Treat)Risk exceeds appetite and cost-effective controls existAdd MFA to reduce account takeover risk
Transfer (Share)Risk can be shifted at acceptable costCyber insurance, outsourcing to SOC-2-certified vendor
AvoidRisk is unmanageable and activity is non-essentialDiscontinue a product line, exit a market
Accept (Retain)Risk is within appetite OR mitigation cost exceeds benefitExplicit sign-off by risk owner; document rationale

CRISC Terminology Trap: ISACA uses "Mitigate/Transfer/Avoid/Accept" most commonly, but also uses the ISO 31000 language "Modify/Share/Avoid/Retain." Both map to the same four choices. The exam will switch between the two sets to test whether you understand the concepts, not just memorized a word list. "Treat" = "Mitigate" = "Modify" all mean the same thing in CRISC.

Exam tip: The risk practitioner never accepts risk alone. The risk owner (typically the business process owner with budget authority) accepts risk. The risk practitioner identifies, assesses, and recommends.

KRIs, KPIs, KCIs — The Metrics Hierarchy

Metric TypePurposeExample
KRI (Key Risk Indicator)Leading indicator of risk materializing% privileged accounts without MFA; # overdue critical patches
KPI (Key Performance Indicator)Measure of operational performanceMean time to patch; backup success rate
KCI (Key Control Indicator)Measure of control effectiveness% access reviews completed on time; % control tests passed

A good KRI is: predictive, measurable, actionable, and tied to appetite. "Number of malware alerts" is NOT a good KRI — it is noisy and not predictive. "Percentage of endpoints without current EDR" IS a good KRI — it is a leading indicator of breach likelihood.

Reporting Metrics to the Board

Avoid the rookie mistake of reporting activity metrics. Translate into risk and business-outcome language:

Avoid (Activity)Prefer (Risk Outcome)
"We blocked 1.2M malware events""Residual ransomware risk decreased 40% YoY"
"We patched 5,000 CVEs""KRI 'high-severity vulns > SLA' reduced from 250 to 30"
"We conducted 12 phishing simulations""Phishing click rate 18% → 4%; credential-theft risk reduced 60%"
"SOC monitored 24x7""MTTD 72h → 4h; residual incident impact risk meaningfully reduced"

Domain 4 — Technology and Security (20%)

Domain 4 ensures CRISC holders understand the IT and security concepts deeply enough to assess and manage their risk. This is not a pure technical domain — it is applied IT knowledge through a risk lens. Note: the November 2025 Job Practice refresh trimmed this domain from 22% to 20% (weight moved to Risk Assessment).

Core Topics

TopicWhat You Must Know
CIA TriadConfidentiality, Integrity, Availability — mapped to risk scenarios
Enterprise ArchitectureTOGAF basics, architecture layers, data flows
IT OperationsChange management, configuration management, release management, ITIL basics
Frameworks & StandardsNIST CSF 2.0 (6 functions incl. new Govern), COBIT 2019, ISO/IEC 27001:2022, ISO/IEC 27005, NIST SP 800-53 Rev 5, CIS Controls v8
Security ArchitectureDefense in depth, zero trust (NIST SP 800-207), network segmentation
Identity & Access ManagementLifecycle, RBAC/ABAC, privileged access, SSO, federation (SAML, OIDC)
Data ProtectionClassification, encryption at-rest and in-transit, key management, DLP, tokenization
Application SecuritySecure SDLC, SAST/DAST/SCA, OWASP Top 10, API security
Cloud RiskShared responsibility, concentration risk, SaaS/PaaS/IaaS risk profiles, CSPM, CASB
Third-Party & Supply Chain RiskVendor risk management, SBOM, continuous vendor monitoring, DORA ICT third-party provisions
Vulnerability ManagementScanning, prioritization (CVSS, EPSS), SLAs, remediation vs mitigation
Incident ResponseNIST SP 800-61 Rev 2 lifecycle (Preparation, Detection/Analysis, Containment/Eradication/Recovery, Post-Incident)
BCP and DRPRTO, RPO, MTD, WRT; 3-2-1 backup; hot/warm/cold DR sites
Emerging TechnologiesAI/ML risk, generative AI, quantum, IoT, OT/ICS

NIST Cybersecurity Framework 2.0 (Released February 2024)

  • 6 core functions (up from 5 in CSF 1.1): Govern (NEW), Identify, Protect, Detect, Respond, Recover
  • The new Govern function covers organizational context, risk management strategy, roles and responsibilities, policy, oversight, and supply chain risk — heavily relevant to CRISC Domain 1.
  • Implementation uses Tiers 1-4 (Partial, Risk Informed, Repeatable, Adaptive).
  • Profiles describe current and target cybersecurity states.

