CISA Logo

Application for CISA Certification

Requirements to Become a Certified Information Systems Auditor (Click to Expand or Collapse Requirements)

Instructions for Completion of the Application (Sections A1-A4) (Click to Expand or Collapse Instructions)

CISA CertificationóCode of Professional Ethics

I have read and understand the above referenced Ethics statements and will adhere to them.

CISA logo

Application for CISA Certification

Page 1

Application Form

Applicant Information

First Name Middle Name/Initial Last/Family Exam ID
Maiden Name or Former Name:  
Preferred Mailing Address: Home Business  
Home Address State / Province
Street Address Line 2 Postal/Zip Code
City Country
Applicant Home Telephone Applicant Email Address

Present Employer Information

Job Title Business Name
Business Street Address State / Province
Street Address Line 2 Postal/Zip Code
City Country
Business Telephone Business Fax
Business Email Address
Immediate Supervisor Name: Supervisor Title
I hereby apply to ISACA for issuance to me of Certification, as a Certified Information Systems Auditor (CISA) in accordance with and subject to the procedures and regulations of ISACA. I have read and agree to the conditions set forth in the CISA Application for Certification and Continuing Education Policy in effect at the time of my application, covering the Certification process; and Continuing Education policies. I agree to denial of Certification and to forfeiture and redelivery of any certificate or other credential granted me by ISACA in the event that any of the statements or answers made by me in this application are false or in the event that I violate any of the rules or regulations governing such exam. I understand that all certificates are owned by ISACA and if my certificate is granted and then revoked, I will destroy the certificate.

I authorize ISACA to make whatever inquiries and investigations it deems necessary to verify my credentials and my professional standing. If you become a Certified Information Systems Auditor, your certification status will become public, and may be disclosed by ISACA to third parties who inquire. If my application is not approved, I understand that I am able to appeal the decision by contacting certification@isaca.org. By signing below, you authorize ISACA to disclose your certification status. The contact information will be used to fulfill your request, and may also be used by ISACA to send you information about related ISACA goods and services, and other information in which we believe you may be interested. By signing below, you authorize ISACA to contact you at the address and number you have provided, including to provide you with marketing and promotional communications. You further represent that the information you provided is yours and is accurate. To learn more about how we use the information you have provided on this form, please read our Privacy Policy, available at www.isaca.org. If you are already and ISACA member, and /or if you elect to attend one of our events or purchase other ISACA programs or services, information you submit may also be used as described to you at that time.

I hereby agree to hold ISACA, its officers, directors, examiners, employees, and agents, harmless from any complaint, claim, or damage arising out of any action or omission by any of them in connection with this application; the application process; the failure to issue me any certificate; or any demand for forfeiture or redelivery of such certificate.

I understand that the decision as to whether I qualify for certification rests solely and exclusively with ISACA and that the decision of ISACA is final. I have read and understand these statements and I intend to be legally bound by them.
Name: Date:
Signature:
CISA logo

Application for CISA Certification

Page 2
Applicant Name: Exam ID:

Work Experience Detail

A. Information Systems Audit, Control or Security Experience

óList your most recent experience first. A candidate must have a minimum of two years of IS audit, control or security experience. Two years of experience is considered 4,000 actual hours, with the exception for full time instructors (see B. Experience Substitution below).
Employer Name Dates of employment
in IS Audit, Control or Security
Duration of experience
MM/YY to MM/YY Years Months
Employer Name to
Employer Name to
Employer Name to
Total number of years IS auditing, control or security experience (round down to whole year) Total:

B. Experience Substitution

óA maximum of 1 year IS auditing, control or security experience may be substituted with either one full year of auditing experience ó or one full year of information systems experience.
Company/
University Name
Dates of Employment Type of
Experience
Number of Years
of Substitution
MM/YY to MM/YY
to Non-IS Audit
to Information Systems
to University Instructor*
*There is no maximum limitation for university instructor experience. However, two full years of university instructor experience in a related field is required for each one year of IS auditing, control or security experience substitution.

C. Educational Experience Waiver

óIf you are applying for any experience waivers, please check the appropriate box. To confirm your degree status, please include with your application an original or copy of a transcript or letter from your college or university. Please provide your name as listed on the transcript.
Name on transcript:
Two years experience waiver for a four-year university degree, Masters Degree, or PhD
One year experience waiver for a two-year university degree
Equivalent educational experience to the above, listed here and official verification provided. (list)
One year experience waiver for a university degree that enforces the ISACA sponsored Model Curricula. (Cannot be used if three years substitution or waiver have been claimed.)

