Get through the TISAX assessment process and share the assessment result with your partner
Published by
ENX Association
an Association according to the French Law of 1901,
registered under No. w923004198 at the Sous-préfecture of Boulogne-Billancourt, France
Addresses
20 rue Barthélémy Danjou, 92100 Boulogne-Billancourt, France
Bockenheimer Landstraße 97-99, 60325 Frankfurt am Main, Germany
Author
Florian Gleich
Contact
Version
Date: |
2024-04-08 |
Version: |
2.7.2 |
Classification: |
Public |
ENX doc ID: |
602 |
Copyright notice
All rights reserved by ENX Association.
ENX, TISAX, and their respective logos are registered trademarks of ENX Association.
Third party trademarks mentioned are the property of their respective owners.
1. Overview
1.1. Purpose
Welcome to TISAX, the Trusted Information Security Assessment Exchange.
One of your partners requested that you prove that your information security management complies with a defined level according to the requirements of the “Information Security Assessment” (ISA). And now you want to know how to fulfil this request.
The purpose of this handbook is to enable you to fulfil your partner’s request — or to have an edge by anticipating it before a partner asks for it.
This handbook describes the steps you need to take in order to pass the TISAX assessment and for sharing your assessment result with your partner.
Establishing and maintaining an information security management system (ISMS) is already a complex task. Proving to your partner that your information security management is up to the job adds even more complexity. This handbook won’t help you manage your information security. However, it aims to make the work of proving your efforts to your partner as easy for you as possible.
1.2. Scope
This handbook applies to all TISAX processes that you may be part of.
It contains all you need to know to go through the TISAX process.
The handbook offers some advice on how to deal with the information security requirements at the core of the assessment. But it does not aim to generally educate you on what you need to do to pass the information security assessment.
1.3. Audience
The main audience of this handbook are companies that need or want to prove a defined level of information security management according to the requirements of the “Information Security Assessment” (ISA).
As soon as you are actively involved in TISAX processes, you will benefit from the information provided in this handbook.
Companies that are requesting their suppliers to prove defined levels of information security management will benefit, too. This handbook allows them to understand what their suppliers are required to do to fulfil their request.
1.4. Structure
We begin with a brief introduction of TISAX, then we immediately move on with instructions on HOW to do things. You will find all you need to go through the process — in the order you need to know it.
The estimated reading time for the document is 75-90 minutes.
1.5. How to use this document
Sooner or later, you will probably want to understand most of what is described in this document. To be properly prepared, we recommend reading the entire handbook.
We structured the handbook along the three main steps of the TISAX process, so you can go to the section you need and read the rest later.
The handbook uses illustrations to help you improve your understanding. The colours in the illustrations often have additional meaning. We therefore recommend reading the document on a computer screen or as a colour hard copy.
We appreciate your feedback. If you think something is missing in this handbook or is not easy to understand, please don’t hesitate to let us know. We and all future readers of this handbook will be thankful for your feedback.
If you have already used a prior version of the TISAX participant handbook, you may find some helpful notes at the end of the document in Section 8, “Document history”.
1.6. Contact us
We’re here to guide you through the TISAX process and to answer any questions you may have.
Send us an email at: |
|
Or call us at: |
You can reach us during regular business hours in Germany (UTC+01:00).
We all speak English and German. One colleague is native speaker of Italian.
Please take notice of Section 7.13, “Annex: Complaint management”.
1.7. The TISAX participant handbook in other languages and formats
The TISAX participant handbook is available in the following languages and formats:
Language | Version | Format | Link |
---|---|---|---|
English |
2.7.2 |
Online |
https://www.enx.com/handbook/tisax-participant-handbook.html |
Offline |
https://www.enx.com/handbook/tisax-participant-handbook-offline.html |
||
https://www.enx.com/handbook/TISAX%20Participant%20Handbook.pdf |
|||
German |
2.7.2 |
Online |
|
Offline |
https://www.enx.com/handbook/tisax-teilnehmerhandbuch-offline.html |
||
French |
2.7 |
Online |
|
Offline |
|||
Chinese |
2.7 |
Online |
|
Offline |
|||
Spanish |
2.7 |
Online |
|
Offline |
|||
Japanese |
2.7 |
Online |
|
Offline |
|||
Brazilian Portuguese |
2.7 |
Online |
|
Offline |
|||
Italian |
2.7.1 |
Online |
|
Offline |
|||
Korean |
2.7 |
Online |
|
Offline |
|||
Czech |
2.7.1 |
Online |
|
Offline |
|||
Polish |
2.7.1 |
Online |
|
Offline |
|||
|
Important note: The English version is the leading version. |
1.7.1. About the online format
Each section has a unique ID (format: ID1234).
An ID references a specific section, regardless of the language.
If you want to link to a specific section, you can:
-
right-click on the section title and copy the link, or
-
click the section title and copy the link from the address bar of your browser.
Most figures are available in a larger size than displayed here by default. Click on the figure to open the larger version.
1.7.2. About the offline format
The offline format retains most features of the online format. Most notably, the figures are embedded in the HTML file. You need only one file to use the offline format.
Compared to the online format, the offline format comes without:
-
the larger images
-
the original fonts of the online format
Your browser’s defaults define the fonts.
1.7.3. About the PDF format
If you use the PDF format on your computer, you can still click all the references. But if you print the PDF version, you won’t have things like page numbers and you will have to look up the references yourself.
2. Introduction
The following sections introduce the TISAX concept.
If you are in a hurry, you can skip them and start right away at Section 4.3, “Registration preparation”.
2.1. Why TISAX?
Or rather, why are you here?
In order to answer this question, we will start with some thoughts about doing business in general and protecting information in particular.
Imagine your partner. He has confidential information. He wants to share it with his supplier — you. The cooperation between you and your partner creates value. The information your partner shares with you is an important part of this value creation. Therefore, he wants to protect it appropriately. And he wants to be sure that you are handling his information with the same due care.
But how can he be sure that his information is in good hands? He can’t just “believe” you. Your partner needs to see some proof.
Now there are two questions. Who defines what “secure” handling of information means? And next, how do you prove it?
2.2. Who defines what "secure" means?
You and your partner are not the only ones facing these questions for the first time. Almost everyone has to find answers to them and most of the answers will share similarities.
Instead of independently creating a solution for a common problem every time, a standard way of doing it removes the burden of creating everything from scratch. While defining a standard is a huge effort, it is made only once and those who follow it benefit every time.
There are surely different views of what’s the right thing to do for protecting information. But due to the aforementioned benefits, most companies settle on standards. A standard is the condensed form of all proven and time-tested best practices for a given challenge.
In your case, standards like ISO/IEC 27001 (about information security management systems, or ISMS) and their implementation establish a state-of-the-art way to securely handle confidential information. A standard like this saves you from having to reinvent the wheel every time. More importantly, standards provide a common basis when two companies need to exchange confidential data.
2.3. The automotive way
By nature, industry-independent standards are designed as one-size-fits-all solutions rather than tailored to specific needs of automotive companies.
A long time ago, the automotive industry formed associations that aimed — among other goals — to refine and define standards that suit their more specific needs. The “Verband der Automobilindustrie” (VDA) is one of them. In the working group that deals with information security, several members of the automotive industry came to the conclusion that they have similar needs to tailor existing information security management standards.
Their joint efforts led to a questionnaire that covers the automotive industry’s widely accepted information security requirements. It is called the “Information Security Assessment” (ISA).
With the ISA, we now have an answer to the question “Who defines what “secure” means?” Through the VDA, the automotive industry itself offers this answer to its members.
2.4. How to prove security efficiently?
While some companies use the ISA for internal purposes only, others use it to assess the maturity of the information security management of their suppliers. In some cases, a self-assessment is sufficient for the business relationship. However, in certain cases, companies conduct a complete assessment of their supplier’s information security management (including on-site audits).
Along with generally increasing awareness of the need for information security management and the spreading adoption of the ISA as a tool for information security assessments, more suppliers were facing similar requests from different partners.
Those partners still applied different standards and had varying opinions on how to interpret them. But the suppliers essentially had to prove the same things, just in different ways.
And the more suppliers were asked by their partners to prove their level of information security management, the louder their complaints grew in terms of repeat efforts. Showing auditor after auditor the same information security management measures is simply not efficient.
What can be done to make this more efficient? Wouldn’t it help if the report of any auditor could be reused for different partners?
OEMs and suppliers in the ENX working group that is responsible for maintaining the ISA listened to their supplier’s complaints. Now they offer an answer to their suppliers as well as to all other companies in the automotive industry to the question “How to prove security?”
The answer is TISAX, short for “Trusted Information Security Assessment Exchange”.
3. The TISAX process
3.1. Overview
The TISAX process usually[1] starts with one of your partners requesting that you prove a defined level of information security management according to the requirements of the “Information Security Assessment” (ISA). To comply with that request, you have to complete the 3-step TISAX process. This section gives you an overview of the steps you need to take.
The 3-step TISAX process consists of the following steps:
-
Registration
We gather information about your company and what needs to be part of the assessment. -
Assessment
You go through the assessment(s), which are conducted by one of our TISAX audit providers. -
Exchange
You share your assessment result with your partner.
Each step consists of sub-steps. These are outlined in the three sections below and described in detail in their respective sections further down.
|
Please note: While we would certainly like to tell you how long it will take you to get your TISAX assessment result, we kindly ask for your understanding that it is not possible for us to forecast this in a reliable way. The overall duration of the TISAX process depends on too many factors. The wide variety of company sizes and assessment objectives plus the respective readiness of an information security management system make this impossible. |
3.2. Registration
Your first step is the TISAX registration.
The main purpose of the TISAX registration is to gather information about your company. We use an online registration process to help you provide us this information.
It is the prerequisite for all subsequent steps. It is subject to a fee.
During the online registration process:
-
We ask you for contact details and billing information.
-
You have to accept our terms and conditions.
-
You can define the scope of your information security assessment.
For a direct start with this step, please refer to Section 4, “Registration (Step 1)”.
The online registration process is described in detail in Section 4.5, “Online registration process”. But if you want to start right away, please go to enx.com/en-US/TISAX/.
3.3. Assessment
Your second step is going through the information security assessment.
There are four sub-steps:
-
Assessment preparation
You have to prepare the assessment. The extent of this depends on the current maturity level of your information security management system. Your preparation has to be based on the ISA catalogue. -
Audit provider selection
You have to choose one of our TISAX audit providers. -
Information security assessment(s)
Your audit provider will conduct the assessment based on an assessment scope that matches your partner’s requirements. The assessment process will consist of the initial audit at a minimum.
If your company does not pass the assessment right away, the assessment process may require additional steps. -
Assessment result
Once your company passes the assessment, your audit provider will provide you with the official TISAX assessment report. Your assessment result will also receive TISAX labels[2].
