{"id":1259,"date":"2023-06-08T08:59:39","date_gmt":"2023-06-08T08:59:39","guid":{"rendered":"https:\/\/inprotech.es\/?p=1259"},"modified":"2025-02-17T10:32:35","modified_gmt":"2025-02-17T10:32:35","slug":"tisax","status":"publish","type":"post","link":"https:\/\/inprotech.es\/en\/tisax\/","title":{"rendered":"TISAX: Information Security in the Automotive Industry"},"content":{"rendered":"<p><b><i>Abstract&#8211; TISAX is an information security standard developed by the Association of the German Automotive Industry (VDA) for the evaluation and secure exchange of information between companies in the automotive industry.\u00a0<\/i><\/b><\/p>\n<p><b><i>The objective of this technical article is to deepen in the objective, scope and benefits that TISAX brings to the industry, to synthesize the main points to consider of the TISAX handbook (reference and structured framework for the assessment and audit of information security in this field), as well as to establish a comparison between the information security management system proposed by TISAX versus ISO 27001.<\/i><\/b><\/p>\n\n<h2><span style=\"font-weight: 400;\">Introduction<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The VDA (Verband der Automobilindustrie) [1] is the <strong>Association of the German Automotive Industry<\/strong>. It is an organization that represents the interests of the sector in the country, and is dedicated to promoting the development and competitiveness of its automotive industry, as well as fostering cooperation between automakers, suppliers and other related players. The association also facilitates collaboration and knowledge sharing among its members through working groups, committees and events.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <strong>TISAX<\/strong> (Trusted Information Security Assessment Exchange) standard [2] was launched by the VDA in May 2017. It was created as a framework for assessing and ensuring information security in the automotive industry.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For the implementation of TISAX, the VDA relied on ENX (European Network Exchange) [3]. This was founded in 2000 as a non-profit organization by several European car manufacturers, including BMW, DaimlerChrysler, Renault and Volkswagen. Its main objective was to establish a <strong>secure communication platform for the exchange of confidential information in the automotive supply chain.\u00a0<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thus, TISAX is an information security standard developed by VDA for the automotive industry. VDA-ISA (&#8220;VDA Information Security Assessment&#8221;) is their assessment framework used, and ENX is an organization that facilitates the secure exchange of information associated with assessments (among other things) in the automotive supply chain.<\/span><\/p>\n<h2>Benefits<\/h2>\n<p><span style=\"font-weight: 400;\">TISAX (Trusted Information Security Assessment Exchange) assessments offer several advantages and benefits for both the organizations that perform them and the automotive industry in general. Some of these advantages are:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"><strong>Requirements compliance<\/strong>: TISAX assessments help organizations comply with the information security requirements established by the automotive industry. By obtaining TISAX certification, companies demonstrate their commitment to protecting confidential information and meet the security standards required by automakers and other business partners.<\/span><\/li>\n<li><strong>Trust and credibility<\/strong>: TISAX is recognized and endorsed by the Association of the German Automotive Industry (VDA), which provides greater trust and credibility to certified organizations. TISAX certification indicates that an organization has been independently assessed and has met the required information security standards.<\/li>\n<li><strong>Improved information security<\/strong>: TISAX assessments help organizations identify and address information security vulnerabilities and risks. This enables them to implement more robust security measures and controls, which in turn improves the protection of sensitive information and reduces the risk of security breaches.<\/li>\n<li><strong>Collaboration and supply chain access<\/strong>: TISAX certification enables organizations to access and collaborate with automakers and other business partners in the automotive industry. Many automakers now require their suppliers to demonstrate TISAX compliance to ensure the secure exchange of confidential information and guarantee data protection.<\/li>\n<li><strong>Internationally recognized standard<\/strong>: TISAX is based on ISO\/IEC 27001 [4], which makes it widely recognized and accepted in the global information security community. This facilitates interoperability and cooperation between organizations in different countries and strengthens security throughout the automotive supply chain.<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Summing up, TISAX increases security, standardization and trust between partners. In addition, it reduces costs by avoiding duplicate assessments by different actors, as the result of assessment audits can be made public on the ENX portal.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">TISAX Handbook<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The Handbook is the <strong>guide of reference for managing TISAX assessments<\/strong>. It describes the steps an entity must follow to pass the TISAX assessment and to share the assessment result with its partners.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The current version of the document is 2.3 as of January 2021, and is available in English, French, German and Chinese, as well as Spanish, in PDF and downloadable HTML.