D. Summary of Experience Requirements

1. Total number of years of information systems audit, control or security experience ó enter the total from Section A above (minimum of 2 years)
2. If applying for an experience substitution, enter number of years being substituted in the box and complete Section B above (maximum of 1 year).
3. If applying for an experience waiver, enter 1, 2 or 3 in the box as appropriate and complete Section C above
Total Work Experienceóadd boxes 1, 2 and 3(boxes 2 and 3 cannot exceed 3 years) (must total five years or more to apply for CISA certification)

E. Individuals Verifying Work Experience Details

óPlease record here the names and contact information of the individual(s) that will verify your work experience in sections A and B above:
1. Verifier's Name Job Title Company Name
Company Telephone Number Company Email Address
2. Verifier's Name Job Title Company Name
Company Telephone Number Company Email Address
3. Verifier's Name Job Title Company Name
Company Telephone Number Company Email Address
CISA logo

Application for CISA Certification

Page 3
Applicant Name: Exam ID:

Verification of Work Experience

I, , am applying for certification through ISACA as a Certified Information Systems Auditor. My work experience must be independently verified by my current and/or previous employer(s). The individual verifying the work experience must be an independent verifier and not of any relation to the applicant nor can the verifier verify his/her own work. If I currently or once worked as an independent consultant, I can use a knowledgeable client or an individual certified as a CISA or CISM to perform this role.

I would appreciate your cooperation in completing this form, by verifying my IS auditing, control or security work experience as noted on my application form attached and as described by CISA job practice area and task statements. Please return the complete form to me for my submission to ISACA. If you have any questions concerning this form, please direct them to CISAapplication@isaca.org or +1.847.660.5660. Thank you.

DateApplicant's Signature

Employer's Verification Information

Verifier's Name Company Name
Job Title
Street Address State / Province
Street Address Line 2 Postal/Zip Code
City Country
Company Telephone Number Company Email Address
Name of company relating to candidate's employment from page 2:
Please answer the six questions below, and then sign and date where indicated on the printed form.
(The following statements are to be confirmed by the Verifier after printing the application)
1. Have you functioned in a supervisory position to the applicant such that you can verify his/her work experience? Yes No N/A
2. How long have you known the applicant?
3. Is the categorization and duration of the applicant's work experience, for your organization, as listed on the application for certification form, correct to the best of your knowledge? Yes No N/A
4. Are you qualified and willing to verify the applicant's work experience prior to his/her affiliation with your company/organization? Yes No N/A
5. Are you qualified and willing to verify the applicant's educational experience waiver(s) claimed? Yes No N/A
6. Is there any reason you believe this applicant should not be certified as an information systems auditor? Yes No

DateVerifier's Signature

CISA logo

Application for CISA Certification

Page 4
Applicant Name: Applicant Exam ID:
Verifier Name:

DateVerifier's Signature


Description of CISA Job Practice Areas

Please check the boxes that indicate the tasks performed by applicant. Upon review, please sign and date the bottom of this page.