ISO/IEC 27001:2022 and 27005

  • 27001:2022: Information Security Management System (ISMS) requirements. 10 clauses; 93 Annex A controls in 4 themes (Organizational 37, People 8, Physical 14, Technological 34).
  • 27005:2022: Guidance on information security risk management — the "how" under 27001's "what." Directly aligned with CRISC methodology.

Breach Notification Windows (2026 Reality — Domain 4 Risk Context)

RegulationNotification WindowTo Whom
GDPR72 hours from awarenessSupervisory authority; subjects if high risk
HIPAA Breach Notification Rule60 days from discoveryIndividuals, HHS; media if 500+ in a state
US State Breach Laws (varies)Typically "without unreasonable delay," often 30-90 daysState AG, affected residents
NYDFS Part 50072 hoursNYDFS Superintendent
SEC Cyber Disclosure (public co.)4 business days of materiality determination8-K filing
EU NIS2 Directive24h early warning + 72h incident notification + 1-month final reportNational CSIRT
EU DORA (financial sector)Initial, intermediate, final reports per regulatory technical standardsCompetent authority

Cross-Domain High-Yield: The Concepts That Cut Across Every Question

These concepts appear in 20-30% of CRISC questions regardless of labeled domain.

The Decision Rights Principle

The risk practitioner identifies, assesses, and recommends. The risk owner decides. The governance body oversees.

When a question asks "who should decide X," apply this filter:

DecisionDecider
Accept a specific residual riskRisk owner (business process owner with budget authority)
Approve the IT risk management frameworkExecutive management / board (governance)
Set organizational risk appetiteBoard of directors (governance)
Implement a specific controlControl owner / IT team (operations)
Report KRIs to the boardRisk practitioner + CRO/CISO (per governance cadence)
Exception approval (short-term)Risk owner + risk function co-approval
Exception approval (long-term / high)Governance body

Control Classifications

TypePurposeExamples
PreventiveStop incidents before they happenFirewalls, access controls, MFA, encryption
DetectiveIdentify incidents that have occurredLogs, IDS, SIEM, CCTV
CorrectiveRestore after an incidentBackups, incident response, patches
DeterrentDiscourage threatsWarning signs, visible cameras
CompensatingAlternate control when the primary is infeasibleManager review when automated segregation cannot be implemented

Administrative, Technical, Physical

  • Administrative (Managerial): Policies, procedures, training, background checks
  • Technical (Logical): Firewalls, encryption, ACLs, IDS
  • Physical: Locks, guards, cameras, fences

CRISC Pass Rate & Difficulty Reality Check

ISACA does not publish official pass rates. Here is what we know from candidate surveys, training providers, and community data:

SourceReported First-Time Pass Rate
Gleim CRISC customer survey~78% (self-selected study-committed users)
Hemang Doshi course completers~75%
Reddit r/CRISC self-reports55-65%
Industry average across all candidates~55-65%
Candidates using official Review Manual + QAE DB75-80%
Auditors and engineers who skip risk-mindset coaching35-50%

Why the range? First-time pass rates depend heavily on:

  1. Materials used — official CRISC Review Manual (7th or 8th edition — use whichever is current at exam time) + QAE Database is the evidence-based winning stack.
  2. Practice volume — 1,000+ practice questions correlates with roughly 2x pass rates vs under 300.
  3. Experience — working risk practitioners pass at higher rates than auditors and engineers.
  4. Mindset adjustment — the #1 reason candidates fail CRISC is failing to shift from a "secure the system" or "audit the controls" to a "manage the risk" mindset.

Plan on 100-150 hours of study. Do not schedule the exam until you are consistently scoring 75%+ on full-length timed practice exams.


