Career upgrade: Learn practical AI skills for better jobs and higher pay.
Level up
Cheat sheet

ISACA CISM Cheat Sheet

Information Security Governance

17%of exam

Enterprise GovernanceSecurity StrategyRolesPoliciesBusiness Case

Information Security Risk Management

20%of exam

Risk AssessmentRisk ResponseOwnershipMonitoringRisk Appetite

Information Security Program

33%of exam

Program ResourcesAsset ClassificationControlsAwarenessThird Parties

Incident Management

30%of exam

Incident ReadinessBIABCPDRPPost-Incident Review

Quick Facts

Exam
CISM
Credential
Security Manager
Questions
150 MCQ
Time
4 hours
Pass
450/800
Provider
ISACA
Experience
5 years
Update
Nov 3 2026

Manager Lens

Business risk before technical detail.

BusinessRiskOwnershipEvidence

Governance vs Management

Governance

  • Direction
  • Accountability
  • Oversight

Management

  • Execution
  • Resources
  • Operations

Governance decides why

Enterprise Governance

Board
Sets direction
Executives
Sponsor strategy
Steering committee
Prioritizes investments
Culture
Shapes behavior
Regulation
External obligation
Contract
Partner obligation
Charter
Authority source
Accountability
Owned outcomes

Policy vs Standard

Policy

  • Management intent
  • High level
  • Stable

Standard

  • Mandatory rule
  • Specific control
  • Measurable

Policy directs standards

Security Strategy

Alignment
Supports objectives
Roadmap
Sequenced change
Business case
Investment rationale
Budget
Funded priorities
Framework
Governance structure
Policy
Management intent
Standard
Mandatory rule
Guideline
Recommended practice

Management Signals

Effectiveness
Goal achieved
Efficiency
Resources optimized
Compliance
Requirement met
Assurance
Confidence level
Benchmark
External comparison
Trend
Direction over time
Dashboard
Executive view
Exception
Approved deviation

Risk Response Four

Avoid, mitigate, transfer, accept.

AvoidMitigateTransferAccept

Inherent vs Residual Risk

Inherent

  • Before controls
  • Raw exposure
  • Assessment start

Residual

  • After controls
  • Accepted exposure
  • Decision point

Residual needs ownership

Risk Response Picker

  1. Risk exceeds appetiteMitigate(Reduce exposure)
  2. Activity unnecessaryAvoid(Stop work)
  3. Insurance fitsTransfer(Share impact)
  4. Within appetiteAccept(Document approval)
  5. Owner missingAssign owner(Business accountable)
  6. Risk changesReassess(Update register)
  7. Controls failRemediate(Track action)
  8. Executives askRisk report(Business impact)

Risk Assessment

Asset
Value holder
Threat
Potential cause
Vulnerability
Weakness
Impact
Business harm
Likelihood
Event probability
Inherent risk
Before controls
Residual risk
After controls
Risk register
Tracked risks

Risk Response

Avoid
Stop activity
Mitigate
Reduce risk
Transfer
Share impact
Accept
Approve exposure
Appetite
Desired risk
Tolerance
Allowed variance
Owner
Business accountable
KRIs
Risk signals

Program Cycle

Design, implement, test, report, improve.

DesignImplementTestReportImprove

Metric vs KRI

Metric

  • Program performance
  • Control status
  • Trend evidence

KRI

  • Risk signal
  • Threshold breach
  • Decision trigger

KRIs warn early

Program Control Picker

  1. Behavior problemAwareness(Change conduct)
  2. Missing rulePolicy(Set intent)
  3. Need mandateStandard(Make required)
  4. Need evidenceTest controls(Prove operation)
  5. Vendor riskContract controls(Set obligations)
  6. Program unclearMetrics(Show status)

Program Development

Resources
People/tools/funds
Architecture
Control placement
Asset inventory
Known information
Classification
Value sensitivity
Metrics
Program evidence
Process
Repeatable workflow
Capability
Operational ability
Maturity
Process depth

Control Management

Preventive
Stops events
Detective
Finds events
Corrective
Restores state
Directive
Guides behavior
Compensating
Alternate safeguard
Testing
Control evidence
Awareness
Behavior change
Suppliers
External dependency

Incident Flow

Triage, contain, investigate, recover, improve.

TriageContainInvestigateRecoverImprove

BCP vs DRP

BCP

  • Business processes
  • Continuity focus
  • People included

DRP

  • Technology recovery
  • Systems focus
  • Restore platforms

DRP supports BCP

Incident Action Picker

  1. Possible eventTriage(Classify first)
  2. Damage spreadingContain(Limit scope)
  3. Facts unclearInvestigate(Preserve evidence)
  4. Law requiresNotify(Meet deadline)
  5. Service downRecover(Meet RTO)
  6. Data lostRestore(Meet RPO)
  7. Incident closedPost-review(Find causes)
  8. Plan untestedExercise(Validate readiness)

Incident Readiness

IRP
Response playbook
BIA
Impact priorities
BCP
Business continuity
DRP
Technology recovery
RTO
Restore time
RPO
Data loss
Tabletop
Scenario exercise
Escalation
Authority path

Containment vs Eradication

Containment

  • Limit spread
  • Short term
  • Preserve evidence

Eradication

  • Remove cause
  • Longer term
  • Clean environment

Contain before eradicate

Incident Operations

Detection
Identify incident
Triage
Prioritize response
Containment
Limit damage
Investigation
Establish facts
Evidence
Preserve integrity
Notification
Required reporting
Recovery
Resume service
Lessons learned
Improve controls

Common Traps

Security vs Business

Technical perfection Business alignment

Risk Owner

Security team owns Business owns

Compliance Trap

Compliance equals security Compliance informs risk

Incident First Step

Fix immediately Classify and contain

Metrics Trap

Count activities Show outcomes

Policy Detail

Procedure steps Management direction

Last Minute

  1. 1.Business owns risk
  2. 2.Governance sets direction
  3. 3.Management executes strategy
  4. 4.Residual risk needs approval
  5. 5.Policy guides standards
  6. 6.BCP precedes DRP
  7. 7.Contain before eradication
  8. 8.Metrics show outcomes
  9. 9.Vendors need contracts
  10. 10.Post-review improves program
Same family resources

Explore More ISACA Certifications

Continue into nearby exams from the same family. Each card keeps practice questions, study guides, flashcards, videos, and articles in one place.