Domain 1: The Process of Auditing Information Systems Ė Provide audit services in accordance with IT audit standards to assist the organization with protecting and controlling information systems.
Domain 1 Task Statements
Develop and implement a risk-based IT audit strategy in compliance with IT audit standards to ensure that key areas are included.
Plan specific audits to determine whether information systems are protected, controlled and provide value to the organization.
Conduct audits in accordance with IT audit standards to achieve planned audit objectives.
Report audit findings and make recommendations to key stakeholders to communicate results and effect change when necessary.
Conduct follow-ups or prepare status reports to ensure appropriate actions have been taken by management in a timely manner.
Domain 2: Governance and Management of IT Ė Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organizationís strategy.
Domain 2 Task Statements
Evaluate the effectiveness of the IT governance structure to ensure adequate board control over the decisions, directions and performance of IT so that it supports the organization's strategies and objectives.
Evaluate IT organizational structure and human resources (personnel) management to determine whether they support the organizationís strategies and objectives.
Evaluate the IT strategy, including the IT direction, and the processes for the strategyís development, approval, implementation and maintenance for alignment with the organizationís strategies and objectives.
Evaluate the organizationís IT policies, standards, and procedures, and the processes for their development, approval, implementation, maintenance, and monitoring, to determine whether they support the IT strategy and comply with regulatory and legal requirements.
Evaluate the adequacy of the quality management system to determine whether it supports the organizationís strategies and objectives in a cost-effective manner.
Evaluate IT management and monitoring of controls (e.g., continuous monitoring, QA) for compliance with the organizationís policies, standards and procedures.
Evaluate IT resource investment, use and allocation practices, including prioritization criteria, for alignment with the organizationís strategies and objectives.
Evaluate IT contracting strategies and policies, and contract management practices to determine whether they support the organizationís strategies and objectives.
Evaluate risk management practices to determine whether the organizationís IT-related risks are properly managed.
Evaluate monitoring and assurance practices to determine whether the board and executive management receive sufficient and timely information about IT performance.
Evaluate the organizationís business continuity plan to determine the organizationís ability to continue essential business operations during the period of an IT disruption.
Domain 3: Information Systems Acquisition, Development and Implementation Ė Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organizationís strategies and objectives.
Domain 3 Task Statements
Evaluate the business case for proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether it meets business objectives.
Evaluate the project management practices and controls to determine whether business requirements are achieved in a cost-effective manner while managing risks to the organization.
Conduct reviews to determine whether a project is progressing in accordance with project plans, is adequately supported by documentation and status reporting is accurate.
Evaluate controls for information systems during the requirements, acquisition, development and testing phases for compliance with the organizationís policies, standards, procedures and applicable external requirements.
Evaluate the readiness of information systems for implementation and migration into production to determine whether project deliverables, controls, and organizationís requirements are met.
Conduct post-implementation reviews of systems to determine whether project deliverables, controls, and organizationís requirements are met.
Domain 4: Information Systems Operations, Maintenance and Support Ė Provide assurance that the processes for information systems operations, maintenance and support meet the organizationís strategies and objectives.
Domain 4 Task Statements
Conduct periodic reviews of information systems to determine whether they continue to meet the organizationís objectives.
Evaluate service level management practices to determine whether the level of service from internal and external service providers is defined and managed.
Evaluate third party management practices to determine whether the levels of controls expected by the organization are being adhered to by the provider.
Evaluate operations and end-user procedures to determine whether scheduled and non-scheduled processes are managed to completion.
Evaluate the process of information systems maintenance to determine whether they are controlled effectively and continue to support the organizationís objectives.
Evaluate data administration practices to determine the integrity and optimization of databases.
Evaluate the use of capacity and performance monitoring tools and techniques to determine whether IT services meet the organizationís objectives.
Evaluate problem and incident management practices to determine whether incidents, problems or errors are recorded, analyzed and resolved in a timely manner.
Evaluate change, configuration and release management practices to determine whether scheduled and non-scheduled changes made to the organizationís production environment are adequately controlled and documented.
Evaluate the adequacy of backup and restore provisions to determine the availability of information required to resume processing.
Evaluate the organizationís disaster recovery plan to determine whether it enables the recovery of IT processing capabilities in the event of a disaster.
Domain 5: Protection of Information Assets Ė Provide assurance that the organizationís security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.
Domain 5 Task Statements
Evaluate the information security policies, standards and procedures for completeness and alignment with generally accepted practices.
Evaluate the design, implementation and monitoring of system and logical security controls to verify the confidentiality, integrity and availability of information.
Evaluate the design, implementation, and monitoring of the data classification processes and procedures for alignment with the organizationís policies, standards, procedures, and applicable external requirements.
Evaluate the design, implementation and monitoring of physical access and environmental controls to determine whether information assets are adequately safeguarded.
Evaluate the processes and procedures used to store, retrieve, transport and dispose of information assets (e.g., backup media, offsite storage, hard copy/print data, and softcopy media) to determine whether information assets are adequately safeguarded.

Insert Additional Verification of Work Experience

Clicking the Print button below does not submit your information.
Please sign the completed application and either email, fax or postal mail your application to:

ISACA
3701 N. Algonquin Rd.
Suite 1010
Rolling Meadows, IL, USA 60008
Fax: 847.253.1443
Email: certification@isaca.org