Overview

5 ISC2 Code of Ethics

This chapter explains why a strong ethical foundation is indispensable for cybersecurity professionals who are entrusted with sensitive data, privileged access, and powerful tools. It distinguishes personal ethics from professional ethics and shows how formal codes guide behavior when competing values collide. Through common dilemmas—such as balancing compassion and fairness, privacy and transparency, or safety and profit—the chapter frames ethics as practical decision-making anchored in policies, law, and professional standards.

ISC2’s Code of Ethics is presented as the profession’s compass, composed of a preamble and four canons that set expectations for certified members. The preamble emphasizes safeguarding society and the common good and makes compliance a condition of certification. The four canons require practitioners to: prioritize societal welfare and public trust, including the security of critical infrastructure; act honorably, honestly, responsibly, and within the law; deliver competent, diligent, and economical service to their principals; and advance and protect the profession through continuous learning, community contribution, and addressing unethical conduct.

Practical guidance illustrates how intent, impact, and legality determine ethical standing in day-to-day choices (for example, the acceptable use of public information, or the risks of deceptive online personas). The chapter also outlines reporting: anyone may file complaints related to the first two canons, canon III complaints require a contractual relationship, and canon IV matters are limited to ISC2 members. Candidates must sign the Code after passing the exam, and the exam may test scenario-based judgment. Ultimately, consistent adherence to these standards builds trust, safeguards organizations and the public, and underpins professional credibility.

Summary of ISC2 Canons and their main goals

Answers to Review Questions

  1. The correct answer is B. While reporting security vulnerabilities is an important aspect of information security; it is not explicitly stated as a principle within the ISC2 Code of Ethics Canons.
  2. The correct answer is C. Provide diligent and competent service to principals. This principle emphasizes the importance of providing quality service to clients or employers and fulfilling professional responsibilities with due care and expertise.
  3. The correct answer is A. Protect society, the common good, necessary public trust and confidence, and the infrastructure. This Canon emphasizes a security analyst's duty to avoid harm and uphold public well-being by protecting society, the common good, necessary public trust and confidence, and the infrastructure.
  4. The correct answer is D. Having fake social media profiles and accounts can be socially objectionable but does not violate the ISC2 Ethics Canons. That being said, seeking to gain unauthorized access to resources on the internet, compromising the privacy of users, and disrupting the intended use of the internet are all considered unethical behaviors by ISC2, as well as by other similar professional organizations. Aside from being violations of professional codes of conduct, such actions may also be in violation of laws and regulations.
  5. The correct answer is C. The ISC2 Code of Ethics applies specifically to ISC2 members and certified professionals, not to all members of the information security. All the other statements are true. Adherence to the code is a condition of certification, failure to comply with the code may result in revocation of certification, and members who observe a breach of the code are required to report the possible violation.

FAQ

What is the ISC2 Code of Ethics and why does it matter for CC candidates?The Code sets professional standards for integrity, accountability, and respect for the law and stakeholders. Adherence is a condition of certification, and all Certified in Cybersecurity (CC) candidates must sign it after passing the exam.
What does the Preamble emphasize?It stresses a duty to protect society and the common good, maintain public trust, and serve clients and peers ethically. It also states that strict adherence to the Code is mandatory for certification.
What are the four ISC2 Code of Ethics canons?- Protect society, the common good, public trust and confidence, and the infrastructure: Put public welfare and trust first and safeguard digital infrastructure.
- Act honorably, honestly, justly, responsibly, and legally: Demonstrate integrity, avoid improper favors, consider consequences, and obey the law.
- Provide diligent and competent service to principals: Deliver skilled, accurate, relevant, and efficient work to those who engage your services.
- Advance and protect the profession: Pursue continuing education, contribute to the community, and report unethical conduct.
Who are “principals” in Canon III?“Principals” are those who engage your services—typically your employer or clients. Your duty is to provide competent, accurate, relevant, and cost‑effective advice and services.
How should I approach ethical dilemmas (e.g., wrongdoing by a colleague or friend)?Remain impartial, follow established policies and laws, and let evidence guide actions. Prioritize the public good, document decisions, and escalate through proper channels rather than showing favoritism.
Are ISC2 members required to report unethical behavior?Yes. Members are expected to intervene and report suspected violations. They must also refuse to break the law, even if pressured by superiors.
How do I report a suspected Code of Ethics violation, and who can file?Submit a formal ethics complaint to ISC2. Complaints about Canons I and II may be filed by anyone. Canon III complaints require a contractual relationship with the member. Canon IV complaints are limited to ISC2 members.
Do fake or anonymous online accounts violate the Code?Not inherently. They become unethical when used for deception or harm (e.g., impersonation, misleading customers, phishing). Intent and impact determine alignment with the Code.
Is using a competitor’s public information for product ideas ethical?Generally yes, if you use only publicly available information, respect intellectual property, and follow applicable laws and company policies. Do not use proprietary or confidential data.
Is liking a competitor’s social media post unethical?No. It is typically acceptable if no confidential information is disclosed and company policies permit it. Professional respect and lawful conduct remain essential.

pro $24.99 per month

  • access to all Manning books, MEAPs, liveVideos, liveProjects, and audiobooks!
  • choose one free eBook per month to keep
  • exclusive 50% discount on all purchases
  • renews monthly, pause or cancel renewal anytime

lite $19.99 per month

  • access to all Manning books, including MEAPs!

team

5, 10 or 20 seats+ for your team - learn more


choose your plan

team

monthly
annual
$49.99
$499.99
only $41.67 per month
  • five seats for your team
  • access to all Manning books, MEAPs, liveVideos, liveProjects, and audiobooks!
  • choose another free product every time you renew
  • choose twelve free products per year
  • exclusive 50% discount on all purchases
  • renews monthly, pause or cancel renewal anytime
  • renews annually, pause or cancel renewal anytime
  • Become ISC2 Certified in Cybersecurity ebook for free
choose your plan

team

monthly
annual
$49.99
$499.99
only $41.67 per month
  • five seats for your team
  • access to all Manning books, MEAPs, liveVideos, liveProjects, and audiobooks!
  • choose another free product every time you renew
  • choose twelve free products per year
  • exclusive 50% discount on all purchases
  • renews monthly, pause or cancel renewal anytime
  • renews annually, pause or cancel renewal anytime
  • Become ISC2 Certified in Cybersecurity ebook for free