For more information about this step, please refer to Section 5, “Assessment (Step 2)”.
3.4. Exchange
Your third and last step is to share your assessment result with your partner. The content of the TISAX assessment report is structured in levels. You can decide up to which level your partner will have access.
Your assessment result is valid for three years. Assuming you are still a supplier of your partner then, you will have to go through the three-step process again[3].
For more information about this step, please refer to Section 6, “Exchange (Step 3)”.
Now that you have a fundamental idea about what the TISAX process is, you will find instructions on how to complete each step in the following sections.
4. Registration (Step 1)
The estimated reading time for the registration section is 30-40 minutes.
4.1. Overview
The TISAX registration is your first step. It is the prerequisite for all subsequent steps.
The following sections will guide you through the registration:
-
We start with explaining an essential new term.
-
Then we advise you on what you should do to be prepared for the online registration process.
-
Next, we guide you through the online registration process.
4.2. You are a TISAX participant
Let us first introduce a new term that is necessary to understand. So far, you have been the “supplier”. You are here to fulfil a requirement of your “customer”. TISAX itself however does not really differentiate between these two roles. For TISAX, everyone who registered is a “participant”. You — as well as your partner — “participate” in the exchange of information security assessment results.
To differentiate the two roles from the beginning, we refer to you, the supplier, as “active participant”. We refer to your partner as “passive participant”. As an “active participant” you get TISAX-assessed and you share your assessment result with other participants. The “passive participant” is the one who requested that you get TISAX-assessed. The “passive participant” receives your assessment result.
Any company can act in both roles. You might share an assessment result with your partner, while at the same time requesting your own suppliers to get TISAX-assessed.
Requesting your own suppliers to get TISAX-assessed may even be especially advisable if your own suppliers are handling your partner’s information with protection needs as well.
4.3. Registration preparation
In this section, we give you recommendations on how to prepare for the registration. We describe the registration process itself in detail in Section 4.5, “Online registration process”.
Before you start going through our online registration process, we strongly recommend:
-
gathering information in advance
-
and taking some decisions.
4.3.1. The legal foundation
Typically, you need to sign two contracts. The first contract you enter is between you and ENX Association: The “TISAX Participation General Terms and Conditions” (TISAX Participant GTCs). The second contract is between you and one of our TISAX audit providers. For the registration, we will look at the first contract only.
The TISAX Participant GTCs govern our mutual relationship and your relationship with other TISAX participants. They define the rights and duties for all of us. Besides the usual clauses you will find in most contracts, they define the handling of the information exchanged and obtained during the TISAX process in detail. A key objective of these rules is to keep TISAX assessment results confidential. As all TISAX participants are subject to the same rules, you can expect appropriate protection of your TISAX assessment result by your partner (in his role as passive participant).
Quite early in the online registration process, we will ask you to accept the TISAX Participant GTCs. As this is a real contract, we recommend reading the TISAX Participant GTCs before starting the online registration process. One reason is that depending on your role in your company, you may need to obtain a clearance from an in-house or external lawyer.
You can download the “TISAX Participation General Terms and Conditions”[4] on our website at:
enx.com/en-US/TISAX/downloads/
Direct PDF download:
enx.com/tisaxgtcen.pdf
enx.com/tisaxgtcde.pdf
During the online registration process, we will ask you to check two mandatory checkboxes:
-
❏ We accept the TISAX Participation General Terms and Conditions
-
❏ We confirm knowledge of Applicant’s release of Audit Providers’ professional duties of secrecy acc. to Sec. IX.5. and X.3 of the TISAX Participation General Terms and Conditions;
We have the second checkbox because some of our TISAX audit providers are certified public accountants. They have special requirements regarding professional secrecy. Usually, the special requirements regarding professional secrecy prohibit the certified public accountants among our audit providers from sharing information with us. Particularly, this would cancel the control options we need for our governance role. Therefore, we need this release. You may want to pay special attention to those clauses before checking the box.
If you usually require a non-disclosure agreement (NDA) between you and anyone who handles confidential information, please examine the respective sections of our GTCs. They should address all your concerns. Moreover, you usually don’t have to provide us any confidential information at all.
Concluding the legal section, we ask for your understanding that the system depends on everyone accepting the same rules. We therefore can’t accept any additional general terms and conditions[5].
4.3.2. The TISAX assessment scope
In the second step of the TISAX process, one of our TISAX audit providers will conduct the information security assessment. He needs to know where to start and where to stop. That’s why you need to define an “assessment scope”.
The “assessment scope” describes the scope of the information security assessment. In simple terms, every part of your company that handles your partner’s confidential information is part of the assessment scope. You can consider it a major element of the audit provider’s task description. It dictates what the audit provider needs to assess.
The assessment scope is important for two reasons:
-
An assessment result will only fulfil your partner’s requirement if the respective assessment scope covers all parts of your company that handle partner information.
-
A precisely defined assessment scope is an essential prerequisite for meaningful cost calculations by our TISAX audit providers.
|
Important note: ISO/IEC 27001 vs. TISAX First, we have to differentiate two types of scopes: For the ISO/IEC 27001 certification, you define the scope of your ISMS (in the “scope statement”). You are completely free to define the scope of your ISMS. However, the scope of the assessment (also known as “audit scope”) must be identical with the scope of your ISMS. For TISAX, you also have to define your ISMS. But the scope of the assessment can be different. For the ISO/IEC 27001 certification, you can freely shape the scope of the assessment through the way you define the scope of your ISMS. In contrast, for TISAX, the scope of the assessment is predefined. The scope of the assessment can be smaller than the scope of your ISMS. But it must be within the scope of your ISMS. |
4.3.2.1. Scope description
The scope description defines the assessment scope. For the scope description, you have to choose one of two scope types:
-
Standard scope
-
Custom scope
-
Custom extended scope
-
Full custom scope
-
We discuss the standard scope in the following section. The standard scope is the right choice for well over 99% of all participants. Therefore, we only discuss the custom scopes in Section 7.8, “Annex: Custom scopes”.
4.3.2.2. Standard scope
The standard scope description is the basis for a TISAX assessment. Other TISAX participants only accept assessment results based on the standard scope description.
The standard scope description is predefined and you can’t change it.
A major benefit of having a standard scope is that you don’t have to come up with your own definition.
This is the standard scope description (version 2.0):
The TISAX scope defines the scope of the assessment. The assessment includes all processes, procedures and resources under responsibility of the assessed organization that are relevant to the security of the protection objects and their protection goals as defined in the listed assessment objectives at the listed locations. The assessment is conducted at least in the highest assessment level listed in any of the listed assessment objectives. All assessment criteria listed in the listed assessment objectives are subject to the assessment.
We strongly recommend choosing the standard scope. All TISAX participants accept information security assessment results based on the standard scope.
4.3.2.3. Scoping
Your next task after defining the scope type is to decide which locations belong to the assessment scope.
If your company is small (one location), this is an easy task. You simply add your location to the assessment scope.
If your company is large, you can consider registering more than one assessment scope.
Having a single scope that contains all your locations has advantages:
-
You have one assessment report, one assessment result, one expiration date.
-
You can benefit from reduced costs for the assessment because a TISAX audit provider only has to assess your central processes, procedures and resources once.
But a single scope may have disadvantages such as:
-
All locations must have the same assessment objectives.
-
The assessment result is only available once the TISAX audit provider has assessed all locations. This fact may be relevant if you urgently need an assessment result.
-
The assessment result depends on all locations passing the assessment. If just one location fails, you won’t have a positive assessment result. A workaround for this is to: a) remove the location from the scope, b) solve the issues, c) add the location afterwards with a scope extension assessment.
4.3.2.4. Scope tailoring
The question whether to have just one scope or several scopes is one that only you can answer. But answering the questions in the following diagram may help you decide.
|
Please note: Don’t let this decision intimidate you. You can change any scope as long as the audit provider didn’t conclude the assessment. For example, during your assessment preparation you may find that the scope does not fit — and change it accordingly. Or your audit provider may recommend changing the scope during the earlier stages of the assessment. Additional notes:
|
4.3.2.5. Scope locations
Now that you have decided which locations are part of your assessment scope, you can continue gathering some location-specific information.
For each location we ask for information like company name and address. We also ask for some additional information that allows our TISAX audit providers to get a better idea of your company structure. Your answers will be the basis of their effort estimations.
Please prepare yourself to provide the following details for each of your locations (the red asterisk * indicates mandatory information in the online process):
Field | Options |
---|---|
Location Name * |
n/a |
n/a |
|
Location Type * |
Building(s) owned and used exclusively by company |
Passive Site Protection * |
Yes |
Industry |
Information Technology
|
Management
|
|
Media
|
|
Research And Development
|
|
Production
|
|
Sales And Aftersales
|
|
Other Industry |
|
Employees at Location: Overall * |
0 |
Employees at Location: IT * |
0 |
Employees at Location: IT Security * |
0 |
Employees at Location: Location Security * |
0 |
Certifications for this Location |
ISO 27001 |
|
Please note: Regarding the “Industry”: Select to the best of your knowledge. There is no right or wrong when selecting from the options above. If you can’t find an option that matches your type of business, just enter the appropriate option under “Other”. |
For each location you have to specify a “location name”. The purpose of the location name is to make it easier to refer to the location when you assign them to an assessment scope.
We recommend assigning location names based on the following pattern:
Pattern: |
[Geographical reference] |
Example: |
for the fictitious company “ACME”
|
4.3.2.6. Scope name
For each scope, you have to specify a “scope name”. The main purpose of the scope name is to make it easy for you to identify a scope in the overview list of scopes in the ENX portal. You should assign a name that is helpful to the reader and your colleagues. For external communication, you should use the Scope ID.
You can specify any name you want. But you shouldn’t assign the same scope name for more than one scope.
When you later want to renew your TISAX assessment, you need to create a new scope (possibly identical to the current scope). We therefore recommend adding the year of the assessment to the scope name.
We recommend assigning scope names based on the following pattern:
Pattern: |
[Geographical or functional reference] [Year of the assessment] |
Examples: |
for the fictional company “ACME”
|
4.3.2.7. Contacts
In order to communicate with you, we collect information about contacts at your company.
We ask for at least one contact for your company as TISAX participant in general and one for each assessment scope. You have the option to provide additional contacts.
During your registration preparations, you should decide who at your company will be a contact.
