Introduction to TISAX
Why is TISAX Crucial for Your Business?
In any business relationship, the exchange of confidential information is vital for value creation. When you receive sensitive data from partners, they need assurance that their information is protected with utmost care. The challenge arises in demonstrating your commitment to security in a tangible way. TISAX addresses this need by providing a standardized framework that defines and verifies secure information handling practices, ensuring partners can trust you with their critical data.
Who Sets the Benchmark for “Secure”?
In the vast landscape of information security, defining what constitutes “secure” handling of information is not a novel challenge. Standards such as ISO/IEC 27001 exist to offer a consolidated approach to managing information security, offering a blueprint that saves companies from reinventing security protocols. By adhering to established standards, businesses can ensure a harmonized, secure exchange of information, crucial for maintaining trust and efficiency in partnerships.
The Automotive Industry’s Unique Security Needs
General security standards may not fully cater to the specific requirements of the automotive industry. Recognizing this, automotive industry associations, such as the Verband der Automobilindustrie (VDA), have developed tailored standards that address these unique needs. The Information Security Assessment (ISA), a product of collective efforts within the automotive sector, defines security benchmarks specifically designed for this industry, ensuring that automotive companies can secure their information in line with industry-specific challenges.
Streamlining the Proof of Security
Repeatedly proving the same level of information security management to various partners is inefficient and burdensome. This challenge has been acknowledged by OEMs and suppliers alike within the automotive industry. To alleviate this redundancy and enhance efficiency, the Trusted Information Security Assessment Exchange (TISAX) was introduced. TISAX allows companies to prove their security measures effectively through a universally accepted assessment, reducing the need for multiple audits and fostering a more streamlined process for verifying information security across the automotive industry.
TISAX Process
Start your TISAX compliance with the essential ENX online registration, which collects your company's information and sets the assessment's scope. This initial step involves a fee. Visit enx.com/en-US/TISAX/.
Learn MoreInvolving preparation based on the ISA catalogue, selecting a TISAX audit provider, and undergoing the audit tailored to your partner's requirements. The process, starting with an initial audit, may extend with additional steps.
Learn MoreShare your assessment result with your partner. The content of the TISAX assessment report is structured in levels. You can decide up to which level your partner will have access. Your assessment result is valid for three years.
Learn MoreRegistration
Important concepts for registration
Assessment Scope
The TISAX assessment scope is critical for ensuring your company meets partner requirements for information security. It encompasses all areas of your business that handle confidential partner information. Defining a precise scope is vital for accurate audit and cost estimation. TISAX distinguishes between your Information Security Management System (ISMS) scope and the assessment scope, allowing flexibility in what’s audited versus your overall ISMS. The standard assessment scope, recommended for most, simplifies participation by setting a predefined audit area accepted across TISAX participants.
The scope encompasses all aspects of your organization that handle confidential and sensitive partner information. It’s crucial to accurately define this to ensure relevant areas are included in the TISAX assessment.
A Predefined Assessment Scope Designed To Simplify The Process For Most Organizations. It Focuses On Areas Universally Accepted As Critical For Information Security, Making It A Suitable Choice For A Wide Range Of Participants.
Offers Flexibility By Allowing Organizations To Adjust The Predefined Standard Scope To Better Fit Their Specific Needs, Ensuring A More Relevant And Effective Assessment.
Physical And Virtual Locations Included In The Assessment. This Can Range From Entire Sites To Specific Departments Or Systems, Depending On Where Relevant Information Is Processed, Stored, Or Accessed.
Assessment Objectives
During the registration process for TISAX (Trusted Information Security Assessment Exchange), it’s essential to define your assessment objectives. These objectives are critical as they outline the specific requirements your information security management system (ISMS) must meet, depending on the type of data you manage for your partner. Selecting the appropriate assessment objectives is key to simplifying communication with both your partner and TISAX auditors, as it provides a clear reference point for the assessment process. This section will guide you on how to choose suitable assessment objectives.
Information Security
Handling of information with high protection needs in the context of confidentiality (access to confidential information)
Companies handling information deemed highly sensitive regarding confidentiality, or typically marked as confidential under their own classification scheme (for example, as outlined in the VDA white paper on the harmonization of classification levels), should opt for this specific TISAX label. This recommendation applies particularly if the unauthorized release of such information might lead to significant repercussions, such as damage to reputation, legal penalties, or financial losses.
Criteria Catalogue: Information Security (Must, Should, High [Marked with "C"] )
Handling Of Information With Very High Protection Needs In The Context Of Confidentiality (Access To Strictly Confidential Information)
Companies that manage information requiring very high confidentiality measures, or that is usually classified as strictly confidential or secret according to their classification system (such as detailed in the VDA white paper on classification level harmonization), should choose this particular TISAX label. This label is advised especially when the risk of unauthorized disclosure could lead to dire or catastrophic consequences, including severe damage to reputation, significant legal repercussions, or extensive financial losses.
Criteria Catalogue: Information Security (Must, Should, High [Marked with "C"] , Very High [Marked with "C"] )
Handling of information with high protection needs in the context of availability (high availability of information)
For companies whose products or services are critical to their customers' production or delivery capabilities, and where any disruption could lead to significant harm to those customers in a short timeframe, this specific guidance applies. An example of such companies includes just-in-time suppliers of production materials, where timely delivery is essential to prevent production halts and substantial losses.