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If a partner requests us to demonstrate a predefined level of information security in accordance with the requirements of the VDA Information Security Assessment (ISA), the 3-step TISAX process must be followed to respond to such a request:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Registration<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This involves <strong>registering as a participant in the ENX portal<\/strong>, either as an active participant (assessed) or passive participant (receives the result of the assessment). An organization can play both roles simultaneously.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Subsequently, the contractual documentation of the ENX portal and with the authorized audit provider is signed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another fundamental step at this stage will be to <strong>determine the scope<\/strong>, a concept defined in a similar way to ISO 27001. In this case, a standard (recommended) or customized (extended or reduced) scope is established. In addition, it is necessary to indicate which locations are subject to assessment. There are advantages and disadvantages of a multi-site assessment: on the one hand, resources and costs are saved, and a single due date is obtained by aggregating locations; but in the event of a partial negative result, it will affect the entire exercise, and it will have to be repeated in its entirety.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <strong>assessment objective<\/strong> is also defined at this point, which determines the applicable requirements to be met by the information security management system (ISMS). This is the so-called &#8220;TISAX label&#8221;, once the audit is passed.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One, or more than one, can be selected:<\/span><\/p>\n<figure id=\"attachment_1260\" aria-describedby=\"caption-attachment-1260\" style=\"width: 736px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1260\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-1-1.png\" alt=\"\" width=\"736\" height=\"398\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-1-1.png 736w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-1-1-300x162.png 300w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><figcaption id=\"caption-attachment-1260\" class=\"wp-caption-text\">Fig. 1. Assessment objectives TISAX<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The evaluation objectives have dependencies among themselves. In addition, if several types of information are handled,<strong> different levels of protection may be required<\/strong> in each case (normal, high or very high):<\/span><\/p>\n<figure id=\"attachment_1262\" aria-describedby=\"caption-attachment-1262\" style=\"width: 737px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1262\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-2-1.png\" alt=\"\" width=\"737\" height=\"427\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-2-1.png 737w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-2-1-300x174.png 300w\" sizes=\"auto, (max-width: 737px) 100vw, 737px\" \/><figcaption id=\"caption-attachment-1262\" class=\"wp-caption-text\">Fig. 2. Mapping of ISA criteria catalogs and protection needs to TISAX assessment targets<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">On the other hand, the higher the level of protection required, the more demanding the level of evaluation:<\/span><\/p>\n<figure id=\"attachment_1264\" aria-describedby=\"caption-attachment-1264\" style=\"width: 737px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1264\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-3-1.png\" alt=\"\" width=\"737\" height=\"393\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-3-1.png 737w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-3-1-300x160.png 300w\" sizes=\"auto, (max-width: 737px) 100vw, 737px\" \/><figcaption id=\"caption-attachment-1264\" class=\"wp-caption-text\">Fig. 3. Assessment objectives vs Assessment level (AL)<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The <strong>AL1<\/strong> level corresponds to a self-assessment, in which the auditor only reviews a template filled in by the active participant. They are not used in TISAX, since they do not award a label.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Level <strong>AL2<\/strong> requires exhaustive verification of the plausibility of the self-assessment: by collecting evidence, through interviews, etc., but without the need to go to the locations in person.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In <strong>AL3<\/strong>, the same is verified as in AL2 but more thoroughly, by conducting an on-site inspection and face-to-face interviews.<\/span><\/p>\n<figure id=\"attachment_1266\" aria-describedby=\"caption-attachment-1266\" style=\"width: 735px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1266\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-4-1.png\" alt=\"\" width=\"735\" height=\"194\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-4-1.png 735w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-4-1-300x79.png 300w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><figcaption id=\"caption-attachment-1266\" class=\"wp-caption-text\">Fig. 4. Applicability of evaluation methods to different levels of assessment<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In addition and to close this stage, the TISAX handbook refers to the payment of the mandatory fees, and the process of registration and use of the ENX portal throughout the process.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Evaluation<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This is the core stage of the process. The handbook explains how to use the <strong>ISA self-assessment<\/strong> Excel template to check readiness for the formal audit (i.e. internal audit), how to choose an authorized audit provider for the external assessment leading to the TISAX label(s), and the outcome of the process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The &#8220;Information Security Assessment&#8221; (ISA) is a <strong>catalog of criteria<\/strong> published by the German Association of the Automotive Industry (Verband der Automobilindustrie e.V., VDA). It is the automotive industry standard for information security assessments. Its current version is 5.0.3.