We ask for the following contact details:
Contact detail | Mandatory? | Example | |
---|---|---|---|
1. |
Salutatiosn |
Yes |
Mrs., Mr. |
2. |
Academic degree |
Dr., Ph.D., other |
|
3. |
First name |
Yes |
John |
4. |
Last name |
Yes |
Doe |
5. |
Job title |
Yes |
Head of IT |
6. |
Department |
Yes |
Information Technology |
7. |
Primary phone number |
Yes |
+49 69 986692777 |
8. |
Secondary phone number |
||
9. |
Email address |
Yes |
john.doe@acme.com |
10. |
Preferred language |
Yes |
English (default) |
11. |
Other languages |
German, French |
|
12. |
Personal address identifier |
HPC 1234 |
|
13. |
Street address |
Yes |
Bockenheimer Landstraße 97-99 |
14. |
Postal code |
Yes |
60325 |
15. |
City |
Yes |
Frankfurt |
16. |
State/Province |
||
17. |
Country |
Yes |
Germany |
|
Important note: |
4.3.2.8. Publication and sharing
The main purpose of TISAX is to publish your assessment result to other TISAX participants and to share your assessment result with your partner(s).
You can decide about the publication and sharing of your assessment result either during the registration process or at any time later.
If you are going through the TISAX process as a pre-emptive step, you can already decide to publish your assessment result to the community of TISAX participants. Otherwise, there is nothing to prepare for at this stage.
If your partner requested that you to go through the TISAX process, you need to share your assessment result sooner or later. You can already share status information with your partner during the registration. Once your assessment result is available, your partner will then automatically have the permission to access it[6].
There are two things you need to share status information:
-
Your partner’s TISAX Participant ID
The TISAX Participant ID identifies your partner as a TISAX participant.
Usually, your partner should provide you his TISAX Participant ID.
For your convenience, our registration form provides a drop-down list of Participant IDs for some companies that frequently receive shared assessment results.[7]
-
The required sharing level
The sharing level defines the depth to which your partner can access your assessment result.
Either your partner requests a specific sharing level or you decide up to which level you want to grant your partner access to your assessment result.
For more information on sharing levels, please refer to Section 6.5, “Sharing levels”.
So you may want to make sure you have this information.
|
Please note:
|
|
Important note: If you don’t publish your assessment result or don’t share it, no one can see your assessment result. |
|
Important note: You can’t revoke publication or sharing. For details, please refer to Section 6.4, “Permanence of exchanged results”. |
|
Please note: It may sound odd, but you can in fact share your “assessment result” even if haven’t started the assessment process yet. At this early stage, you are just sharing the “assessment status”. The participant with whom you share your “assessment result” will see where you are in the assessment process. Some TISAX participants have to issue a special release if you have to show TISAX labels, but haven’t finished the assessment process yet. In such a case, your partner may need to see your “assessment status” in his account for the ENX portal. For more information on the assessment status, please refer to Section 7.6, “Annex: Assessment status”. |
For more information on publishing and sharing your assessment result, please refer to Section 6, “Exchange (Step 3)”.
4.3.3. Assessment objectives
You have to define your assessment objective(s) during the registration process. The assessment objective determines the applicable requirements that your information security management system (ISMS) has to fulfil. The assessment objective is entirely based on the type of data you handle on behalf of your partner.
In the following sections, we describe the assessment objectives and provide advice on how to select the right assessment objective(s).
The use of assessment objectives makes the TISAX-related communication with your partner and our TISAX audit providers easier because they refer to a defined input to the TISAX assessment process.
|
Please note: Some partners may request you to get TISAX-assessed with a certain “assessment level” (AL) instead of specifying an assessment objective. For more information on assessment levels, please refer to Section 4.3.3.5, “Protection needs and assessment levels” (sub-section “Additional information”). |
4.3.3.1. List of assessment objectives
There are currently twelve TISAX assessment objectives. You have to select at least one assessment objective. You may select more than one.
Consider your assessment objective the benchmark for your information security management system. The assessment objective is a key input for the TISAX process. All TISAX audit providers base their assessment strategy mainly on the assessment objective.
The current TISAX assessment objectives are:
No. | Name | Description |
---|---|---|
1. |
Info high |
Handling of information with high protection needs |
2. |
Info very high |
Handling of information with very high protection needs |
3. |
Confidential |
Handling of information with high protection needs in the context of confidentiality (access to confidential information) |
4. |
Strictly confidential |
Handling of information with very high protection needs in the context of confidentiality (access to strictly confidential information) |
5. |
High availability |
Handling of information with high protection needs in the context of availability (high availability of information) |
6. |
Very high availability |
Handling of information with very high protection needs in the context of availability (very high availability of information) |
7. |
Proto parts |
Protection of Prototype Parts and Components |
8. |
Proto vehicles |
Protection of Prototype Vehicles |
9. |
Test vehicles |
Handling of Test Vehicles |
10. |
Proto events |
Protection of Prototypes during Events and Film or Photo Shoots |
11. |
Data |
Data protection according to Article 28 (“Processor”) of the European General Data Protection Regulation (GDPR) |
12. |
Special data |
Data protection according to Article 28 (“Processor”) of the European General Data Protection Regulation (GDPR) with special categories of personal data as specified in Article 9 of the GDPR |
Example: If you are conducting test drives on public roads, then the assessment objective “Test vehicles” is one of your assessment objectives.
|
Please note: You can select the assessment objectives “Info high” and “Info very high” only until 31 March 2024. You can select the assessment objectives “Confidential” and “Strictly confidential” from 1 April 2024. For more information about this transition, please refer to the following news article on our website: |
|
Important note: Within TISAX, the “assessment objective” is generally the process input. However, some partners may request you to get TISAX-assessed with a certain “assessment level” (AL). For more information on the relationship between protection needs and assessment levels, please refer to Section 4.3.3.5, “Protection needs and assessment levels”. |
4.3.3.2. Assessment objectives and ISA
The ISA contains three criteria catalogues (information security, prototype protection, data protection). Each criteria catalogue is composed of so-called “control questions” and associated requirements.
Each assessment objective defines:
-
the applicable ISA criteria catalogue(s)
-
the control questions you have to answer
-
the requirements you have to fulfil
For some assessment objectives only a subset of the control questions and requirements are applicable.
For further background information on the TISAX assessment objectives and the applicable control questions and requirements, please refer to Section 5.2.2, “Understand the ISA document”.
4.3.3.3. Assessment objectives and TISAX labels
Your partner may speak of “TISAX labels”. “Assessment objectives” and “TISAX labels” are almost the same. The difference is that you start into the assessment process with the “assessment objectives” and if you pass the assessment you receive the corresponding “TISAX labels”.
Example: Your partner requires you to get the TISAX label “Info high”. Then you select “Info high” as your assessment objective.
The figure below shows you the input and output of the TISAX process:
For more information on TISAX labels, please refer to Section 5.4.14, “TISAX labels”.
4.3.3.4. Assessment objective selection
Ideally, your partner tells you precisely which assessment objectives you have to achieve.
You have to select the assessment objective based on your own judgement if:
-
you want to get TISAX-assessed before a partner asks for it, or
-
your partner does not tell you which assessment objective to achieve.
|
Important note: At this point, we strongly recommend considering your other partners. Are there existing partners that have the same or higher requirements? Do you expect future partners to have higher requirements? You may want to consider selecting assessment objectives with higher protection needs. Doing so prevents issues when other partners have higher requirements. |
If you have to select the assessment objective based on your own judgement, you may find it helpful to consider the following aspects:
No. | Assessment objective | Information |
---|---|---|
1. |
Info high |
You may derive the protection needs (high, very high) from the document classification of your partner. |
2. |
Info very high |
|
3. |
Confidential |
For all companies that receive and process information that has high protection needs in the context of confidentiality or is typically classified as confidential according to the company’s own classification scheme (e.g. VDA white paper “Harmonization of classification levels”). |
4. |
Strictly confidential |
For all companies that receive and process information that has very high protection needs in the context of confidentiality or is typically classified as strictly confidential or secret according to the company’s own classification scheme (e.g. VDA white paper “Harmonization of classification levels”). |
5. |
High availability |
For all companies whose customers' ability to produce or deliver depends on the availability of the companies' products or services, and where a failure would cause considerable damage to customers within a short period of time. |
6. |
Very high availability |
For all companies whose customers' ability to produce and deliver depends on the short-term availability of the companies' products and services, and where a failure would cause significantly high damage to customers within a very short period of time. |
7. |
Proto parts |
For all companies that manufacture, store or use customer-provided components or parts classified as requiring protection at their own locations. |
8. |
Proto vehicles |
For all companies that manufacture, store or use customer-provided vehicles classified as requiring protection at their own locations. |
9. |
Test vehicles |
For all companies that conduct tests and test drives (e.g. test drives on public roads or test tracks) with customer-provided vehicles classified as requiring protection. |
10. |
Proto events |
For all companies that conduct presentations or events (e.g. market research, events, marketing events) and film and photo shootings with customer-provided vehicles, components or parts classified as requiring protection. |
11. |
Data |
If you handle personal data as a processor according to Article 28 of the GDPR, you probably have to select “Data”. |
12. |
Special data |
If you handle special categories of personal data (like health or religion) as a processor according to Article 28 of the GDPR, then you probably have to select “Special data”. |
Further explanations:
-
If you have precise requirements from your partner, you usually don’t need to discuss your assessment objectives with your partner. However, if you don’t have precise requirements from your partner, we strongly recommend consulting your partner before initiating the assessment process.
-
The ISA describes the implementation difference between “high” and “very high” protection needs (if there is any) for each requirement.
For more information on this, please refer to Figure 11, “Screenshot: Main elements of the questions in the ISA criteria catalogue “Information Security””.
4.3.3.5. Protection needs and assessment levels
Your partner has various types of information, of which some may deserve a higher level of protection than others. The ISA accommodates this by differentiating three “protection needs”: normal, high and very high. Your partner classifies his information and usually assigns protection needs.
The higher the protection needs, the more your partner is interested in making sure that it is safe to let you handle their information. Therefore, TISAX differentiates three “assessment levels” (AL). The assessment level defines which assessment method the audit provider has to apply. A higher assessment level increases the effort that goes into the assessment. This results in greater care and accuracy in the assessment.
The table below shows you the assessment levels that apply to the TISAX assessment objectives:
No. | TISAX assessment objective | Assessment level (AL) |
---|---|---|
1. |
Info high |
AL 2 |
2. |
Info very high |
AL 3 |
3. |
Confidential |
AL 2 |
4. |
Strictly confidential |
AL 3 |
5. |
High availability |
AL 2 |
6. |
Very high availability |
AL 3 |
7. |
Proto parts |
AL 3 |
8. |
Proto vehicles |
AL 3 |
9. |
Test vehicles |
AL 3 |
10. |
Proto events |
AL 3 |
11. |
Data |
AL 2 |
12. |
Special data |
AL 3 |
Assessment level 1 (AL 1):
Assessments in assessment level 1 are mainly for internal purposes in the true sense of a self-assessment.
For an assessment in assessment level 1, an auditor checks for the existence of a completed self-assessment. He does not assess the content of the self-assessment. He does not require further evidence.
