CISA Logo

Application for CISA Certification

Requirements to Become a Certified Information Systems Auditor (Click to Expand or Collapse Requirements)

Instructions for Completion of the Application (Sections A1-A4) (Click to Expand or Collapse Instructions)

CISA CertificationóCode of Professional Ethics

I have read and understand the above referenced Ethics statements and will adhere to them.

CISA logo

Application for CISA Certification

Page 1

Application Form

Applicant Information

First Name Middle Name/Initial Last/Family Exam ID
Maiden Name or Former Name:  
Preferred Mailing Address: Home Business  
Home Address State / Province
Street Address Line 2 Postal/Zip Code
City Country
Applicant Home Telephone Applicant Email Address

Present Employer Information

Job Title Business Name
Business Street Address State / Province
Street Address Line 2 Postal/Zip Code
City Country
Business Telephone Business Fax
Business Email Address
Immediate Supervisor Name: Supervisor Title
I hereby apply to Information Systems Audit and Control Association, Inc. (ISACA) for the Certified Information Systems Auditor (CISA) certification in accordance with and subject to the procedures and policies of ISACA. I have read and agree to the conditions set forth in the Application for Certification and the Continuing Professional Education (CPE) Policy in effect at the time of my application, covering the Certification process and CPE policy. I agree: to provide proof of meeting the eligibility requirements; to permit ISACA to ask for clarification or further verification of all information submitted pursuant to the Application, including but not limited to directly contacting any verifying professional to confirm the information submitted; to comply with the requirements to attain and maintain the certification, including eligibility requirements carrying out the tasks of a CISA, compliance with ISACAís Code of Ethics, standards, and policies and the fulfillment of renewal requirements; to notify the ISACA certification department promptly if I am unable to comply with the certification requirements; to carry out the tasks of a CISA; to make claims regarding certification only with respect to the scope for which certification has been granted; and not use the CISA certificate or logos or marks in a misleading manner or contrary to ISACA guidelines. I understand and agree that my Certification application will be denied and any credential granted me by ISACA will be revoked and forfeited in the event that any of the statements or answers provided by me in this application are false or in the event that I violate any of the examination rules or certification requirements. I understand that all certificates are owned by ISACA and if my certificate is granted and then revoked, I will destroy the certificate, discontinue its use and retract all claims of my entitlement to the Certification. I authorize ISACA to make any and all inquiries and investigations it deems necessary to verify my credentials and my professional standing. I acknowledge that if I am granted the Certification, my certification status will become public, and may be disclosed by ISACA to third parties who inquire. If my application is not approved, I understand that I am able to appeal the decision by contacting certification@isaca.org. Appeals undertaken by a Certification exam taker, Certification applicant or by a certified individual are undertaken at the discretion and cost of the examinee or applicant.

By signing below, I authorize ISACA to disclose my Certification status. This contact information will be used to fulfill my Certification inquiries and requests. By signing below, I authorize ISACA to contact me at the address and numbers provided and that the information I provided is my own and is accurate. I authorize ISACA to release confidential Certification application and certification information if required by law or as described in ISACAís Privacy Policy. To learn more about how we use the information you have provided on this form, please read our Privacy Policy, available at www.isaca.org/privacy.

I hereby agree to hold ISACA, its officers, directors, examiners, employees, agents and those of its supporting organizations harmless from any complaint, claim, or damage arising out of any action or omission by any of them in connection with this application; the application process; the failure to issue me any certificate; or any demand for forfeiture or redelivery of such certificate. Not withstanding the above, I understand and agree that any action arising out of, or pertaining to this application must be brought in the Circuit Court of Cook County, Illinois, USA, and shall be governed by the laws of the State of Illinois, USA.

I UNDERSTAND THAT THE DECISION AS TO WHETHER I QUALIFY FOR CERTIFICATION RESTS SOLELY AND EXCLUSIVELY WITH ISACA AND THAT THE DECISION OF ISACA IS FINAL.

I HAVE READ AND UNDERSTAND THESE STATEMENTS AND I INTEND TO BE LEGALLY BOUND BY THEM.
Name: Date:
Signature:
CISA logo

Application for CISA Certification

Page 2
Applicant Name: Exam ID:

Work Experience Detail

A. Information Systems Audit, Control or Security Experience

óList your most recent experience first. A candidate must have a minimum of two years of IS audit, control or security experience. Two years of experience is considered 4,000 actual hours, with the exception for full time instructors (see B. Experience Substitution below).
Work experience must be gained within the ten year period preceding the application date for certification or within 5 years from the date of initially passing the exam. Do not leave dates blank. If currently employed, include a date or current, now, present, etc.
Employer Name Dates of employment
in IS Audit, Control or Security
Duration of experience
MM/YY to MM/YY Years Months
Employer Name to
Employer Name to
Employer Name to
Total number of years IS auditing, control or security experience (round down to whole year) Total:

B. Experience Substitution

óA maximum of 1 year IS auditing, control or security experience may be substituted with either one full year of auditing experience ó or one full year of information systems experience.
Company/
University Name
Dates of Employment Type of
Experience
Number of Years
of Substitution
MM/YY to MM/YY
to Non-IS Audit
to Information Systems
to University Instructor*
*There is no maximum limitation for university instructor experience. However, two full years of university instructor experience in a related field is required for each one year of IS auditing, control or security experience substitution.