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First of all, it must be understood that there are three criteria catalogs:<\/span><\/p>\n<figure id=\"attachment_1268\" aria-describedby=\"caption-attachment-1268\" style=\"width: 245px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1268\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-5-1.png\" alt=\"\" width=\"245\" height=\"152\" \/><figcaption id=\"caption-attachment-1268\" class=\"wp-caption-text\">Fig. 5. ISA Criteria catalogs<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The evaluation objectives, in turn, are related to the criteria catalogs:<\/span><\/p>\n<figure id=\"attachment_1270\" aria-describedby=\"caption-attachment-1270\" style=\"width: 736px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1270\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-6-1.png\" alt=\"\" width=\"736\" height=\"409\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-6-1.png 736w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-6-1-300x167.png 300w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><figcaption id=\"caption-attachment-1270\" class=\"wp-caption-text\">Fig. 6. Correspondence between the TISAX evaluation objectives and the ISA criteria catalogs<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">And in the same way, there is another table that relates the applicable requirements of the Excel VDA-ISA to each assessment objective:<\/span><\/p>\n<figure id=\"attachment_1272\" aria-describedby=\"caption-attachment-1272\" style=\"width: 741px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1272\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-7-1.png\" alt=\"\" width=\"741\" height=\"505\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-7-1.png 741w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-7-1-300x204.png 300w\" sizes=\"auto, (max-width: 741px) 100vw, 741px\" \/><figcaption id=\"caption-attachment-1272\" class=\"wp-caption-text\">Fig. 7. Applicability of the requirements to the assessment objectives (excerpt from table 9, TISAX Handbook)<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In the Excel template, each criteria catalog groups the questions into chapters based on the different aspects of the information security management systems. The questions for each catalog of criteria or controls are found in the document itself, leaving blank fields for the auditor to carry out the assessment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The r<strong>equirements in the template are divided into mandatory, optional, necessary<\/strong> to achieve a high level of protection, or for a very high level of protection. Those necessary for the established assessment objective must be satisfied (see figure 2).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The ISMS aspects are evaluated in terms of maturity on a scale of 6 levels:\u00a0<\/span><\/p>\n<figure id=\"attachment_1278\" aria-describedby=\"caption-attachment-1278\" style=\"width: 736px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1278\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-8-2.png\" alt=\"\" width=\"736\" height=\"400\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-8-2.png 736w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-8-2-300x163.png 300w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><figcaption id=\"caption-attachment-1278\" class=\"wp-caption-text\">Fig. 8. Informal description of the maturity levels<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In the self-assessment template, all the levels associated with the applicable requirements must be filled in. The overall maturity level is the average of all target maturity levels (at the question level), altered by the fact that requirements that do not apply do not compute, and that the actual maturity levels are reduced to the target if exceeded.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the<strong> final score<\/strong> calculated by this algorithm is less than 3.0, the ISMS will most certainly need to be improved. If a score of less than 10% or 30% deviation from the maximum is obtained, the assessment will be non-compliant with minimal\/significant deviation, respectively.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once the internal audit has been approved, an authorized supplier must be selected for the formal assessment. The cyclical process in 4 steps is as follows:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>ISMS preparation<\/strong> (internal)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>External assessment<\/strong> (external audit)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Resolution of non-conformities<\/strong> (internal)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Verification of remediation<\/strong> (external audit).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Thus, from the point of view of the external auditor, there are three types of audit: initial assessment, assessment of the corrective action plan, and follow-up assessment (the last two may not exist).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The evaluation period for obtaining TISAX labels will last a maximum of 9 months.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An assessment may be compliant or non-compliant. For the purposes of the evaluation result, anything below full or ideal conformity will be referred to as a &#8220;finding&#8221;. TISAX distinguishes between four types of findings:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Observation<\/strong><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Room for improvement<\/strong><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Minor non-conformity<\/strong>: applies when the non-conformity does not affect the overall effectiveness of your information security management system and does not create a significant information security risk.