Results of assessments in assessment level 1 have a low trust level and are thus not used in TISAX. But it is of course possible that your partner may request such a self-assessment outside of TISAX.
Assessment level 2 (AL 2):
For an assessment in assessment level 2, the audit provider does a plausibility check on your self-assessment (for all locations within the assessment scope). He supports this by checking evidence[8] and conducting an interview with the person in charge information security.
The audit provider does the interview generally via web conference. At your request, he can conduct the interview in person.
If you have evidence you don’t want to send to the audit provider, you can request an on-site inspection. In this way, the audit provider can still check your “for your eyes only” evidence.
|
Please note: There is an alternate method to conduct an assessment in assessment level 2. Instead of the plausibility check, the audit provider conducts a full remote assessment. This method is sometimes referred to as “assessment level 2.5”. Compared to an assessment in assessment level 2, the auditor verifies whether your ISMS fulfils the applicable requirements. Yet in contrast to an assessment in assessment level 3, the auditor does not conduct the on-site activities outlined in the section about assessment level 3 below. Formally, such an assessment will be evaluated as an assessment in AL 2. The advantage of AL 2.5 is that the approach is methodically compatible with AL 3. It is therefore possible to upgrade to a fully-fledged assessment in AL 3 with a manageable effort at a later point in time. For the upgrade, the auditor only has to conduct the on-site activities outlined in the section about AL 3 below. We recommend assessments in assessment level 2.5 in these cases:
For more information on upgrading the assessment level, please refer to Section 7.10, “Annex: Scope extension assessment”. This alternative is optional and not required to fulfil the AL 2 requirements. The difference between AL 2 and AL 2,5 won’t be visible for partners with whom you share your assessment result. |
Assessment level 3 (AL 3):
For an assessment in assessment level 3, the audit provider does a comprehensive verification of your company’s compliance with the applicable requirements. The auditor uses your self-assessment and submitted documentation to prepare the assessment. But in contrast to assessment level 2, the auditor will verify everything. He will:
-
examine documents and evidence
-
conduct planned interviews with process owners.
-
observe local conditions
-
observe the execution of processes
-
conduct unplanned interviews with process participants
|
Please note: The following text refers to several concepts that will be explained only later in this document. With AL 3, the audit provider must come to your location(s). If, for some reason, this is temporarily not possible at all or would require unreasonable efforts, your audit provider can use the video-supported remote assessment method to conduct the on-site activities of the assessment. Your audit provider has to record this in the TISAX assessment report as a minor non-conformity. As soon as your audit provider can come to your location(s), he must conduct a follow-up assessment that includes all previously impossible on-site activities. Furthermore, you have to schedule the follow-up assessment even if you haven’t yet completed the other corrective actions. Compared to waiting for your audit provider’s availability for on-site activities, this approach allows you to already share temporary TISAX labels with your partner. |
Assessment levels and assessment methods
The following table provides a simplified overview of the audit methods associated with each assessment level:
Assessment method | Assessment level 1 (AL 1) |
Assessment level 2 (AL 2) |
Assessment level 3 (AL 3) |
---|---|---|---|
Self-assessment |
Yes |
Yes |
Yes |
Evidence |
No |
Plausibility check |
Thorough verification |
Interviews |
No |
Via web conference[9] |
In person, on site |
On-site inspection |
No |
At your request |
Yes |
Additional information:
-
Difference between AL 2 and AL 3
Methodologically, the two approaches differ significantly. For assessments in assessment level 2, the auditor won’t verify everything. He will only check the plausibility. Therefore, the audit provider can’t use the results of an assessment in assessment level 2 as a basis for an upgrade to assessment level 3. The efforts for an upgrade to assessment level 3 are essentially the same as for a new initial assessment. -
Plausibility check vs. verification
Oversimplified, a plausibility check is checking for whether something exists and looks right. In contrast, a verification means really checking that something is what it claims to be. -
Information classification and protection needs
The mapping of information classification (such as confidential or secret) to protection needs can be different for various partners. Therefore, as much as we would like to, we can’t provide you a simple table where the information classification of your partner exactly maps to a protection need. -
Just knowing an assessment level is not enough
Some partners may request you to get TISAX-assessed with a certain assessment level. Please understand that just knowing the assessment level is not sufficient to start the TISAX process. An assessment level only makes sense in combination with an ISA criteria catalogue and a corresponding protection need. Usually, partners request you to achieve a TISAX label (criteria catalogue plus protection need). However, as protection needs map 1:1 to assessment levels, it is sufficient if you know the criteria catalogue(s) plus the assessment level. -
Assessment level hierarchy
Higher assessment levels always include lower assessment levels. For example, if your assessment is based on assessment level 3, it will automatically fulfil all requests for assessment level 2. -
Our recommendation regarding assessment levels
If you have to select an assessment objective (and thus implicitly a corresponding assessment level) based on your own judgement, we recommend selecting assessment objectives that imply an assessment level 3. The efforts for TISAX assessments in assessment level 3 are not generally higher than those in assessment level 2.
Suppliers that have several partners often select assessment objectives that imply an assessment level 3. In this way, they are prepared for all future requests and don’t have to bother with different assessment levels. -
Further commercial considerations
Regarding assessment levels, the total cost of a TISAX assessment consists of the sum of your internal efforts and the cost of the assessment. While the cost of an assessment in assessment level 2 is lower, your internal efforts may be higher. This is due to the fact that an assessment in assessment level 2 usually requires a more comprehensive self-assessment and a better internal documentation. For assessments in assessment level 3, demonstrating how you do things and showing a basic documentation is often sufficient evidence for the auditor. But without an on-site inspection, the auditor will request precise documentation. Therefore, choosing assessment level 3 over assessment level 2 is not uncommon. But it is a choice made by smaller rather than larger companies.
4.3.3.6. Assessment objectives and your own suppliers
TISAX does not necessarily require you to subject all of your own suppliers to the same requirements. If your assessment objective is “Information security with very high protection needs”, this does NOT automatically mean that your own suppliers have to achieve the same assessment objective. It does not even mean they need to have TISAX labels at all.
But you still have to check for all of your suppliers whether using their services increases risks or introduces new risks.
Two very simplified examples:
-
You have a policy that regular email can’t be used for data with very high protection needs. Therefore, your email provider does not need to achieve the TISAX label with very high protection needs.
You could come to a similar conclusion if you send only encrypted emails and the email provider can’t see any of the data with very high protection needs. -
You dispose of printed data with very high protection needs in the shredder. In such a case, of course, the waste disposal service provider does not have to meet the same requirements as you.
However, the risk assessment may show that your supplier also has to meet the requirements for very high protection needs. In this case, TISAX labels are an option to prove this to you accordingly.
4.3.4. Fee
We raise a fee. Our price list informs you about applicable fees, possible discounts and our payment terms.
You can download the price list on our website at:
enx.com/en-US/TISAX/downloads/
Direct PDF download:
enx.com/pricelist.pdf
There are some invoice-related aspects you should consider during your registration preparations:
-
Invoice address selection
By default, we will send the invoice to the address you provided as your participant location. But you have the option of providing a different address for receiving the invoice.Important note:
Please make sure that the invoice address is correct. Accounting laws require that the address on our invoice exactly matches your company’s (invoice) address. For compliance reasons, we can’t change an invoice address once we issued the invoice.
-
Order reference
If you need to see a specific purchase order number or something similar on our invoice, then you have the option to provide us an order reference. -
VAT number
All our charges are subject to German value added tax (VAT) if applicable.
We need this number for processing payments from the EU. It is mandatory to provide a VAT number, if your invoice address is in one of the following countries:
Austria, Belgium, Bulgaria, Croatia, Cyprus (Greek part), Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Slovakia, Slovenia, Spain, Sweden, United Kingdom -
Supplier management
Important note:
Please understand that due to the mutuality between all TISAX participants, we can’t accept any additional terms (such as general purchasing terms, codes of conduct).
Additional information about our invoicing process:
-
We can’t accept individual purchasing terms.
-
We accept:
-
money transfers into the bank account specified on the invoice
-
credit card payments (during the registration process via our payment service provider “Stripe”)
-
-
Our invoice will contain the following references to your registration:
-
The name and email address of your main participant contact
-
The assessment scope name
You can find an example invoice in the appendix in Section 7.1, “Annex: Example invoice”.
-
-
We provide most facts you would typically require for processing our invoice directly on it. These and even more facts are available in our document “Information for Members and Business Partners”. Send us an email and we send you a current version.
|
Please note: We are aware that sometimes a company’s internal payment approval process is rather lengthy. Therefore, your immediate next step in the TISAX process does not depend on us receiving the payment. But please be aware that you can’t share your assessment result if we haven’t received your payment. |
|
Important note: We — ENX Association — invoice the fee. It is only a part of the total cost of a TISAX assessment. Your TISAX audit provider invoices the costs for the assessment(s). For more information on audit provider-related costs, you may want to refer to Section 5.3.4, “Evaluating offers”. |
|
Important note: The fee is due regardless whether you:
Therefore, the invoice may arrive before you’ve started the initial assessment. |
4.4. ENX portal
The next section will describe the online registration process where you enter all the data you gathered as advised in the previous section. Before you start the online registration process, please let us briefly explain the purpose and benefits of the ENX portal.
The ENX portal allows us to maintain a database of all TISAX participants and it plays an important role throughout the entire TISAX process. During the TISAX registration you enter your data which the TISAX audit providers can then use (if you agree) to calculate their offers and to plan the assessment procedures. Once you go through the TISAX assessment process, you will use the exchange platform on the ENX portal to share your assessment result with your partner.
The portal’s name is “ENX portal” instead of “TISAX portal”, because we also use the portal to manage other business activities (like the ENX network).
4.5. Online registration process
If you prepared according to our advice above (Section 4.3, “Registration preparation”), you are ready to start the online registration process.
4.5.1. Time required
How long it will take you depends heavily on the number of scopes and locations you register. For your first registration as a participant with one scope with one location, you should expect a minimum time of 20 minutes.
We recommend completing the registration in a single session, because currently you can’t easily catch up some steps later. Should you still need to pause, we will contact you to request any missing data.
4.5.2. Start here
Please start your registration on our website at:
enx.com/en-us/Account/Login/Register?returnUrl=%2FTISAX%2Ftisax-initial-registration%2F
Basically, all you need to do is follow the on-screen instructions. Nevertheless, we briefly describe the process below.