FREE CRISC Practice, Round 2

Practice is what separates the candidates who pass from those who retake. Before we get to the study plan, make sure you have your practice environment ready.

Start practicing nowPractice questions with detailed explanations

12-16 Week CRISC Study Plan

This plan assumes 10 hours per week. Scale up or down based on your schedule. Experienced IT risk managers can compress to 10 weeks at 12 hours/week; auditors and engineers pivoting to risk should extend to 14-16 weeks.

Weeks 1-2: Mindset Reset + Domain 1 (Governance)

  • Read CRISC Review Manual Chapter 1.
  • Watch Hemang Doshi's or Prabh Nair's Domain 1 overview (YouTube or course).
  • Build a one-page "CRISC mindset cheat sheet": governance vs management, risk owner vs risk practitioner, appetite vs tolerance, Three Lines of Defense.
  • Practice: 75 Domain 1 questions. Review every wrong answer with focus on why the risk-first answer is correct.

Weeks 3-4: Domain 2 — Risk Assessment

  • Read Chapter 2.
  • Memorize the quantitative risk formulas (SLE, ALE, ROSI) and run 10 example calculations.
  • Build a comparison table: qualitative vs quantitative vs semi-quantitative; inherent vs residual vs current vs projected.
  • Practice translating business impact into risk register entries.
  • Practice: 75 Domain 2 questions.

Weeks 5-8: Domain 3 — Risk Response and Reporting (BIGGEST DOMAIN)

  • Read Chapter 3 — this is the longest chapter.
  • Week 5: Risk response options (mitigate/transfer/avoid/accept + treat/modify/share/retain terminology).
  • Week 6: Control design, control testing (design vs operating effectiveness), continuous monitoring.
  • Week 7: KRIs, KPIs, KCIs — what makes a good indicator; designing metric hierarchies.
  • Week 8: Reporting cadence and content to risk owners, executives, audit committee, board.
  • Practice: 200 Domain 3 questions across the four weeks.

Weeks 9-10: Domain 4 — Technology and Security

  • Read Chapter 4.
  • Week 9: CIA, architecture, IAM, data protection, NIST CSF 2.0, ISO 27001:2022.
  • Week 10: Cloud risk, third-party risk, vulnerability management, IR lifecycle, BCP/DRP, breach notification windows.
  • Practice: 100 Domain 4 questions.

Weeks 11-12: Full-Length Practice Exams + Weakness Targeting

  • Take 2 full 150-question timed practice exams in 4-hour blocks.
  • After each, spend 6-8 hours analyzing wrong answers, grouping them by domain and by "why I got this wrong" (knowledge gap, wrong mindset, misread).
  • Re-study weak areas.

Weeks 13-14: Final Mock Exams + High-Yield Review

  • Take 2 more full mocks at the same time of day you will sit the real exam.
  • Target: consistent 75%+ scores.
  • Final review of high-yield flashcards: COBIT EDM/PBRM, ISO 27005, NIST RMF 7 steps, ALE formulas, the 4 risk states, treat/transfer/mitigate/avoid mapping, notification windows, Three Lines of Defense.

Weeks 15-16: Taper + Exam

  • Light review only — no new material in the final week.
  • Day 2 of final week: 1 last mock exam.
  • Days 3-5: targeted flashcard review.
  • Day 6: rest.
  • Day 7: exam day.

Recommended Resources (Free-First)

Free

ResourceWhy
ISACA Official Exam Candidate Guide (PDF, free from isaca.org)Authoritative source for 2026 exam policies
Prabh Nair YouTube channelGold standard of free CRISC video content — 40+ hours of domain videos
Hemang Doshi YouTube channel and blogThe CRISC study community's most-cited free resource
OpenExamPrep free CRISC practiceFree ISACA-style questions with AI tutor explanations — start here
ISACA Free WebinarsMonthly webinars count as CPE post-certification
ISACA Risk IT Framework (white papers)Free downloads on risk taxonomy and scenarios
NIST PublicationsSP 800-37 (RMF), 800-39 (Risk Management), 800-30 (Risk Assessment) — free
r/CRISC subredditTrip reports and current-week study updates

Paid (Only After Exhausting Free)