Criteria Catalogue: Information Security (Must, Should, High [Marked with "A"] )
Handling of information with very high protection needs in the context of availability (very high availability of information)
For all companies whose customers' ability to produce and deliver depends on the short-term availability of the companies' products and services, and where a failure would cause significantly high damage to customers within a very short period of time. Example: Just-in-time suppliers where a failure can result in a comprehensive production standstill with a very long restart time within a short period of time.
Criteria Catalogue: Information Security (Must, Should, High [Marked with "A"] , Very High [Marked with "A"] )
Prototype Protection
Protection of Prototype Parts and Components
This directive is aimed at companies involved in manufacturing, storing, or utilizing components or parts supplied by customers that are deemed to need protection, at their own premises. The evaluation includes aspects of physical security and security concerning the surrounding environment. It also encompasses organizational requirements and particular stipulations for managing prototypes.
Criteria Catalogue: Prototype Protection - Chapters 8.1, 8.2, 8.3 (Must, Should)
Protection of Prototype Vehicles
This guideline is tailored for companies engaged in manufacturing, storing, or utilizing customer-provided vehicles that are classified as needing protection at their premises. The assessment includes requirements for physical security and considerations of the surrounding area, such as the availability of secure garages and workshop spaces. Additionally, organizational requirements and specific protocols for managing prototypes are evaluated. Upon passing this assessment, companies are awarded the TISAX label "Protection of prototype parts and components."
Criteria Catalogue: Prototype Protection - Chapters 8.1, 8.2, 8.3 (Must, Should, Additional Requirements for Vehicles)
Handling of Test Vehicles
This guideline applies to companies engaged in conducting tests and test drives, including those on public roads or test tracks, with vehicles provided by customers that are identified as needing protection. The assessment encompasses organizational requirements and specific protocols for managing prototypes, including camouflage techniques and the handling of vehicles during public test drives and on test tracks. While requirements for physical security and considerations of the surrounding area may not be central to this assessment, companies with appropriately equipped facilities are encouraged to also choose the assessment objective titled “Protection of prototype vehicles.”
Criteria Catalogue: Prototype Protection - Chapters 8.2, 8.3, 8.4 (Must, Should)
Protection of Prototypes during Events and Film or Photo Shoots
This guideline is for companies involved in showcasing or hosting events (such as market research, marketing events) and conducting film and photo shoots with vehicles, components, or parts provided by customers and classified as needing protection. The assessment covers organizational requirements and specific protocols for managing prototypes, including stipulations for conducting presentations, events, and filming or photography sessions both in secure environments and in public spaces. While the focus may not necessarily include requirements for physical security and the security of the surrounding area, companies with facilities that are suitably equipped should consider choosing the "Protection of prototype vehicles" as an additional assessment objective.
Criteria Catalogue: Prototype Protection - Chapters 8.2, 8.3, 8.5 (Must, Should)
Data Protection
Data protection according to Article 28 (“Processor”) of (GDPR)
If you handle personal data as a processor according to Article 28 of the GDPR, you probably have to select “Data”.
Criteria Catalogue: Information Security (Must, Should, High [Marked with "C"] )
Criteria Catalogue: Data Protection (Must)
Data protection according to Article 28 (“Processor”) of (GDPR) with special categories of personal data as specified in Article 9 of the GDPR
If you handle special categories of personal data (like health or religion) as a processor according to Article 28
of the GDPR, then you probably have to select “Special Data”.
Criteria Catalogue: Information Security (Must, Should, High [Marked with "C"], Very High [Marked with "C"] )
Criteria Catalogue: Data Protection (Must)
Assessment Levels
TISAX categorizes information protection into three levels: normal, high, and very high, based on your partner’s classification. Correspondingly, there are three assessment levels (AL), with higher levels demanding more rigorous audit methods, thus ensuring increased precision and security in handling sensitive information.
Assessment Level 1
Asessment Level 1
Interviews: No
On-Site Inspection: No
NO TISAX LABEL
Assessment Level 2
Assessment Level 2
Interviews: Via Web Conference
On-Site Inspection: At your request
Assessment Level 2.5
Assessment Level 2.5
Assessment Level 3
Assessment Level 3
Interviews: In person, on site
On-Site Inspection: Yes
Assessment
Important concepts for assessment
Assessment Process
The TISAX assessment involves a cyclical process where companies prepare their information security management systems (ISMS), undergo audits to identify gaps, address these gaps within specified timelines, and undergo further checks until all issues are resolved. Companies control the initiation of each phase and can exit the process at any point.
Assessment Macro Structure
You and the audit provider are planning the details of the assessment process
The audit provider checks your self-assessment
The audit provider conducts the assessment(s)
Assessment Types
The TISAX assessment begins with an opening meeting, typically held via conference call, to verify prerequisites, introduce the project leader and team, and plan the assessment. The process varies based on assessment objectives and includes conference calls, interviews, and inspections. Findings are presented by the audit provider following the initial assessment.