4.5.3. Portal account
Your first step is to create an account for yourself in the ENX portal. You need the portal account to be able to manage your company’s “participant data”.
|
Please note: Should the ENX portal claim that your email address is already in use, please contact us. This message may indicate that for some reason you are already stored in our system. |
|
Please note: As described, portal accounts are not necessarily “participant contacts” or “scope contacts” (see below) with an active role in the assessment process. Vice versa, a “participant contact” or “scope contact” doesn’t automatically include the same rights to manage the participant data as with a portal account. This means, colleagues named as “participant contact” or “scope contact” can’t automatically access the participant data in the ENX portal. If you want to assign the right to manage the participant data to a contact who you already created in the ENX portal (regardless whether you assigned him a role), you need to invite the contact. For more information, please refer to last note in Section 4.5.5, “Participant contact”. |
4.5.4. Participant registration
Your second step is to register your company as a TISAX participant. The “TISAX participant” is the company that exchanges assessment results with other participants.
4.5.5. Participant contact
This is the person that is generally responsible for all information security assessment topics of your company. This can be either you or someone else in your company.
The main participant contact is usually all we need. Should you prefer to have all communication sent by us and our TISAX audit providers in the context of this registration also to other persons as well, please add additional participant contacts.
|
Important note: |
|
Please note: You can always add or remove contacts at a later point in time (even after completing the online registration process and even once you completed assessments). |
|
Please note: You can’t use group email addresses for participant contacts (like “info@acme.com” or “IT@acme.com”). This is in line with the ISA requirements regarding user logins. |
|
Please note: You can choose if each contact should have access to your company’s participant data. Either:
To create a new contact: Sign in > MY TISAX > ADMINISTRATORS > Create new TISAX Administrator To invite a contact: Sign in > MY TISAX > ADMINISTRATORS > Go to the end of the table row of the contact and click the button with the down arrow > Edit TISAX Administrator > Go to the section “ENX PORTAL ACCESS” > Set “INVITE THIS CONTACT" to “Yes” > Click “Save Contact” |
4.5.6. General Terms and Conditions
Your third step is to accept the “TISAX Participation General Terms and Conditions”.
You may want to refer back to the explanatory notes in Section 4.3.1, “The legal foundation”.
4.5.7. Assessment scope registration
Your fourth step is to register the assessment scope of your information security assessment.
We ask you to:
-
assign an assessment scope name.
The main purpose of the scope name is to make it easy for you to identify a scope in the overview list of scopes in the ENX portal.
You may want to refer back to the explanatory notes in Section 4.3.2.6, “Scope name” -
choose an assessment scope type.
(Standard, Custom)
You may want to refer back to the explanatory notes in Section 4.3.2, “The TISAX assessment scope”. -
specify the main scope contact.
This is the person who is generally responsible for the assessment of a particular scope. This can be either you or someone else in your company.
The main scope contact is usually all we need. Should you prefer to have all communication sent by us in the context of this particular scope also to other persons, you can add additional participant contacts. -
select your assessment objective(s).
You may want to refer back to the explanatory notes in Section 4.3.3, “Assessment objectives”. -
add assessment scope location(s).
We request that you specify all locations that are part of the assessment scope.
You may want to refer back to the explanatory notes in Section 4.3.2, “The TISAX assessment scope”.Please note:
Once you created a new location, you can’t edit it. For minor changes (change of company name, typos in street name, postal code, city, etc.), please contact us. We will do the editing for you.
Important note:
This note is only relevant if you are renewing your TISAX labels.
Please reuse the existing location records that you created and used during the registration of your previous scope. Don’t create a new location record with the same address.
The reason for this: Some TISAX participants process the assessment results of their partners automatically. They synchronise their own system with the ENX portal. Even tiny differences may block the successful synchronisation. Besides that, you don’t clutter your participant data with unnecessary duplicates. -
select publication and sharing levels (optional).
You can already decide to publish your assessment result to other TISAX participants and to share your assessment result with your partner(s). Typically, you would be allowing us to at least show that your company is a participant and that you successfully passed the TISAX process.
You can safely skip this step during your initial registration. You can always define access to your assessment result later.
You may want to refer back to the explanatory notes in Section 4.3.2.8, “Publication and sharing”.Important note:
You can’t revoke any publication or sharing permissions.
For details, please refer to Section 6.4, “Permanence of exchanged results”. -
specify who receives the invoice.
We request that you specify who will receive our invoice(s).
You may want to refer back to the explanatory notes in Section 4.3.4, “Fee”.
|
Please note: You can’t do much wrong here. If you later find out that you should have registered a slightly different scope (you forgot a location, you have another assessment objective, etc.), the audit provider can nevertheless conduct the assessment. Example: The auditor determines that the scope must contain an additional location that you originally didn’t add to the scope. The auditor will proceed and afterwards updates your assessment scope in the ENX portal while uploading your assessment result. |
|
Please note: Every assessment scope goes through a lifecycle. At this stage, your assessment scope either has the status “Incomplete”, “Awaiting your order” or “Awaiting ENX approval”. For more information on the status of an assessment scope, please refer to Section 7.5.1, “Overview: Assessment scope status”. |
|
Please note: For large corporations with many locations, TISAX offers the simplified group assessment. You can consider this option if: For a simplified group assessment the initial effort is higher. However, this pays off the more locations you have. For more information on the “simplified group assessment”, please refer to the document “TISAX Simplified Group Assessment”. You can download the document “TISAX Simplified Group Assessment” on our website at: Direct PDF download: |
|
Please note: Once we have registered your assessment scope, you can’t change it yourself. If you can credibly assure us that you have NOT yet sent your “TISAX scope excerpt” to our audit providers, please contact us. We can change it for you. If you already sent your “TISAX scope excerpt” to (one of) our audit providers, you just create the new location(s) in the ENX portal (if applicable) and discuss any changes with your audit provider. Your audit provider will conduct the assessment based on the changes and update the scope information in the ENX portal. |
|
Please note: It is not possible for you to delete an assessment scope in the ENX portal. If you created an assessment scope by mistake, please contact us. We will delete it for you. |
4.5.8. Confirmation email
Once you completed all of the mandatory steps above, we will check your application. We will then send you a confirmation email.
This email has two important elements:
-
A contact list of all TISAX audit providers
You must choose one of our TISAX audit providers to conduct an assessment of your assessment scope. You can use the contacts to request offers.
For more information on audit provider selection, please refer to Section 5.3, “Audit provider selection”. -
The “TISAX Scope Excerpt” as an attached PDF file
It contains:
-
The information that we stored in our database
-
Your Participant ID
Please refer to Section 4.5.8.1, “Participant ID” below. -
Your Scope ID(s)
Please refer to Section 4.5.8.2, “Scope ID” below.
-
For an example of our confirmation email, please refer to Section 7.2, “Annex: Example confirmation email”.
For an example of the “TISAX Scope Excerpt”, please refer to Section 7.3, “Annex: Example TISAX Scope Excerpt”.
You will receive our confirmation email usually within three business days.
If you don’t hear from us within seven business days, please verify that a) you provided all information and b) the assessment scope status is “Awaiting ENX approval”. We will start processing your registration only when everything is complete. If you think everything is complete but we haven’t contacted you, please contact us.
We send our confirmation email to the main participant contact.
|
Please note: Every assessment scope goes through a life cycle. At this stage, your assessment scope has the status “Awaiting ENX approval”. For more information on the status of an assessment scope, please refer to Section 7.5.5, “Assessment scope status “Awaiting your payment””. |
The next two sub-sections provide detailed information about the purpose of your Participant ID and the Scope ID.
4.5.8.1. Participant ID
The Participant ID:
-
identifies a TISAX participant.
-
is unique for each participant.
-
is assigned by us upon completion of the registration.
-
is a prerequisite for ordering an information security assessment by any of our TISAX audit providers.
-
looks like this:
Figure 7. Format of the Participant ID[12]
|
Please note: There are two ways to find your Participant ID:
|
4.5.8.2. Scope ID
The Scope ID:
-
identifies an assessment scope.
-
is unique for each assessment scope.
-
is assigned by us upon completion of the registration.
-
is a prerequisite for being allowed to order an information security assessment by any of our TISAX audit providers.
-
looks like this:
|
Please note: There are two ways to find your Scope ID:
|
|
Please note: Every assessment scope (identified by its Scope ID) runs through a life cycle. For more information on the status of an assessment scope, please refer to Section 7.5, “Annex: Assessment scope status”. |
4.5.9. Status information
At this stage, there are two relevant statuses that we use to describe your position in the TISAX process:
-
Participant status
-
Assessment scope status
The following diagram illustrates the conditions that must be met to reach a certain status:
You can find the status definitions and what you need to do to progress to the next status in the annex.
For more information on the:
-
participant status, please refer to Section 7.4, “Annex: Participant status”.
-
assessment scope status, please refer to Section 7.5, “Annex: Assessment scope status”.
4.5.10. Changes of your registration information
|
Please note: For all answers regarding the data life cycle, please refer to Section 7.9, “Annex: Participant data life cycle management”. It contains instructions for cases where you want to change or update data such as your company name or your contact information. |
Congratulations, you are now a registered TISAX participant. You are ready to continue with the next step in the TISAX process.
5. Assessment (Step 2)
The estimated reading time for the assessment section is 30-35 minutes.
5.1. Overview
The TISAX assessment is your second step. This is where you do most of the work of getting TISAX-assessed.
The following sections will guide you through the assessment:
-
We start with explaining how you can use the ISA self-assessment to find out whether you are prepared for a TISAX assessment.
-
Then we advise you how to choose one of our TISAX audit providers.
-
Next, we describe your way through the assessment process.
-
At the end, we explain the “process outcome”: your assessment result and the associated TISAX labels.
5.2. Self-assessment based on the ISA
To be ready for a TISAX assessment, you primarily need to have your information security management system (ISMS) in top form. To find out whether your ISMS matches the expected maturity level, you have to conduct a self-assessment based on the ISA.
The “Information Security Assessment” (ISA) is a criteria catalogue published by the “German Association of the Automotive Industry” (Verband der Automobilindustrie e.V. - VDA). It is the automotive industry’s standard for information security assessments.
The following sections focus on practical instructions for conducting a self-assessment based on the ISA.
The explanations, examples and screenshots in this handbook are based on Version 5 of the ISA.
|
Please note: You will find information on changes compared with previous versions of the ISA in its Excel sheet “Change history”. |
|
Please note: For information about which ISA version is applicable to your assessment when the VDA publishes a new version, please refer to Section 7.11, “Annex: ISA life cycle management”. |
5.2.1. Download the ISA document
Start your self-assessment by downloading the ISA document.
You can download it from our website at:
enx.com/en-US/TISAX/downloads/
Direct Excel file download:
portal.enx.com/isa5-en.xlsx
The ISA document is also available in German:
enx.com/de-de/TISAX/downloads/
5.2.2. Understand the ISA document
Before you start your self-assessment, here are some explanations you may find useful. We provide these in addition to the official explanations and definitions in the ISA document, but with a focus on the use for TISAX assessments.