ResourceWhat It IsWho Should Buy
ISACA CRISC Review Manual (current edition — 7th or 8th)The official prep book. The primary source.Every candidate. Non-negotiable.
ISACA QAE Database (Questions, Answers, Explanations)1,000+ official practice questions with digital analyticsEvery candidate. Highest-ROI paid resource.
Hemang Doshi CRISC Mock Papers6 full mock exams with detailed rationaleEvery candidate who wants realistic timed practice
DestCert CRISC MasterClassComprehensive video course with mind mapsCandidates who learn best via structured video
Mike Chapple CRISC Study Guide (Sybex/Wiley)Alternative textbook with a different teaching styleCandidates who want a second reference
Gleim CRISC ReviewComplete course with question bankCandidates who want maximum structure
Pearson/Kaplan CRISC Cert GuideAlternative textbook formatCandidates who want a third reference

The lean budget stack: Official Review Manual ($139 member) + ISACA QAE 12-month subscription ($299 member) + Hemang Doshi Mock Papers (~$50) + free practice + Prabh Nair YouTube. Total: under $550, covers everything.


Exam-Day Strategy: The CRISC Stamina Game

The CRISC is 150 questions in 240 minutes — roughly 1 minute 36 seconds per question. The exam is linear on-the-fly, meaning you CAN navigate back, flag questions, review, and change answers within the 4-hour window. Use it.

Pacing

  • Minute 0-80: Answer questions 1-50. If a question takes more than 90 seconds, flag it and move on.
  • Minute 80-160: Answer questions 51-100.
  • Minute 160-220: Answer questions 101-150.
  • Minute 220-240: Revisit flagged questions. Change answers only when you have a concrete reason — first instincts are correct about 75% of the time.

The CRISC Question Archetypes

Every CRISC question falls into one of three archetypes. Identify which before you answer:

ArchetypeSignalStrategy
Knowledge Check"Which of the following is defined as..."Pick the definition. Move fast.
Scenario / Best AnswerA 3-5 sentence scenario ending in "What is the BEST action for the risk practitioner?"Identify the role, apply decision-rights filter, eliminate options that bypass the risk owner
First / Next / Greatest"What should the practitioner do FIRST?" / "Which presents the GREATEST risk?"Read all options — all may be plausible. Pick based on the risk-first frame.

BEST vs MOST — The ISACA Keyword Trap

ISACA uses precise qualifying words. Read them carefully:

  • BEST — the single most effective or appropriate answer among those presented
  • MOST / GREATEST — the answer with the highest magnitude of the attribute asked about
  • FIRST — the answer that must happen before the others (order of operations)
  • PRIMARY — the answer most directly related to the purpose asked about

Multiple options may be technically correct. The qualifier tells you which one to pick.

The Elimination Engine

For hard questions, eliminate in this order:

  1. Eliminate answers that bypass the risk owner. The risk practitioner does not accept, modify, or avoid risks on behalf of the business.
  2. Eliminate technical-only answers. CRISC tests risk judgment, not technical execution.
  3. Eliminate absolutes. "Always," "never," "all" are almost always wrong.
  4. Eliminate answers that skip governance. Major decisions require governance approval.
  5. Choose the answer that an experienced, risk-aware practitioner would document in the risk register and defend at the next risk committee.

Working-Memory Conservation

  • Read the question and the final sentence first; then read the options; then re-read the scenario with the options in mind.
  • Do NOT re-read passages multiple times. One read, decide, flag if unsure, move on.
  • Hydrate. PSI allows water at test centers (check per-site rules).
  • If online-proctored: set up a quiet room, close all other apps, test the webcam, keep government ID ready, and clear your desk of all materials.

Cost Breakdown, Retake Policy & Recertification

Total First-Year Cost

ItemISACA MemberNon-Member
Exam fee$575$760
ISACA membership (optional)$135 + $50 one-timen/a
Application processing fee (after passing)$50$50
Annual maintenance fee$45$85
Year 1 Total (minimum path)~$855~$895

Membership math: joining costs $185 first year ($50 application + $135 dues) and saves you $185 on the exam fee. You break even in year 1 and win in year 2+ via discounted resources, lower maintenance, and discounted conferences.