The corrective action plan assessment ensures compliance with TISAX requirements. Submit your plan to the audit provider for review; if compliant, an updated TISAX assessment report is issued. This process, often brief, may involve a call, web conference, or email. Your plan should detail the finding addressed, root cause, corrective actions, implementation dates, compensating measures for critical risks, and justify the timeframes for implementation, with a maximum period of nine months. Upon completion, request the assessment.
The follow-up assessment verifies the resolution of all previously noted non-conformities. It’s initiated once all issues are believed to be addressed, with the option for multiple follow-ups if needed. Should new or existing non-conformities be found, the corrective action plan is updated for re-assessment. This process can occur through physical meetings or virtual calls.
About Conformity
The core aim of a TISAX assessment is to evaluate if your information security management system meets a specific set of criteria, with the audit provider determining its compliance with these requirements.
Step 1: Individual Requirement Checks
In the first step, each requirement is checked individually for conformity. Full compliance results in passing the assessment and earning corresponding TISAX labels. Any deviation is noted as a finding, with TISAX categorizing findings into four distinct types.
Major Nonconformity
Addressing Major Nonconformities
Minor Nonconformity
Addressing Minor Nonconformities
Observations
Managing Observations
Room for Improvement
Approaching Improvement Opportunities
Maturity Levels
The ISA evaluates your ISMS using “maturity levels” to reflect its sophistication. A “target maturity level” of 3 is set for each evaluation question.
Your overall score:
Reflects the cumulative maturity level of your ISMS.
Is calculated as the average of all individual question-level maturity scores.
Can equal but not exceed the highest possible score, aiming to closely match this maximum for a better chance at receiving TISAX labels.
Deviation Allowance:
More than 10% short, the assessment result is a “minor non-conform”.
More than 30% short, the result escalates to a “major non-conform”.
A process is not available, not followed or not suitable for achieving the objective
A process is not implemented or fails to achieve its process purpose. Little or no evidence exists of any systematic achievement of the process purpose.
An undocumented or incompletely documented process is followed and indicators exist that it achieves its objective.
Possible Evidence:
- Work products providing evidence of process outcomes.
A process achieving its objectives is followed. Process documentation and process implementation evidence are available.
Possible Evidence:
- Process documentation
- Process plan
- Quality plan/records
- Process implementation records
A standard process integrated into the overall system is followed. Dependencies on other processes are documented and suitable interfaces are created. Evidence exists that the process has been used sustainably and actively over an extended period.
Possible Evidence:
- Process documentation
- Process plan
- Quality records
- Policies and Procedures
- Process implementation records
An established process is followed. The effectiveness of the process is continually monitored by collecting key figures. Limit values are defined at which the process is considered to be insufficiently effective and requires adjustment. (Key Performance Indicators)
Possible Evidence:
- Process documentation
- Process control plan
- Process Improvement Plan
- Process Measurement Plan
- Process implementation records
A predictable process with continual improvement as a major objective is followed. Improvement is actively advanced by means of dedicated resources.
Possible Evidence:
- Process Improvement Plan
- Process Measurement Plan
- Process implementation records
Step 2: Merging Results
In the second step, individual findings are consolidated into an overall assessment outcome. A “minor non-conform” allows for temporary TISAX labels, while a “major non-conform” requires resolution before any labels are granted. Implementing approved corrective actions can shift a “major non-conform” to “minor,” enabling temporary label issuance.
Major Nonconformity
Resolving Major Non-Conforms
Minor Nonconformity
This outcome still allows for the receipt of temporary TISAX labels.
Addressing Minor Nonconformities
Conform
Label Validity
Exchange
Important concepts for exchange
Exchange Platform
he ENX portal serves as the platform for exchanging information. Initially, your audit provider will upload sections A and B of your TISAX assessment report to the portal, which will be accessible solely to you. Through the account established during registration, you can log into the portal to utilize its exchange features.
The portal can be accessed at: enx.com/en-US/SignIn.
Sharing Levels
On the exchange platform, you have the option to make your assessment results available to all TISAX participants by publishing them. This enables access to your results at the level of sharing you permit. Publication is permitted only if your overall assessment outcome is “conform.”
Publishing:
The sharing levels for publishing your assessment result on the exchange platform are limited to these options:
▪ Do not publish (Default)
▪ A. Assessment Related Information
▪ A + Labels
▪ A + Labels + B. Summarized Results
Sharing with a particular participant:
In contrast to the publication, you can share your assessment result even if the overall assessment result is (major/minor) non-conform.
The options for sharing your assessment result on the exchange platform are:
A: Assessment Related Information
A + Labels
A + Labels + B: Assessment Summary
A + Labels + B + C: Summarized Results
A + Labels + B + C + D: Detailed Assessment Results
A + Labels + B + C + D + E: Maturity Levels according to ISA
Our TISAX Services
TISAX GAP Analysis
TISAX PreAssessment
TISAX Consulting
Our TISAX References
Our team boasts extensive experience as contract auditors for TISAX assessment providers and has successfully guided numerous Tier 1 and Tier 2 suppliers through their TISAX assessment preparation journey.



