5.2.2.1. Criteria catalogues
The ISA currently has three “criteria catalogues”[13]:
1. |
Information Security |
2. |
Prototype Protection |
3. |
Data Protection |
Each criteria catalogue has its own Excel sheet:
Which criteria catalogue is relevant for you? This depends on your assessment objective(s).
Each assessment objective defines which requirements from which criteria catalogue apply. For some assessment objectives, only requirements from one criteria catalogue apply, for others, requirements from more than one criteria catalogue apply.
The aforementioned assessment objectives map to these criteria catalogues:
No. | Assessment objective | ISA criteria catalogue(s) |
---|---|---|
1. |
Info high |
Information Security |
2. |
Info very high |
Information Security |
3. |
Confidential |
Information Security |
4. |
Strictly confidential |
Information Security |
5. |
High availability |
Information Security |
6. |
Very high availability |
Information Security |
7. |
Proto parts |
Prototype Protection |
8. |
Proto vehicles |
Prototype Protection |
9. |
Test vehicles |
Prototype Protection |
10. |
Proto events |
Prototype Protection |
11. |
Data |
Information Security |
12. |
Special data |
Information Security |
Example: If you have selected the assessment objective “Data Protection”, then you will have to answer the questions in the criteria catalogues “Information Security” AND “Data Protection”.
You may have noticed that there is more than one assessment objective per criteria catalogue. How do you know which requirements are applicable to which assessment objective?
The following table shows you which requirements are applicable:
No. | Assessment objective | Applicable requirements |
---|---|---|
1. |
Info high |
|
2. |
Info very high |
|
3. |
Confidential |
|
4. |
Strictly confidential |
|
5. |
High availability |
|
6. |
Very high availability |
|
7. |
Proto parts |
|
8. |
Proto vehicles |
|
9. |
Test vehicles |
|
10. |
Proto events |
|
11. |
Data |
|
12. |
Special data |
|
|
Please note: Each requirement in the two columns “Additional requirements for high protection needs” and “Additional requirements for very high protection needs” is marked with either a “C” as in Confidentiality or an “I” as in Integrity or an “A” as in Availability or any combination of these three letters. When the table above narrows the requirements in these two columns down to those marked with one of the aforementioned letters, this always includes the requirements that are also marked with more than this letter. Example: All requirements marked with “(C)”, “(C, I, A)” or “(C, I)” are applicable where “C” is specified in the table above (e.g. in the assessment objective “Special data”). |
The screenshot below shows the main elements of the control questions in the “Information Security” criteria catalogue. (The other criteria catalogues only have a subset of these elements.) We explain all elements further down.
5.2.2.2. Chapters
Each criteria catalogue groups the questions in chapters.
Example: “2 Human Resources”
The grouping is based on the typical responsibilities in a company. These departments are specified in the column “Usual person responsible for process implementation” (“HR” in the example above).
5.2.2.3. Control questions
You find the questions for each criteria catalogue in the respective Excel sheets.
Example: “4.1.2 To what extent is the user access to network services, IT systems and IT applications secured?”
The control questions are also referred to as “controls”. This is “auditor speak”. The ISO standards that the ISA builds upon use the term “control”.
5.2.2.4. Self-assessment form fields
Between the columns “Maturity level” and “Control question” are form fields you need to fill in when you are conducting a self-assessment:
Form field | Purpose | Mandatory? |
---|---|---|
Implementation description |
Here you should briefly describe what you implemented to address this control question in your company. |
Yes |
Reference Documentation |
Here you should specify in which document(s) you prove the implementation. |
Yes |
Findings/Result |
Here you can write down any findings where you think a gap exists between what should be and what is. |
No |
Only the brief description of your implementation and the reference to your documentation are mandatory. This information will help our TISAX audit providers to better understand your company and to prepare the assessment.
There are more optional columns to support your self-assessment:
-
Measures/recommendations (Column R)
-
Date of assessment (Column S)
-
Date of completion (Column T)
-
Responsible department (Column U)
-
Contact (Column V)
|
Important note: If you open the downloaded Excel file and select one of the criteria catalogue worksheets (e.g. Information Security), you probably won’t immediately see the self-assessment form fields. To show them, you need to click on the grouping button for level “2”[14]. The button is above and to the left of cell C1. This will expand the view to show the self-assessment form fields. Another tip is to use the arrow keys to scroll down. Because due to the large size of the cells, the scrolling with the scroll bar may require excellent fine motor skills. If you use your pointing device’s scroll feature, you may also accidentally skip over some of the larger cells. |
5.2.2.5. Objective
To the right of the column “Control question” is the column “Objective” (column J). Its content describes what you need to achieve regarding this aspect of your information security management.
Example (for control question 4.1.2): “Only securely identified (authenticated) users are to gain access to IT systems. For this purpose, the identity of a user is securely determined by suitable procedures.”
5.2.2.6. Requirements
The requirements are what you are expected to fulfil in order to achieve the objective.
The requirements are spread across four columns:
-
Requirements (must) (Column K)
-
Requirements (should) (Column L)
-
Additional requirements for high protection needs (Column M)
-
Additional requirements for very high protection needs (Column N)
You have to fulfil all requirements up to the protection need you need to achieve (which you can derive from your assessment objective).
For some assessment objectives, only a subset of the requirements are applicable. For more information on the applicability of the requirements, please refer to Table 8, “Applicability of requirements to the assessment objectives” in Section 5.2.2.1, “Criteria catalogues” and especially the note at the end of the section.
For more information about the ISA definitions of the requirement levels “must” and “should”, please refer to the “Key terms” in the Excel sheet “Definitions”.
|
Important note: It is very important for you to understand that you have to interpret each requirement in the context and spirit of the objective. Even fulfilling a requirement to the letter doesn’t guarantee that the audit provider confirms that you fulfil it in the context and spirit of the objective (column J). The requirements and their wording are based on a theoretical implementation by a fictional average company of unknown size. The audit provider has to always weigh the objective against the unique implementation at your company. What is appropriate for the average company might not be sufficient in your particular situation. For more information, please refer to Section 5.2.5, “Address the self-assessment result”. |
5.2.2.7. Maturity levels
The ISA uses the concept of “maturity levels” to rate the quality of all aspects of your information security management system. The more sophisticated your information security management system is, the higher your maturity level will be.
The ISA differentiates six maturity levels. You can find the detailed definition in the Excel sheet “Maturity levels”. For a consolidated view on the maturity levels, we quote the informal descriptions as provided in the ISA:
Maturity level | In one word | Description |
---|---|---|
0 |
Incomplete |
A process is not available, not followed or not suitable for achieving the objective. |
1 |
Performed |
An undocumented or incompletely documented process is followed and indicators exist that it achieves its objective. |
2 |
Managed |
A process achieving its objectives is followed. Process documentation and process implementation evidence are available. |
3 |
Established |
A standard process integrated into the overall system is followed. Dependencies on other processes are documented and suitable interfaces are created. Evidence exists that the process has been used sustainably and actively over an extended period. |
4 |
Predictable |
An established process is followed. The effectiveness of the process is continually monitored by collecting key figures. Limit values are defined at which the process is considered to be insufficiently effective and requires adjustment. (Key Performance Indicators) |
5 |
Optimizing |
A predictable process with continual improvement as a major objective is followed. Improvement is actively advanced by dedicated resources. |
You have to rate the maturity level of your information security management system per question. Enter your maturity level in the column “Maturity level” (column E).
For more information on target maturity levels and their impact on your assessment result, please refer to Section 5.2.4, “Interpret the self-assessment result”.
With this improved understanding, you are now ready to start the self-assessment.
5.2.3. Conduct the self-assessment
Open the Excel file and go through all the control questions of each criteria catalogue applicable to your assessment objective(s) and determine the maturity level that matches the current state of your information security management system. Do this based on your own best judgement. There is no right or wrong at this stage.
Once you completed the self-assessment, the “Result” column (H) in the Excel sheet “Results (ISA5)” should be completely filled, either with numbers (0-5) or “n.a.” (as in “not applicable”).
If you have questions regarding the ISA, please contact us.
5.2.4. Interpret the self-assessment result
The next five sub-sections explain how to analyse and interpret your self-assessment result. The analysis will tell you whether you are ready or not yet ready for a TISAX assessment.
5.2.4.1. Analysis
Your result score summarises the self-assessment result.
You find the result score (“Result with cutback to target maturity level”) in the Excel sheet “Results (ISA5)” (cell D6). We will explain “cutback” soon.
For understanding and subsequently interpreting your self-assessment result and your result score, you need to differentiate two analysis levels:
-
Question level
This level has all the questions. For each question, there is a target maturity level and your maturity level. -
Score level
On this level, there is the overall result that summarises the results of all the questions. There is a maximum result score and your result score.
The figure below shows the analysis levels:
The figure below shows you where to find the results on the score level and the results on the question level:
The next figure shows a simplified view of the analysis levels, the ISA target definitions and your own results:
The following sections explain the result and its analysis in detail.
5.2.4.2. The target maturity level (on question level)
The ISA defines a “target maturity level” of 3 for each question.
For more information on the definition of each maturity level, please refer to Section 5.2.2, “Understand the ISA document”.
The ISA defines the target maturity levels in the Excel sheet “Results (ISA5)” (starting at column G, row 22; see figure below).
5.2.4.3. Your result (on question level)
In order to receive TISAX labels, you usually need to have maturity levels for each question that are equal to or above the target maturity level.
Example: If the target maturity level for question X is “3”, your maturity level for that question should be “3” or higher. If your maturity level for that question is below “3”, you may not receive TISAX labels.
This has to happen for each question. If the target maturity level for two questions is “3”, you can’t compensate for a maturity level of “2” for one question with a maturity level of “4” for the other question.
The ISA document automatically transfers your maturity levels from the Excel sheet “Information Security” (column E) to the Excel sheet “Results (ISA5)” (starting at column H, row 23):
Your maturity level is subject to a calculation before the ISA document summarises it in your result score. Basically, your maturity level is “cut back” to the target maturity level. This is done so that questions where your maturity level is above the target maturity level don’t compensate for questions where your maturity level is below the target maturity level.
Here’s how the ISA calculates your result on the question level:
-
It takes your maturity level and compares it to the question’s target maturity level.
-
If your maturity level is above the target maturity level, it is “cut back” to the target maturity level.
-
If your maturity level is below or equal to the target maturity level, nothing happens for this question.
Example (see figure below): The target maturity level is “3”. Your maturity level is “4”. Your “cut back result” for this question will be “3”.
The figure below shows that if your maturity level is higher than the target maturity level, the ISA cuts it back (the colours green, orange and red match with the colours used in the “Result” column, see Figure 19, “Your maturity levels in the Excel sheet “Results (ISA5)””).
