ISC2 Certified in Governance Risk and Compliance

This official ISC2® Certified in Governance, Risk and Compliance (CGRC) Training prepares you for the CGRC exam. The Certified in Governance, Risk and Compliance (CGRC®) is an information security practitioner who advocates for security risk management in pursuit of information system authorisation to support an organisation’s mission and operations in accordance with legal and regulatory requirements.

Interested in attending? Have a suggestion about running this event near you?
Register your interest now

Description

Domain 1:
Information Security Risk Management Programme
1.1 Understand the foundation of an organisation's information security risk management programme » Principles of information security
Risk management frameworks (e.g., National Institute of Standards and Technology (NIST), cyber security framework, Control Objectives for Information and Related Technology (COBIT), International Organisation for Standardisation (ISO) 27001, International Organisation for Standardisation (ISO) 31000)
System Development Life Cycle (SDLC)
Information system boundary requirements
Security controls and practices
Roles and responsibilities in the authorisation/approval process
1.2 Understand risk management programme processes
Select programme management controls
Privacy requirements
Determine third-party hosted information systems
Understand regulatory and legal requirements
Familiarise with governmental, organisational, and international regulatory security and privacy requirements (e.g., International Organisation for Standardisation (ISO) 27001, Federal Information Security Modernisation Act (FISMA), Federal Risk and Authorisation Management Programme (FedRAMP), General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA))
Familiarise with other applicable security-related mandates
Domain 2:
Scope of the Information System
2.1 Define the information system
Determine the scope of the information system
Describe the architecture (e.g., data flow, internal and external interconnections)
Describe information system purpose and functionality
2.2 Determine categorisation of the information system
Identify the information types processed, stored, or transmitted by the information system
Determine the impact level on confidentiality, integrity, and availability for each information type (e.g., Federal Information Processing Standards (FIPS) 199, International Organisation for Standardisation/ International Electrotechnical Commission (ISO/IEC) 27002, data protection impact assessment)
Determine information system categorisation and document results
Domain 3:
Selection and Approval of Security and Privacy Controls
3.1 Identify and document baseline and inherited controls
3.2 Select and tailor controls to the system
Determine applicability of recommended baseline and inherited controls
Determine appropriate use of control enhancements (e.g., security practices, overlays, countermeasures)
Document control applicability
3.3 Develop a continuous control monitoring strategy (e.g., implementation, timeline, effectiveness)
3.4 Review and approve security plan/Information Security Management System (ISMS)
Domain 4:
Implementation of Security and Privacy Controls
4.1 Implement selected controls
Determine mandatory configuration settings and verify implementation in accordance with current industry standards (e.g. appropriate organisation entities (e.g., physical security, personnel security, privacy)
Domain 5:
Assessment/Audit of Security and Privacy Controls
5.1 Prepare for assessment/audit
Determine assessor/auditor requirements
Establish objectives and scope
Determine methods and level of effort
Determine necessary resources and logistics
Collect and review artefacts (e.g., previous assessments/audits, system documentation, policies)
Finalise the assessment/audit plan
5.2 Conduct assessment/audit
Collect and document assessment/audit evidence
Assess/audit implementation and validate compliance using approved assessment methods (e.g., interview, test and examine)
5.3 Prepare the initial assessment/audit report
Analyse assessment/audit results and identify vulnerabilities
Propose remediation actions
5.4 Review initial assessment/audit report and perform remediation actions
Determine risk responses
Apply remediations
Reassess and validate the remediated controls
5.5 Develop final assessment/audit report
5.6 Develop a remediation plan
Analyse identified residual vulnerabilities or deficiencies
Prioritise responses based on risk level
Identify resources (e.g. financial, personnel, and technical) and determine the appropriate timeframe/ schedule required to remediate deficiencies
Domain 6:
Authorisation/Approval of Information System
6.1 Compile security and privacy authorisation/approval documents
Compile required security and privacy documentation to support authorisation/approval decision by the designated official
6.2 Determine information system risk
Evaluate information system risk
Determine risk treatment options (i.e., accept, avoid, transfer, mitigate, share)
Determine residual risk
6.3 Authorise/approve information system
Determine terms of authorisation/approval
Domain 7:
Continuous Monitoring
7.1 Determine the impact of changes to information systems and the environment
Identify potential threats and impacts to the operation of information systems and environments
Analyse risk due to proposed changes accounting for organisational risk tolerance » Approve and document proposed changes