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Major nonconformity<\/strong>: applies when the nonconformity raises concerns about the overall effectiveness of your information security management system or creates a significant information security risk.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Only the two nonconformities are findings relevant to the outcome of the assessment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the overall result of the assessment is &#8220;non-compliant with minimal deviation&#8221; and there is a corrective action plan assessment report, temporary TISAX tags will be received, and a subsequent follow-up assessment should be performed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally at this stage, it should be noted that <strong>each TISAX assessment has a unique ID in ENX<\/strong>, and the associated report is updated and issued after each assessment (whether initial, corrective action plan, or follow-up).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, the TISAX labels awarded are the product of the TISAX assessment process, summarize the outcome of the assessment and are confirmation that your information security management system meets a given set of requirements. In general, they are valid for 3 years.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Exchange<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This section of the TISAX handbook describes how to share the assessment result with a partner and submit the requested evidence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is done through the ENX portal, provided the indicated prerequisites are met (documents transferred, and fees paid).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>The publication or disclosure permissions are irrevocable, and are valid for the period of validity of the TISAX evaluation<\/strong>. There are five levels of disclosure (the higher the level, the more detail provided to the passive participant):<\/span><\/p>\n<figure id=\"attachment_1276\" aria-describedby=\"caption-attachment-1276\" style=\"width: 737px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1276\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-9-1.png\" alt=\"\" width=\"737\" height=\"213\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-9-1.png 737w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-9-1-300x87.png 300w\" sizes=\"auto, (max-width: 737px) 100vw, 737px\" \/><figcaption id=\"caption-attachment-1276\" class=\"wp-caption-text\">Fig. 9.\u00a0 Main sections of the TISAX report and levels of disclosure on the exchange platform<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">It can also be shared with specific stakeholders with a more comprehensive (detailed) level of information.<\/span><\/p>\n<h2>TISAX vs ISO 27001<\/h2>\n<p><span style=\"font-weight: 400;\">The main <strong>differences<\/strong> between ISO 27001 and TISAX (Trusted Information Security Assessment Exchange) are in their <strong>scope and specific approach to the automotive industry.<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"><strong>Scope<\/strong>: ISO 27001 is an international information security standard that applies to organizations in any sector or industry. It provides a general framework for establishing, implementing, maintaining and improving an information security management system (ISMS), and its scope is dynamic. In contrast, TISAX is an automotive industry-specific standard, developed by the Association of the German Automotive Industry (VDA), which is used to assess and ensure information security in the automotive supply chain. Its scope is fixed.<\/span><\/li>\n<li><strong>Specific requirements:<\/strong>\u00a0While ISO 27001 establishes general and broad requirements for an ISMS, TISAX focuses on the information security aspects relevant to the automotive industry. TISAX includes additional specific requirements and recommendations that are relevant to organizations that collaborate with automotive manufacturers and other automotive companies, such as those related to the protection of prototypes.<\/li>\n<li><strong>Recognition:<\/strong>\u00a0Although ISO 27001 is a widely recognized and internationally accepted standard in various sectors, TISAX has been developed and endorsed by the Association of the German Automotive Industry (VDA). TISAX is specifically recognized by the automotive industry and is required by many automotive manufacturers as part of their information security requirements for their suppliers, becoming a block to doing business with many of them.<\/li>\n<li><strong>Assessment process:<\/strong>\u00a0Both follow a similar audit-based assessment process. However, TISAX uses the VDA-ISA (VDA Information Security Assessment) assessment framework as its specific approach, with assessment objectives and levels and a related requirements catalog. ISO 27001 faces the problem completely differently: the customer defines the scope, and must consistently select which security controls will or will not apply in their particular environment in a statement of applicability (SOA).<\/li>\n<\/ul>\n<p>In TISAX, the approach is compliance based on maturity levels and the risk analysis is derived from the VDA-ISA working group, while in ISO it is ON\/OFF and the risk analysis is based on the particularities of the company.