Below is another way to view the maturity levels on the question level. The colours of the circles illustrate the target maturity level or the “distance” to it (example: the circle is orange if the maturity level is “-1” below the target maturity level). The check marks illustrate your maturity level.
|
Please note: It is possible to successfully pass a TISAX assessment even if you don’t reach the target maturity level for all questions. The main question in such cases is whether you have a relevant risk. If your maturity level is below the target value, but there is no risk, this might still be sufficient. |
5.2.4.4. The target (on score level)
The ISA defines an “ideal” overall maturity level — the “maximum result score” (or “Maximum score”, cell G6).
In theory, this overall maturity level is the average of all target maturity levels (on the question level). This would be a maximum result score of “3.0”.
However, it is “3.0” only if all questions apply to your situation. As soon as a question is not applicable to your situation, the average changes and the maximum result score is lower than “3.0”.
Based on a view shown further above (Figure 22, “Maturity levels on question level”), you can see below what’s put into the average for the maximum result score:
5.2.4.5. Your result (on score level)
Your overall result score (“Result with cutback to target maturity levels”, cell D6):
-
summarises the overall maturity level of your information security management system.
-
is the average of all your maturity levels (on question level).
-
can be below or equal to the maximum result score.
-
should be as close to the maximum result score as possible. The more your result score is below the maximum result score, the less likely it is that you will receive TISAX labels.
Again using a view shown further above (Figure 22, “Maturity levels on question level”), you can see below what’s put into the average for the result score:
The result score tells you whether you:
-
are ready for a TISAX assessment.
-
can expect to receive TISAX labels.
If your result score (“Result with cutback to target maturity levels”) is below “3.0”, then at least for one question your maturity level doesn’t match the target maturity level. In this case, you probably must improve your information security management system before you are ready for your TISAX assessment.
|
Please note: For the overall score, there are formal limits for an acceptable “distance” between your result score and the maximum result score (“Result with cutback to target maturity levels”). If your result score is more than:
|
|
Important note: Having a result score (“Result with cutback to target maturity levels”) of “3” is not a guarantee that you will pass the TISAX assessment without any prohibitive findings. Please bear in mind that the audit provider may view certain aspects differently than you do. |
5.2.4.6. Are you ready?
The purpose of the analysis above is to know whether you are ready for a TISAX assessment.
You are definitely ready for a TISAX assessment if your result score (“Result with cutback to target maturity levels”) is (close to) “3.0”. In this case, all values in the “Results” column (H) are green (no orange or red).
If they are not green, you need to address your self-assessment result (please refer to Section 5.2.5, “Address the self-assessment result”).
The figure below shows the ISA spider web diagram on the Excel sheet “Results (ISA5)”. The green line marks the target maturity level per chapter. If your maturity levels are on or above that line, you are ready for a TISAX assessment. If they are below that line, this may not be sufficient to receive TISAX labels.
If you “unfold” the ISA spider web to the question level, you get a similar green/red view on the question level:
5.2.5. Address the self-assessment result
Your self-assessment result may show that you need to improve your information security management system before you are ready to receive TISAX labels.
For some gaps between your maturity level and the target maturity level, you may already know how to close them. For others, you might need external advice. In this case, you can ask our TISAX audit providers for consulting services. TISAX allows them to consult, but doesn’t require it. Please note that any audit provider doing consulting for you can no longer conduct TISAX assessments for you.
|
Important note: Not properly addressing the self-assessment result before getting assessed is a major stumbling block for many companies. Please don’t underestimate the effort it may take to shape your information security management system according to the requirements. Many companies need to formally set up a large project to prepare for a TISAX assessment. |
|
Please note: When you’re looking for external help for getting through the TISAX process, you will find that various companies offer consulting and training services. None of these companies are associated with us. As things currently stand, we:
|
|
Please note: |
5.3. Audit provider selection
Only audit providers that we contracted can conduct TISAX assessments[15]. TISAX audit providers are allowed to conduct TISAX assessments for you only if they haven’t had any previous consulting assignments with you.
All our TISAX audit providers are obliged to conduct TISAX assessments only for those companies that are registered TISAX participants.
|
Important note: Once you have registered a TISAX assessment scope, you should start contacting our audit providers. They have a certain lead time regarding their availability. Contacting them after you finished your preparations could add an unnecessary delay. |
|
Please note: Every assessment scope goes through a life cycle. At this stage, your assessment scope must have the status “Approved” or “Registered” For more information on the status of an assessment scope, please refer to Section 7.5.5, “Assessment scope status “Awaiting your payment””. |
5.3.1. Contact information
Once you have registered a TISAX assessment scope, you can contact all TISAX audit providers and request offers. Their contact information is provided in the registration confirmation email you received[16] (please refer to Section 4.5.8, “Confirmation email”).
|
Please note: Please request offers from our TISAX audit providers only AFTER you are registered. The audit providers will check for an existing registration. They have to reject requests without registration. This is also the reason why you receive the audit provider contact information only in the registration confirmation email and not from our public website. |
5.3.2. Coverage
While currently many of the audit provider contacts are based in Germany, it is important to understand that all our audit providers are able to generally conduct TISAX assessments worldwide. Most of them even have their own employees in many countries.
On our website, we offer a page where you can select your country and then see which audit provider has local sales staff and/or local auditors ( enx.com/en-US/TISAX/xap/).
5.3.3. Requesting offers
In order to allow our TISAX audit providers to precisely calculate the expected assessment efforts, you should always include the “TISAX Scope Excerpt”.
For more information, please refer to Section 4.5.8, “Confirmation email”.
|
Please note: Impartiality is a key characteristic of our TISAX audit providers. They will ensure that no conflict of interest exits. You may want to consider this when contacting them. If your company is somehow related to an audit provider, you can’t expect to be assessed by him. |
5.3.4. Evaluating offers
You can freely choose among all our TISAX audit providers. They are all bound to the same contract. They all conduct the assessments based on the same criteria and the same auditing methods. In terms of the assessment result, there won’t be a difference regardless which audit provider you choose. Your assessment result will be accepted by all TISAX participants.
Besides obvious factors such as price, reputation and likeableness, there are some aspects of an offer you can look for:
-
Availability:
How soon can the assessment process start? This might be an important aspect if getting TISAX-assessed is urgent for you. -
Travel-related costs for on-site appointments:
Audit providers with offices in your country might have lower travel-related costs. -
Language:
Will you and every other interviewee in your company be able to communicate with the auditor in your native language? -
Scope of the offer:
Which assessments are included?
For more information on assessments, please refer to Section 5.4.3, “TISAX assessment types”.
Usually, the offers include the initial assessment and the corrective action plan assessment. As the efforts for follow-up assessments are difficult to predict, they are typically offered after the other assessments are completed.
Ultimately, it will come down to trust. You will need to form a trust relationship with your audit provider as he will have quite an insight in your company.
|
Please note: |
|
Please note: While we would certainly like to tell you how much our audit providers will charge for the assessment, we kindly ask for your understanding that it is not possible for us to provide this information. The costs depend on too many factors. On top of that, our audit providers are free regarding their commercial calculations. However, we can mention some rather rough estimates for how many man-days our audit providers will charge you for. For an average small company with one location, you should expect to pay for three and a half to four man-days for an assessment in assessment level 2 and five to six man-days for an assessment in assessment level 3. |
|
Please note: Every assessment goes through a life cycle. For more information on the status of an assessment, please refer to Section 7.6, “Annex: Assessment status”. |
Once you’ve chosen one of our TISAX audit providers, you can finally initiate the TISAX assessment process.
5.4. TISAX assessment process
5.4.1. Overview
The TISAX assessment process consists of several types of assessments. In most cases, there will be more than one assessment.
You should view the assessment process as an interlaced sequence of steps where:
-
You prepare your information security management system to be in top form.
-
The audit provider checks whether your information security management system fulfils a defined set of requirements. He may find gaps.
-
You then close the gaps within defined periods.
-
The audit provider then checks again whether you closed the gaps.
These alternating steps are done until all gaps are closed.
It is important to understand that you initiate each sub-step in the assessment process. The entire assessment process is under your control. And of course it is up to you to stop and exit the assessment process whenever you want.[17]
The TISAX assessment process has the following macro structure:
-
Kick-off meeting
You and the audit provider are planning the details of the assessment process -
Assessment phase 1
The audit provider checks your self-assessment -
Assessment phase 2
The audit provider conducts the assessment(s)
5.4.2. Kick-off meeting
The TISAX assessment process starts with the kick-off meeting. It is the place to plan the details of the assessment process. Usually, the kick-off meeting is done in a conference call. The audit provider will guide you through the meeting.
Among other things, the following topics are on the agenda:
-
Who are the meeting participants?
-
Who is the assessed company?
-
How does the TISAX assessment process work?
-
What is the assessment scope and is it the right one?
-
Are there no conflicts of interest?
-
How does a good self-assessment look like?
-
Who is responsible for what?
-
How do we communicate?
-
When does the assessment take place (and other time planning)?
-
Who needs to participate in the assessment(s)?
-
Who can you contact when you have complaints?
The period between the end of the kick-off meeting and the delivery of your self-assessment is typically one to three month. But even six month is not unusual. The period depends on the status of your preparation. TISAX does not mandate any deadlines for this period. You can take all the time you need to prepare your self-assessment and to prepare for the assessment.
5.4.3. TISAX assessment types
The TISAX assessment process is made up of these three types of TISAX assessments:
-
Initial assessment
-
Corrective action plan assessment
-
Follow-up assessment [18]
The initial assessment will always take place. The other two TISAX assessments may take place and may do so several times. They will take place either:
-
until you closed all gaps
-
or you exit the TISAX assessment process
-
or you reach the maximum time period of nine months after the end of the closing meeting of the initial assessment (at which point another initial assessment is required).
All TISAX assessments will be described in the coming sections.
|
Please note: Every assessment goes through a life cycle. For more information on the status of an assessment, please refer to Section 7.6, “Annex: Assessment status”. |
5.4.4. TISAX assessment elements
Each TISAX assessment consists of the following elements:
-
Formal opening meeting[19][20]
-
It aims to cover all organisational topics.
-
It does not necessarily have to be a physical meeting.
-
Topics can be covered in one go or spread over several occasions.
-
It is a “logical container” for all organisational pre-assessment topics.
-
-
Assessment procedure
-
Your audit provider checks all requirements.
-
Assessment methods are selected according to the respective assessment level.
-
-
Formal closing meeting[21]
-
It concludes a TISAX assessment.
-
The audit provider presents his findings.
-
The audit provider announces the assessment result.
-
It does not necessarily have to be a physical meeting.
-
It is a “logical container” for all organisational post-assessment topics.