C. Educational Experience Waiver

óIf you are applying for any experience waivers, please include information on your degree below. Check the appropriate box. To confirm your degree status, include with your application a copy of your degree, transcript or letter from your college or university.
University NameEducational Degree AwardedEducational Field of Study
Educational Experience Waiver (Check one which applies to the waiver you are claiming.) *Copy of degree required.
One year substitution waiver for a 2-Year university degree or equivalent 60 semester credit hours.
Two years substitution waiver for a Bachelorís, Masterís, Ph.D. or equivalent 120 semester credit hours.
Three years substitution waiver for a Bachelorís degree PLUS Masterís in Information Security or Information Technology.*
Three years substitution waiver for a Bachelorís or Masterís degree from a university that enforces the ISACA sponsored Model Curricula.*
OTHER WAIVERS (Must submit certificate as proof for waiver.)
Two year educational waiver for CIMA Ė Chartered Institute of Management Accountants, full certification,
Two year educational waiver for ACCA member status from the Association of Chartered Certified Accountants

D. Summary of Experience Requirements

1. Total number of years of information systems audit, control or security experience ó enter the total from Section A above (minimum of 2 years)
2. If applying for an experience substitution, enter number of years being substituted in the box and complete Section B above (maximum of 1 year).
3. If applying for an experience waiver, enter 1, 2 or 3 in the box as appropriate and complete Section C above
Total Work Experienceóadd boxes 1, 2 and 3(boxes 2 and 3 cannot exceed 3 years) (must total five years or more to apply for CISA certification)

E. Individuals Verifying Work Experience Details

óPlease record here the names and contact information of the individual(s) that will verify your work experience in sections A and B above:
1. Verifier's Name Job Title Company Name
Company Telephone Number Company Email Address
2. Verifier's Name Job Title Company Name
Company Telephone Number Company Email Address
3. Verifier's Name Job Title Company Name
Company Telephone Number Company Email Address
CISA logo

Application for CISA Certification

Page 3
Applicant Name: Exam ID:

Verification of Work Experience

I, , am applying for certification through ISACA as a Certified Information Systems Auditor. My work experience must be independently verified by my current and/or previous employer(s). The individual verifying the work experience must be an independent verifier and not of any relation to the applicant nor can the verifier verify his/her own work. If I currently or once worked as an independent consultant, I can use a knowledgeable client or an individual certified as a CISA or CISM to perform this role.

I would appreciate your cooperation in completing this form, by verifying my IS auditing, control or security work experience as noted on my application form attached and as described by CISA job practice area and task statements. Please return the complete form to me for my submission to ISACA. If you have any questions concerning this form, please direct them to CISAapplication@isaca.org or +1.847.660.5660. Thank you.

DateApplicant's Signature

Employer's Verification Information

Verifier's Name Company Name
Job Title
Street Address State / Province
Street Address Line 2 Postal/Zip Code
City Country
Company Telephone Number Company Email Address
Name of company relating to candidate's employment from page 2:
Please answer the six questions below, and then sign and date where indicated on the printed form.
(The following statements are to be confirmed by the Verifier after printing the application)
1. Have you functioned in a supervisory position to the applicant such that you can verify his/her work experience? Yes No N/A
2. How long have you known the applicant?
3. Is the categorization and duration of the applicant's work experience, for your organization, as listed on the application for certification form, correct to the best of your knowledge? Yes No N/A
4. Are you qualified and willing to verify the applicant's work experience prior to his/her affiliation with your company/organization? Yes No N/A
5. Are you qualified and willing to verify the applicant's educational experience waiver(s) claimed? Yes No N/A
6. Is there any reason you believe this applicant should not be certified as an information systems auditor? Yes No

DateVerifier's Signature

CISA logo

Application for CISA Certification

Page 4
Applicant Name: Applicant Exam ID:
Verifier Name:

DateVerifier's Signature


Description of CISA Job Practice Areas

Please check the boxes that indicate the tasks performed by applicant. Upon review, please sign and date the bottom of this page.