Retake Policy

  • After a failed attempt, wait 90 days before retesting.
  • Maximum 4 attempts per 12-month period.
  • You pay the full exam fee on each retake.

Recertification (3-Year Cycles)

  • 120 CPE hours per 3-year cycle.
  • Minimum 20 CPE hours per year — no back-loading into year 3.
  • Annual maintenance fee: $45 member / $85 non-member.
  • Adhere to the ISACA Code of Professional Ethics.
  • ISACA audits approximately 10% of certificants each year — keep documentation of every CPE.

CPE activities include ISACA chapter meetings, webinars, conferences, vendor training, university courses, teaching, writing, serving on committees, and reading vetted risk and cybersecurity publications. All five ISACA credentials share a single 3-year cycle, so if you stack CRISC + CISM + CISA, one CPE can count across all three.


Salary & Career: What a CRISC Actually Earns

Global Knowledge / Skillsoft salary surveys, Robert Half's 2026 Salary Guide, and ISACA's 2024 State of Cybersecurity converge on these 2026 US numbers:

RoleCRISC-Certified Base Salary (US)
IT Risk Analyst$90,000 - $120,000
IT Risk Manager$110,000 - $160,000
Senior IT Risk Manager / Principal$140,000 - $185,000
Director of IT Risk / GRC$170,000 - $230,000
Chief Risk Officer (IT / Cyber)$220,000 - $400,000+
Operational Risk Officer$130,000 - $190,000
Third-Party / Vendor Risk Manager$115,000 - $160,000
Big 4 Risk Advisory Manager$140,000 - $180,000

The CRISC Premium

CRISC has been a top-paying IT certification in Global Knowledge's IT Skills and Salary Report year after year. In 2026, dedicated IT risk roles remain understaffed, and regulatory drivers (SEC cyber disclosure, DORA, NIS2, EU AI Act) continue to increase demand. CROs with CRISC at large enterprises frequently exceed $400,000 total comp.

Career Paths

  • IT Risk track: Analyst → Manager → Director → CRO (IT/Cyber). CRISC expected at Manager and above.
  • GRC track: GRC Analyst → Manager → Director of GRC. CRISC increasingly required at Manager.
  • Consulting track: Big 4 / boutique risk advisory — Consultant → Manager → Senior Manager → Partner. CRISC standard at Manager.
  • Audit-to-risk pivot: Internal audit → IT risk → CRO track. CRISC is the bridge credential.

Common Mistakes That Tank First-Time Candidates

Mistake #1: Picking "The Most Secure" Answer

CRISC is a risk exam, not a security-engineering exam. The right answer is the one a risk practitioner would document in the risk register, present to the risk owner, and defend at the risk committee — usually the one that frames risk, presents response options, and respects decision rights.

Wrong: "Deploy MFA everywhere immediately." Right: "Assess the authentication risk, present mitigation options (cost, coverage, business impact) to the risk owner, and track implementation with a KRI."

Mistake #2: The Risk Practitioner Accepts Risk

Candidates routinely pick answers where the risk practitioner accepts a residual risk. Wrong.

The risk owner (business process owner with budget authority) accepts risk. The risk practitioner identifies, assesses, and recommends. When in doubt, an answer that has the risk practitioner unilaterally accepting, rejecting, or modifying a business-owned risk is wrong.

Mistake #3: Confusing Treat / Transfer / Mitigate / Avoid / Accept

ISACA sometimes uses ISO 31000 terminology (Modify, Share, Avoid, Retain) and sometimes classic risk response (Mitigate, Transfer, Avoid, Accept). Treat = Mitigate = Modify. Transfer = Share. Accept = Retain. Avoid is just Avoid. If you memorize only one set, the other will trip you up.

Mistake #4: Confusing Inherent, Residual, Current, and Projected Risk

These four states are tested explicitly. Inherent = before controls. Current = today with actual controls. Residual = after planned controls fully operate. Projected = future with expected changes. Misreading "residual" as "current" (or vice versa) flips the right answer.

Mistake #5: Ignoring the BEST vs MOST Keyword

ISACA uses precise qualifiers. BEST means "the single most effective"; MOST / GREATEST means "the answer with the highest magnitude of the attribute asked about"; FIRST means "the action that must come before the others." Ignoring the qualifier is the #1 reason smart candidates pick wrong-but-plausible answers.