<\/p>\n<p><span style=\"font-weight: 400;\">Finally, in ISO it is the certification body itself that issues the certificate, which is valid for 3 years and requires annual periodic audits; TISAX, on the other hand, issues the labels and exchange registers, which are valid for 3 years, without the need for intermediate periodic actions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">De todo lo anterior se deriva que las evaluaciones TISAX y las certificaciones en base a ISO 27001 presentan ciertas similitudes pero no son equivalentes. A una organizaci\u00f3n certificada\/evaluada bajo uno de los est\u00e1ndares se le allanar\u00e1 el camino para alcanzar los requerimientos del otro, pero en modo alguno es un proceso autom\u00e1tico o trivial, por lo que se recomienda acudir a proveedores de servicios de consultor\u00eda especializados como Inprosec\/InprOTech.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\"> Conclusions<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">An introduction is provided to TISAX (Trusted Information Security Assessment Exchange), an information security standard developed by the Association of the German Automotive Industry (VDA). The benefits of TISAX assessments are highlighted, including compliance, trust and credibility, improved information security, supply chain collaboration and access to business opportunities in the automotive industry.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The paper summarizes the main features of the TISAX Handbook, which provides guidelines and requirements for information security assessments in the automotive industry, based on the ISO\/IEC 27001 standard but with a specific focus on aspects relevant to the automotive sector.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key differences between TISAX and ISO 27001 are also highlighted, such as the automotive-specific scope of TISAX, additional requirements relevant to the automotive sector, the automotive industry&#8217;s endorsement of TISAX and the use of the VDA-ISA assessment framework in TISAX.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Overall, the document helps to understand the importance and impact of TISAX on information security in the automotive industry.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><i><span style=\"font-weight: 400;\">REFERENCES<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">[1] VDA. <\/span><a href=\"https:\/\/www.vda.de\/en\"><span style=\"font-weight: 400;\">https:\/\/www.vda.de\/en<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">[2] TISAX handbook. <\/span><a href=\"https:\/\/www.enx.com\/handbook\/tisax-participant-handbook.html\"><span style=\"font-weight: 400;\">https:\/\/www.enx.com\/handbook\/tisax-participant-handbook.html<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">[3] ENX portal. <\/span><a href=\"https:\/\/portal.enx.com\/en-US\/\"><span style=\"font-weight: 400;\">https:\/\/portal.enx.com\/en-US\/#<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">[4] ISO 27001:2022. <\/span><a href=\"https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:27001:ed-3:v1:en\"><span style=\"font-weight: 400;\">https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:27001:ed-3:v1:en<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstract&#8211; TISAX is an information security standard developed by the Association of the German Automotive Industry (VDA) for the evaluation and secure exchange of information between companies in the automotive industry.\u00a0 The objective of this technical article is to deepen in the objective, scope and benefits that TISAX brings to the industry, to synthesize the&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1256,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[50,17],"tags":[],"class_list":["post-1259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-strategic-consulting","category-techpapers-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TISAX: Information Security in the Automotive Industry - InprOTech<\/title>\n<meta name=\"description\" content=\"TISAX is an information security standard developed by the Association of the German Automotive Industry (VDA). In this white paper we will delve into the purpose, scope and benefits that TISAX brings to the industry, summarize the main points to take into account from the TISAX handbook, as well as compare TISAX and ISO 27001.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inprotech.es\/en\/tisax\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TISAX: Information Security in the Automotive Industry - InprOTech\" \/>\n<meta property=\"og:description\" content=\"TISAX is an information security standard developed by the Association of the German Automotive Industry (VDA). In this white paper we will delve into the purpose, scope and benefits that TISAX brings to the industry, summarize the main points to take into account from the TISAX handbook, as well as compare TISAX and ISO 27001.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inprotech.es\/en\/tisax\/\" \/>\n<meta property=\"og:site_name\" content=\"InprOTech\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-08T08:59:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-17T10:32:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-seguridad-de-la-informacion-sector-automovil.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"headline\":\"TISAX: Information Security in the Automotive Industry\",\"datePublished\":\"2023-06-08T08:59:39+00:00\",\"dateModified\":\"2025-02-17T10:32:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/\"},\"wordCount\":2572,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/tisax-seguridad-de-la-informacion-sector-automovil.jpg\",\"articleSection\":[\"Strategic Consulting\",\"Techpapers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/\",\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/\",\"name\":\"TISAX: Information Security in the Automotive Industry - InprOTech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/tisax-seguridad-de-la-informacion-sector-automovil.jpg\",\"datePublished\":\"2023-06-08T08:59:39+00:00\",\"dateModified\":\"2025-02-17T10:32:35+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"description\":\"TISAX is an information security standard developed by the Association of the German Automotive Industry (VDA). In this white paper we will delve into the purpose, scope and benefits that TISAX brings to the industry, summarize the main points to take into account from the TISAX handbook, as well as compare TISAX and ISO 27001.