Domain 1: The Process of Auditing Information Systems Ė Provide audit services in accordance with IT audit standards to assist the organization with protecting and controlling information systems.
Domain 1 Task Statements
Develop and implement a risk-based IT audit strategy in compliance with IT audit standards to ensure that key areas are included.
Plan specific audits to determine whether information systems are protected, controlled and provide value to the organization.
Conduct audits in accordance with IT audit standards to achieve planned audit objectives.
Report audit findings and make recommendations to key stakeholders to communicate results and effect change when necessary.
Conduct follow-ups or prepare status reports to ensure appropriate actions have been taken by management in a timely manner.
Domain 2: Governance and Management of IT Ė Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organizationís strategy.
Domain 2 Task Statements
Evaluate the effectiveness of the IT governance structure to ensure adequate board control over the decisions, directions and performance of IT so that it supports the organization's strategies and objectives.
Evaluate IT organizational structure and human resources (personnel) management to determine whether they support the organizationís strategies and objectives.
Evaluate the IT strategy, including the IT direction, and the processes for the strategyís development, approval, implementation and maintenance for alignment with the organizationís strategies and objectives.
Evaluate the organizationís IT policies, standards, and procedures, and the processes for their development, approval, implementation, maintenance, and monitoring, to determine whether they support the IT strategy and comply with regulatory and legal requirements.
Evaluate the adequacy of the quality management system to determine whether it supports the organizationís strategies and objectives in a cost-effective manner.
Evaluate IT management and monitoring of controls (e.g., continuous monitoring, QA) for compliance with the organizationís policies, standards and procedures.
Evaluate IT resource investment, use and allocation practices, including prioritization criteria, for alignment with the organizationís strategies and objectives.
Evaluate IT contracting strategies and policies, and contract management practices to determine whether they support the organizationís strategies and objectives.
Evaluate risk management practices to determine whether the organizationís IT-related risks are properly managed.
Evaluate monitoring and assurance practices to determine whether the board and executive management receive sufficient and timely information about IT performance.
Evaluate the organizationís business continuity plan to determine the organizationís ability to continue essential business operations during the period of an IT disruption.
Domain 3: Information Systems Acquisition, Development and Implementation Ė Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organizationís strategies and objectives.
Domain 3 Task Statements
Evaluate the business case for proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether it meets business objectives.
Evaluate the project management practices and controls to determine whether business requirements are achieved in a cost-effective manner while managing risks to the organization.
Conduct reviews to determine whether a project is progressing in accordance with project plans, is adequately supported by documentation and status reporting is accurate.
Evaluate controls for information systems during the requirements, acquisition, development and testing phases for compliance with the organizationís policies, standards, procedures and applicable external requirements.
Evaluate the readiness of information systems for implementation and migration into production to determine whether project deliverables, controls, and organizationís requirements are met.
Conduct post-implementation reviews of systems to determine whether project deliverables, controls, and organizationís requirements are met.
Domain 4: Information Systems Operations, Maintenance and Support Ė Provide assurance that the processes for information systems operations, maintenance and support meet the organizationís strategies and objectives.
Domain 4 Task Statements
Conduct periodic reviews of information systems to determine whether they continue to meet the organizationís objectives.
Evaluate service level management practices to determine whether the level of service from internal and external service providers is defined and managed.
Evaluate third party management practices to determine whether the levels of controls expected by the organization are being adhered to by the provider.
Evaluate operations and end-user procedures to determine whether scheduled and non-scheduled processes are managed to completion.
Evaluate the process of information systems maintenance to determine whether they are controlled effectively and continue to support the organizationís objectives.
Evaluate data administration practices to determine the integrity and optimization of databases.
Evaluate the use of capacity and performance monitoring tools and techniques to determine whether IT services meet the organizationís objectives.
Evaluate problem and incident management practices to determine whether incidents, problems or errors are recorded, analyzed and resolved in a timely manner.
Evaluate change, configuration and release management practices to determine whether scheduled and non-scheduled changes made to the organizationís production environment are adequately controlled and documented.
Evaluate the adequacy of backup and restore provisions to determine the availability of information required to resume processing.
Evaluate the organizationís disaster recovery plan to determine whether it enables the recovery of IT processing capabilities in the event of a disaster.
Domain 5: Protection of Information Assets Ė Provide assurance that the organizationís security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.
Domain 5 Task Statements
Evaluate the information security policies, standards and procedures for completeness and alignment with generally accepted practices.
Evaluate the design, implementation and monitoring of system and logical security controls to verify the confidentiality, integrity and availability of information.
Evaluate the design, implementation, and monitoring of the data classification processes and procedures for alignment with the organizationís policies, standards, procedures, and applicable external requirements.
Evaluate the design, implementation and monitoring of physical access and environmental controls to determine whether information assets are adequately safeguarded.
Evaluate the processes and procedures used to store, retrieve, transport and dispose of information assets (e.g., backup media, offsite storage, hard copy/print data, and softcopy media) to determine whether information assets are adequately safeguarded.

Insert Additional Verification of Work Experience

Clicking the Print button below does not submit your information.
Please sign the completed application and either email, fax or postal mail your application to:

ISACA
3701 N. Algonquin Rd.
Suite 1010
Rolling Meadows, IL, USA 60008
Fax: 847.253.1443
Email: certification@isaca.org