Domain 1:Information Security Risk Management Programme1.1 Understand the foundation of an organisation's information security risk management programme » Principles of information securityRisk management frameworks (e.g., National Institute of Standards and Technology (NIST), cyber security framework, Control Objectives for Information and Related Technology (COBIT), International Organisation for Standardisation (ISO) 27001, International Organisation for Standardisation (ISO) 31000)System Development Life Cycle (SDLC)Information system boundary requirementsSecurity controls and practicesRoles and responsibilities in the authorisation/approval process1.2 Understand risk management programme processesSelect programme management controlsPrivacy requirementsDetermine third-party hosted information systemsUnderstand regulatory and legal requirementsFamiliarise with governmental, organisational, and international regulatory security and privacy requirements (e.g., International Organisation for Standardisation (ISO) 27001, Federal Information Security Modernisation Act (FISMA), Federal Risk and Authorisation Management Programme (FedRAMP), General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA))Familiarise with other applicable security-related mandatesDomain 2:Scope of the Information System2.1 Define the information systemDetermine the scope of the information systemDescribe the architecture (e.g., data flow, internal and external interconnections)Describe information system purpose and functionality2.2 Determine categorisation of the information systemIdentify the information types processed, stored, or transmitted by the information systemDetermine the impact level on confidentiality, integrity, and availability for each information type (e.g., Federal Information Processing Standards (FIPS) 199, International Organisation for Standardisation/ International Electrotechnical Commission (ISO/IEC) 27002, data protection impact assessment)Determine information system categorisation and document resultsDomain 3:Selection and Approval of Security and Privacy Controls3.1 Identify and document baseline and inherited controls3.2 Select and tailor controls to the systemDetermine applicability of recommended baseline and inherited controlsDetermine appropriate use of control enhancements (e.g., security practices, overlays, countermeasures)Document control applicability3.3 Develop a continuous control monitoring strategy (e.g., implementation, timeline, effectiveness)3.4 Review and approve security plan/Information Security Management System (ISMS)Domain 4:Implementation of Security and Privacy Controls4.1 Implement selected controlsDetermine mandatory configuration settings and verify implementation in accordance with current industry standards (e.g. appropriate organisation entities (e.g., physical security, personnel security, privacy)Domain 5:Assessment/Audit of Security and Privacy Controls5.1 Prepare for assessment/auditDetermine assessor/auditor requirementsEstablish objectives and scopeDetermine methods and level of effortDetermine necessary resources and logisticsCollect and review artefacts (e.g., previous assessments/audits, system documentation, policies)Finalise the assessment/audit plan5.2 Conduct assessment/auditCollect and document assessment/audit evidenceAssess/audit implementation and validate compliance using approved assessment methods (e.g., interview, test and examine)5.3 Prepare the initial assessment/audit reportAnalyse assessment/audit results and identify vulnerabilitiesPropose remediation actions5.4 Review initial assessment/audit report and perform remediation actionsDetermine risk responsesApply remediationsReassess and validate the remediated controls5.5 Develop final assessment/audit report5.6 Develop a remediation planAnalyse identified residual vulnerabilities or deficienciesPrioritise responses based on risk levelIdentify resources (e.g. financial, personnel, and technical) and determine the appropriate timeframe/ schedule required to remediate deficienciesDomain 6:Authorisation/Approval of Information System6.1 Compile security and privacy authorisation/approval documentsCompile required security and privacy documentation to support authorisation/approval decision by the designated official6.2 Determine information system riskEvaluate information system riskDetermine risk treatment options (i.e., accept, avoid, transfer, mitigate, share)Determine residual risk6.3 Authorise/approve information systemDetermine terms of authorisation/approvalDomain 7:Continuous Monitoring7.1 Determine the impact of changes to information systems and the environmentIdentify potential threats and impacts to the operation of information systems and environmentsAnalyse risk due to proposed changes accounting for organisational risk tolerance » Approve and document proposed changes 

Audience

  • Cybersecurity Auditor
  • Cybersecurity Compliance Officer
  • GRC Architect
  • GRC Manager
  • Cybersecurity Risk and Compliance Project Manager
  • Cybersecurity Risk and Controls Analyst
  • Cybersecurity Third-Party Risk Manager
  • Enterprise Risk Manager
  • GRC Analyst
  • GRC Director
  • Information Assurance Manager

Prerequisites

To qualify for the CGRC certification, you must have a minimum of two years of cumulative, paid, full-time work experience in one or more of the seven domains of the CGRC Common Body of Knowledge (CBK).

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright GTP Computrain, Limited 2025