MEET AUTOMOTIVE INDUSTRY INFORMATION SECURITY REQUIREMENTS
TISAX Assessment and Certification
TISAX (Trusted Information Security Assessment Exchange) is the automotive industry’s standardized information security assessment framework. Developed by the VDA (German Association of the Automotive Industry) and administered by ENX Association, TISAX provides common recognition of security assessments throughout the global automotive supply chain. Our TISAX expertise guides organizations through assessment and certification across all levels.
Why TISAX Certification Matters
Automotive OEMs and tier-1 suppliers increasingly mandate TISAX certification for supply chain partners. Without TISAX certification at the required level, you cannot participate in many automotive projects or access sensitive information necessary for component development.
Automotive OEMs and tier-1 suppliers increasingly mandate TISAX certification for supply chain partners. Without TISAX certification at the required level, you cannot participate in many automotive projects or access sensitive information necessary for component development.
Automotive OEMs and tier-1 suppliers increasingly mandate TISAX certification for supply chain partners. Without TISAX certification at the required level, you cannot participate in many automotive projects or access sensitive information necessary for component development.
Understanding TISAX Requirements
VDA ISA Catalogue Foundation
TISAX assessments are based on the VDA Information Security Assessment (ISA) catalogue, building upon ISO/IEC 27001 with automotive-specific requirements. The catalogue addresses information security management, physical security, organizational security, technology security, and supplier relationships specific to automotive industry needs.
Assessment Objectives
TISAX assessments address multiple objectives based on client requirements:
- INFORMATION SECURITY: CORE VDA ISA REQUIREMENTS FOR PROTECTING INFORMATION ASSETS
- PROTOTYPE PROTECTION: ENHANCED PHYSICAL SECURITY FOR PRE-PRODUCTION VEHICLES AND COMPONENTS
- DATA PROTECTION: GDPR ARTICLE 28 REQUIREMENTS FOR PERSONAL DATA PROCESSORS
Clients specify which objectives and assessment levels their suppliers require.
Self-assessment for internal purposes only. Organization evaluates its own controls against VDA ISA catalogue without external verification. Results cannot be shared with clients and don’t result in TISAX label. Limited applicability in automotive supply chain.
Self-assessment followed by remote plausibility check. Organization completes self-assessment, then TISAX audit provider conducts documentation review and remote interviews verifying plausibility. Results in shareable TISAX label. Suitable for low to medium protection needs.
Comprehensive on-site verification. Includes self-assessment, on-site audit with physical inspection, process observation, detailed interviews, and evidence review. Most rigorous level, required for high protection needs. Results in highest-confidence TISAX label.
Our Comprehensive TISAX Services
Gap Analysis and Readiness Assessment
We evaluate your current information security posture against TISAX requirements:
- COMPREHENSIVE ASSESSMENT ACROSS ALL VDA ISA CONTROL
- AREAS IDENTIFICATION OF GAPS AND NON-CONFORMITIES
- PRIORITIZED REMEDIATION ROADMAP
- RESOURCE REQUIREMENT ESTIMATION
- REALISTIC TIMELINE DEVELOPMENT
ISMS Implementation
We help organizations implement information security management systems meeting TISAX expectations:
- POLICY FRAMEWORK DEVELOPMENT
- RISK ASSESSMENT AND TREATMENT PROCESSES
- SECURITY CONTROL IMPLEMENTATION
- DOCUMENTATION AND EVIDENCE PREPARATION
- MANAGEMENT REVIEW MECHANISMS
Control Implementation
We support implementation of specific TISAX controls:
- NETWORK SECURITY AND SEGMENTATION
- ENCRYPTION FOR DATA PROTECTION
- ACCESS CONTROL AND AUTHENTICATION
- PHYSICAL SECURITY FOR PROTOTYPES AND SENSITIVE AREAS
- SECURITY MONITORING AND LOGGING
- INCIDENT DETECTION AND RESPONSE
- SUPPLY CHAIN SECURITY MEASURES
Label Maintenance and Renewal
TISAX labels are valid for three years. We establish ongoing compliance programs ensuring:
- Continuous alignment with TISAX requirements
- Monitoring for changes affecting certification
- Periodic internal assessments
- Label renewal and reassessment management
Label scope may require updates when:
- New sites or facilities are added
- Business activities change significantly
- Client requirements evolve
- Additional assessment objectives are needed
Organizations with ISO 27001 certification have foundational controls supporting TISAX:
- Common ISMS framework and structure
- Overlapping security controls
- Similar documentation approaches
- Aligned audit and review processes
We leverage ISO 27001 implementations to streamline TISAX preparation, addressing automotive-specific requirements efficiently while maintaining both certifications.
Prototype protection objective requires stringent physical security:
- Secured areas with access controls
- Visitor management and escort procedures
- Camera and photography restrictions
- Prototype tracking and inventory
- Transportation security
- Disposal security for prototype materials
We implement prototype protection controls that satisfy TISAX requirements while maintaining operational efficiency and collaborative development processes with automotive clients.
Data Protection Compliance
GDPR Article 28 Requirements
Data protection objective addresses processor obligations:
- Processing agreements and documentation
- Technical and organizational measures
- Sub-processor management
- Data subject rights procedures
- Data breach notification processes
- International data transfer safeguards
FAQ’s
It is a maturity-based cybersecurity framework developed by the German Association of the Automotive Industry (VDA) and managed by the ENX Association. It allows automotive suppliers and service providers to demonstrate their information security capabilities to original equipment manufacturers (OEMs) through a single, shared assessment.
Legally, it is not mandatory. However, contractually, it has become a "ticket-to-trade" for working with major European automotive companies like Volkswagen, BMW, and Audi.
While TISAX is based on ISO/IEC 27001 (sharing about 90% of the same controls), it adds specific automotive requirements such as prototype protection and data protection for customer information. Unlike ISO 27001, which requires annual surveillance audits, a TISAX label is typically valid for three years without periodic check-ins.
Level 1: Self-assessment only; typically for low-risk providers. It does not result in a formal TISAX label.
Level 2: Remote audit or "plausibility check" by an accredited provider; required for handling sensitive data.
Level 3: Comprehensive on-site inspection; mandatory for companies handling highly sensitive data or physical prototypes.
Latest Insights
Threat Advisory: Weaponisation of Anthropic's...
Introduction: The Emergence of AI-Powered Cyber Threats In early 2026, a sophisticated cyber intrusion targeting the Mex...
AI Security Threat Series: Model Inversion
Extracting secrets from an AI that was never meant to share them A deployed AI model does not hand over its training dat...
Weekly Round-Up Issue 15
This week's round-up arrives against a backdrop of significant cyber, regulatory and assurance activity affecting health...
MHRA SaMD Classification for Agentic AI: Is Y...
I have spent the better part of a decade navigating the intersection of cybersecurity and regulated industries, from the...
LiteLLM Supply Chain Attack: The $10 Billion ...
In our original post from 27 March, we covered the initial details of the LiteLLM supply chain compromise: the affected ...
AI Security Threat Series: Data Poisoning
Corrupting an AI before it ever goes live Most AI attacks happen at the point of use. Data poisoning happens much earlie...
NHS Clinical Safety and AI Agents: What DCB01...
I've spent the better part of a decade in cybersecurity, working with digital health organisations and later across the ...
Red Teaming the Microsoft Agent Governance To...
I have spent the better part of a decade in the trenches of cybersecurity, moving from the high-stakes world of NHS digi...