Mistake #6: Under-Practicing

100 practice questions is not enough. You need 1,000+, with the final 2 weeks spent on timed, full-length sets in a 4-hour block.

Mistake #7: Skipping the Manual for Bootcamps

Bootcamps and YouTube summarize. ISACA writes the exam from the CRISC Review Manual. If you skip it, you will miss the wording nuances that make the difference between a pass and a fail.

Mistake #8: Under-Studying Domains 3 and 1

Domains 3 (32%) and 1 (26%) are 58% of the exam. Candidates who over-invest in Domain 4 (Technology and Security, 20%) and under-prepare on Risk Response and Governance routinely fail. Front-load Domain 1 in weeks 1-2 and start Domain 3 by week 5 of a 12-16 week plan.


CRISC vs CISM vs CISA vs CISSP — And How to Stack

CertBodyFocusExperienceBest For
CRISCISACAIT risk management3 years in 2+ of 4 domainsIT Risk Managers, CROs, GRC
CISMISACAInformation security management5 years InfoSec, 3 in mgmtSecurity managers, CISOs
CISAISACAIT audit, control, assurance5 years IS audit/control/securityIT auditors, compliance pros
CISSPISC2Security management + technical5 years in 2+ domainsSenior security engineers, CISOs
CGEITISACAExecutive IT governance5 years IT governance, 1 in leadershipCIOs, IT governance leaders
CDPSEISACAPrivacy engineering + assurance3 years privacy + technicalPrivacy engineers, DPOs

CRISC vs CISM: The Closest Comparison

DimensionCRISCCISM
Primary audienceIT Risk Manager, CRO trackSecurity Manager, CISO track
Depth on riskVery deep (methodology, quantitative, register)Moderate (one of four domains)
Depth on security programModerate (one of four domains, IT & Security)Very deep (Program is 33% of CISM)
Depth on incident responseLightHeavy (30% of CISM)
Best if your title has"Risk""Security Manager" or "CISO"

Stacking Strategy

  • CRISC + CISM: Most common ISACA stack. Risk depth + security management. Ideal for CISOs who also own enterprise risk.
  • CRISC + CISA: Audit-to-risk pivot. Common in Big 4 and internal audit.
  • CRISC + CISSP: Technical-to-risk pivot. Senior engineer who now owns risk.
  • CRISC + CGEIT: Executive track. CIO / CRO combination.
  • CRISC + CDPSE: Risk + privacy — growing fast with AI governance.

Your Next Steps After CRISC

Natural follow-ups: CISM (security management), CISA (audit perspective), CGEIT (executive governance), CDPSE (privacy), AAIA (ISACA AI audit), FAIR certification (Open FAIR for deeper quantitative risk), or ISO 31000 / ISO 27005 training.

All five ISACA credentials share a single 3-year CPE cycle when held simultaneously — so CRISC + CISM + CISA maintenance is the same 120 hours as CRISC alone.


Final CTA: Start Practicing Today

CRISC is a pass-able exam with a clear roadmap. The candidates who fail almost always share one trait: they treated it like a security or audit exam. You can fix that right now.

Start practicing nowPractice questions with detailed explanations

The 2026 IT risk job market has more openings than qualified candidates. CRISC is the fastest credential path into those openings. The only thing between you and that IT Risk Manager or CRO title is the 150-question exam — and a study plan that actually works.

Good luck. You can do this.


Official Sources

Information current as of April 2026. Always verify specific fees, dates, domain weights, and eligibility details at isaca.org before applying or registering.

Test Your Knowledge
Question 1 of 8

What is the passing score for the 2026 ISACA CRISC exam on its 200-800 scaled scoring system?

A
400
B
450
C
500
D
700
Learn More with AI

10 free AI interactions per day

CRISCISACAIT Risk ManagementRisk AssessmentRisk ResponseInformation Systems ControlGRCEnterprise Risk ManagementIT CertificationNIST RMFISO 31000Study Plan

Related Articles

Stay Updated

Get free exam tips and study guides delivered to your inbox.

Free exam tips & study guides. Unsubscribe anytime.