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/#primaryimage\",\"url\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/tisax-seguridad-de-la-informacion-sector-automovil.jpg\",\"contentUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/tisax-seguridad-de-la-informacion-sector-automovil.jpg\",\"width\":1536,\"height\":768},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/tisax\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/inprotech.es\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TISAX: Information Security in the Automotive Industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\",\"url\":\"https:\\\/\\\/inprotech.es\\\/\",\"name\":\"InprOTech\",\"description\":\"The Cybersecurity Solution for the Industrial Environment\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/inprotech.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/inprotech.es\"],\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/author\\\/moon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TISAX: Information Security in the Automotive Industry - InprOTech","description":"TISAX is an information security standard developed by the Association of the German Automotive Industry (VDA). In this white paper we will delve into the purpose, scope and benefits that TISAX brings to the industry, summarize the main points to take into account from the TISAX handbook, as well as compare TISAX and ISO 27001.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inprotech.es\/en\/tisax\/","og_locale":"en_US","og_type":"article","og_title":"TISAX: Information Security in the Automotive Industry - InprOTech","og_description":"TISAX is an information security standard developed by the Association of the German Automotive Industry (VDA). In this white paper we will delve into the purpose, scope and benefits that TISAX brings to the industry, summarize the main points to take into account from the TISAX handbook, as well as compare TISAX and ISO 27001.","og_url":"https:\/\/inprotech.es\/en\/tisax\/","og_site_name":"InprOTech","article_published_time":"2023-06-08T08:59:39+00:00","article_modified_time":"2025-02-17T10:32:35+00:00","og_image":[{"width":1536,"height":768,"url":"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-seguridad-de-la-informacion-sector-automovil.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/inprotech.es\/en\/tisax\/#article","isPartOf":{"@id":"https:\/\/inprotech.es\/en\/tisax\/"},"author":{"name":"admin","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"headline":"TISAX: Information Security in the Automotive Industry","datePublished":"2023-06-08T08:59:39+00:00","dateModified":"2025-02-17T10:32:35+00:00","mainEntityOfPage":{"@id":"https:\/\/inprotech.es\/en\/tisax\/"},"wordCount":2572,"commentCount":0,"image":{"@id":"https:\/\/inprotech.es\/en\/tisax\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-seguridad-de-la-informacion-sector-automovil.jpg","articleSection":["Strategic Consulting","Techpapers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/inprotech.es\/en\/tisax\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/inprotech.es\/en\/tisax\/","url":"https:\/\/inprotech.es\/en\/tisax\/","name":"TISAX: Information Security in the Automotive Industry - InprOTech","isPartOf":{"@id":"https:\/\/inprotech.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/inprotech.es\/en\/tisax\/#primaryimage"},"image":{"@id":"https:\/\/inprotech.es\/en\/tisax\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-seguridad-de-la-informacion-sector-automovil.jpg","datePublished":"2023-06-08T08:59:39+00:00","dateModified":"2025-02-17T10:32:35+00:00","author":{"@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"description":"TISAX is an information security standard developed by the Association of the German Automotive Industry (VDA). In this white paper we will delve into the purpose, scope and benefits that TISAX brings to the industry, summarize the main points to take into account from the TISAX handbook, as well as compare TISAX and ISO 27001.","breadcrumb":{"@id":"https:\/\/inprotech.es\/en\/tisax\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inprotech.es\/en\/tisax\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inprotech.es\/en\/tisax\/#primaryimage","url":"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-seguridad-de-la-informacion-sector-automovil.jpg","contentUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/06\/tisax-seguridad-de-la-informacion-sector-automovil.jpg","width":1536,"height":768},{"@type":"BreadcrumbList","@id":"https:\/\/inprotech.es\/en\/tisax\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/inprotech.es\/en\/"},{"@type":"ListItem","position":2,"name":"TISAX: Information Security in the Automotive Industry"}]},{"@type":"WebSite","@id":"https:\/\/inprotech.es\/#website","url":"https:\/\/inprotech.es\/","name":"InprOTech","description":"The Cybersecurity Solution for the Industrial Environment","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inprotech.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/inprotech.es"],"url":"https:\/\/inprotech.es\/en\/author\/moon\/"}]}},"_links":{"self":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/1259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/comments?post=1259"}],"version-history":[{"count":5,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/1259\/revisions"}],"predecessor-version":[{"id":1358,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/1259\/revisions\/1358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media\/1256"}],"wp:attachment":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media?parent=1259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/categories?post=1259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/tags?post=1259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}