CIDPRO™ Test Item Writers

Criteria for References

  1. Reference must be freely available; meaning there is no cost to access the information . Books are a good resource as they are publicly available via library rental. Content purchased with money or information (e.g., personal email address, etc.) is not acceptable. Content accessed after viewing an advertisement is acceptable but discouraged.
  2. Vendor sites are acceptable as long as the relevant information in the referenced material is vendor neutral.
  3. Do not use blog posts, Wikipedia, or vendor-specific pages.

References Used in the Certification Development Process

CIDPRO™ Item Writer Qualifications

  • Identity & Access Management industry experience aligns with the core exam themes (see below)
  • Discretion and confidentiality are essential
  • Previous item writing experience is desirable but not required (training will be provided)
  • Excellent writing and editing skills a plus
  • Collaborative work style – participants are comfortable giving and receiving feedback


CIDPRO™ Item Writer Benefits

  • Item writers may be eligible to receive the CIDPRO Credential and Badge
  • Enhancement of professional skills and foundational industry knowledge
  • Expanded network for collaborating with global industry professionals
  • Training and support from exam development specialists
  • Contribute to advancing the Identity & Access Management (IAM) industry
  • Help shape the global evolution of IAM knowledge and Certification Standards


CIDPRO™ Item Writer Required Tasks

  • Training – 3 hours – March 25, 2021 at 1:00 PM (EDT) – check start for your time zone
  • Item Writing – up to 40 hours depending on availability – April-May 2021
  • Identification of references – varies per area – April-May 2021


CIDPRO™ Item Writer Selection Criteria

Selection criteria includes but is not limited to:

  • Years of experience
  • Expertise in core themes of the exam:
    • Functional components of an identity solution
    • Identifiers, identity lifecycle, and identity proofing
    • The core technologies of security for IAM
    • Rules and standards that relate to IAM
    • Operational considerations for IAM
  • Location