-
After the “closing meeting” the audit provider prepares and sends you the draft version of the updated “TISAX assessment report”. You can voice objections if you think the audit provider misunderstood something.[22] Then the audit provider issues the final “TISAX assessment report”.
All these elements will be described in the next sections.
5.4.5. About conformity
Before we continue outlining the TISAX assessment process, we want to explain you a key concept that is essential for your understanding of the next sections.
The purpose of a TISAX assessment is to determine whether your information security management system fulfils a defined set of requirements. The audit provider checks whether your information security management system “conforms” to the requirements.
Step 1: The checks are made for each applicable requirement individually.
If your approach “conforms” to all requirements, you pass the assessment and receive the TISAX labels that correspond with your assessment objectives.
Everything below full or ideal conformity to the requirements is called a finding. TISAX differentiates four types of findings:
No. | Type | Definition | Reaction | Examples |
---|---|---|---|---|
1. |
Major non-conformity |
A major non-conformity:
|
You have to:
|
|
2. |
Minor non-conformity |
A minor non-conformity:
|
You have to:
|
|
3. |
Observation |
An observation is a non-compliance with the requirements our your own policies that does not create an immediate risk to your information security but may do so in the future. |
You have to:
|
n/a |
4. |
Room for improvement |
A deviation that does not belong to aforementioned types and does not create a risk to your information security, yet offers obvious room for improvement. |
You can decide whether or how to address this type of finding. |
n/a |
Step 2: All results of the previous “per-requirement” step are merged into the overall assessment result.
The overall assessment result can be:
-
Conform
The overall assessment result is “conform”. All requirements are fulfilled. -
Minor non-conform
The overall assessment result is “minor non-conform” if you have at least one “minor non-conformity” for a requirement. -
Major non-conform
The overall assessment result is “major non-conform” if you have at least one “major non-conformity” for a requirement.
(Without an approved corrective action plan, every non-conformity results in an overall assessment result of “major non-conform”.)
If your overall assessment result is:
-
“minor non-conform”, you can receive temporary TISAX labels until all non-conformities are resolved.
-
“major non-conform”, you have to resolve the respective issue first before you can receive any TISAX labels.
With appropriate compensating measures and corrective actions approved by the audit provider it is possible to change your overall assessment result from “major non-conform” to “minor non-conform” and thus receive temporary TISAX labels.
It is important to understand that your overall assessment result will improve during the course of the entire TISAX assessment process.
Please consider this oversimplified example: You may have an overall assessment result of “major non-conform” after the initial assessment. Afterwards you mitigate the corresponding risk. That changes your overall assessment result from “major non-conform” to “minor non-conform”. And once the risk is eliminated, your final overall assessment result will be “conform”.
All this will be explained below in much more detail. And you can find more about TISAX labels further down in Section 5.4.14, “TISAX labels”.
5.4.6. Your preparation for the TISAX assessment process
The audit provider will prepare the assessment based on your self-assessment. Therefore, please consider that you have to make your self-assessment available to your audit provider ahead of time. The exact delivery deadlines are agreed upon in the kick-off meeting.
A well-prepared audit provider will reduce the time required for the assessment. Besides the self-assessment, he will also request related documentation prior to the assessment. This can be documentation you referenced in the self-assessment and other documentation the audit provider considers relevant.
Based on this information, your audit provider will plan the assessment procedure.
5.4.7. Initial assessment
This is the first TISAX assessment and marks the formal start of the TISAX assessment process.
|
Important note: The initial assessment marks the start of two important periods:
Both periods start on the day of the closing meeting of the initial assessment. |
|
Please note: Besides the two periods described above, there are no other time constraints. For example, neither completing the online registration process nor contacting our audit providers or even conducting the kick-off meeting triggers any deadlines. It is up to you to start with the initial assessment. |
5.4.7.1. The first formal opening meeting
Like all TISAX assessments, the initial assessment starts with a formal opening meeting. The formal opening meeting is usually done with a conference call or web conference. For small companies, possibly with some experience from other audits, this doesn’t take long.
The purpose of this meeting is to:
-
check assessment prerequisites
-
introduce the assessment project leader and the assessment team
-
plan the assessment
5.4.7.2. Assessment procedure
According to the prepared plan, the audit provider conducts the initial assessment. How this will look in detail depends on your assessment objectives. The assessment mainly consists of conference calls, on-site interviews and on-site inspections in varying degrees of depth[23].
The audit provider presents all his findings during the initial assessment.
5.4.7.3. Closing meeting
In the closing meeting, your audit provider again summarises all his findings.
5.4.7.4. TISAX assessment report
After the closing meeting, the audit provider prepares and sends you the draft version of the “TISAX assessment report”. You can voice objections if you think the audit provider misunderstood something.[24] Then the audit provider issues the “TISAX assessment report”.
At this stage, the current overall assessment result will either be:
-
Conform, or
-
Major non-conform
Having unaddressed (minor) non-conformities always results in an overall assessment result of “major non-conform”. Your overall assessment result can only be “minor non-conform” once you defined actions that will implement measures to address the non-conformities.
For more information on how to achieve this, please refer to Section 5.4.9.4, “Temporary TISAX labels”.
If your overall assessment result is “conform” right at the initial assessment, you can skip the rest of the assessment section and proceed to the exchange of your result.
If your overall assessment result is “major non-conform”, your next task is to work out a plan for how to address the findings and how to close any gaps the audit provider found. The plan is officially called the “corrective action plan”.
|
Please note: If, before of the assessment starts, you are aware of a situation that will result in a non-conformity, and you won’t be able to fix it before the assessment, you could already plan a corrective action (including an implementation date) and present it to the audit provider during the assessment. This, theoretically, could lead to an overall assessment result of “minor non-conform”. However, this would be a rare situation. |
5.4.8. Corrective action plan preparation
Your “corrective action plan” defines how you plan to address the findings of the initial assessment. Your audit provider will assess the appropriateness of your “corrective action plan” (see next section).
For creating your “corrective action plan”, you should consider the following requirements:
-
Finding
-
You need to state which finding the corrective action addresses.
-
-
Root cause
-
You need to identify and state the root cause of the finding.
-
-
Corrective actions
-
For each non-conformity you need to define one or more “corrective actions”, which will implement measures that address the non-conformity.
-
-
Implementation date
-
You need to define an implementation date for each corrective action.
-
The implementation period should provide sufficient time to thoroughly implement the measures.
-
-
Compensating measures
-
For all non-conformities that create critical risks, you need to define compensating measures that address the non-conformities until the corrective actions are implemented.
-
-
Implementation period
-
For all corrective actions that take longer than three months to implement, you need to justify the implementation period.
-
For all corrective actions that take longer than six months, you additionally need to provide evidence that shows that a faster implementation is not possible.
-
The implementation period for any corrective action can’t be longer than nine months.
-
Once your corrective action plan is complete, you can request the “corrective action plan assessment”.
|
Important note: We recommend starting with the implementation as soon as possible. There is no need to wait for the result of the “corrective action plan assessment”. |
|
Please note: TISAX only has requirements with regards to content, not regarding the form of corrective action plans. |
5.4.9. Corrective action plan assessment
The purpose of the “corrective action plan assessment” is to verify that your “corrective action plan” (see above) fulfils the TISAX requirements.
You submit your “corrective action plan” to your audit provider. Your audit provider assesses the plan according to the requirements (see below). If your plan fulfils the requirements, your audit provider will issue the updated “TISAX assessment report”.
This assessment usually doesn’t take long. In most cases, this will be a conference call or web conference. Sometimes it’s even done just by email.
5.4.9.1. Reasons for a corrective action plan assessment
Reasons for a “corrective action plan assessment” are:
-
Remaining non-conformities after
-
an initial assessment
-
a follow-up assessment
-
a scope extension assessment
-
-
A “corrective action plan” that already has been assessed, but did not fulfil the requirements
-
The influencing factors on which the calculation of the implementation periods of a corrective action plan are based have changed
5.4.9.2. Combination with initial assessment
The “corrective action plan assessment” is not necessarily an independent event. You have the option to already present your “corrective action plan” during the closing meeting of the initial assessment. The audit provider can then directly conduct the “corrective action plan assessment”.
If you combine the “corrective action plan assessment” with the initial assessment, and your “corrective action plan” fulfils the requirements, you can agree with the audit provider that you don’t need an “initial assessment report”. Instead, your audit provider would just prepare the “corrective action plan assessment report”. This report allows you to directly receive temporary TISAX labels.
5.4.9.3. Corrective action plan requirements
The audit provider assesses your “corrective action plan” against the following requirements:
-
Measures are appropriate
-
The audit provider will assess the appropriateness of a corrective action based on whether it will resolve the root cause for the non-conformity.
-
-
Critical risks are mitigated with appropriate compensating measures[25]
-
Implementation periods are appropriate
-
Implementation periods start on the day the initial assessment was concluded
-
-
No implementation period is longer than:
-
three months without additional justification
-
six months without additional justification and evidence
-
nine months
-
5.4.9.4. Temporary TISAX labels
If your overall assessment result is “minor non-conform”, you receive temporary TISAX labels.
The benefit of temporary TISAX labels is that your partner generally accepts them under the condition that you later receive permanent TISAX labels. This may help you if proving the effectiveness of your information security management system to your partner is urgent.
The prerequisite for temporary TISAX labels is a corrective action plan assessment report with the overall assessment result “minor non-conform”.
Temporary TISAX labels are equal to permanent TISAX labels. The only difference is the shorter validity period of temporary TISAX labels.
Temporary TISAX labels can be valid for up to nine months after the closing meeting of the initial assessment. The validity period of the temporary TISAX labels is determined by the longest implementation period of the corrective actions.
Examples:
-
You have only one non-conformity. You have to do a policy review. The associated implementation period is two months.
Then your temporary TISAX labels are valid for two months. -
You have the non-conformity of the aforementioned policy review. On top, you have a non-conformity where you have to build a new outer wall as a corrective action. Due to the time it takes to obtain the required approvals from the municipality, the associated implementation period is eight months.
Then your temporary TISAX labels are valid for eight months.
For more information on the requirements for implementation periods, please refer to Section 5.4.9.3, “Corrective action plan requirements”
|
Please note: The “corrective action plan assessment” is optional. You can proceed straight to the follow-up assessment if you:
|
Once you’ve completed all corrective actions, you should request the “follow-up assessment”.
5.4.10. Follow-up assessment
The purpose of the “follow-up assessment” is to assess whether all previously identified non-conformities are resolved. Usually you request the follow-up assessment once you are sure that all non-conformities are resolved.
But you can have as many follow-up assessments as you need. If during a follow-up assessment your audit provider still attests existing or even new non-conformities, you simply update your corrective action plan and start this part of the assessment process again.
This assessment can be a physical meeting as well as a conference call or web conference.
5.4.10.1. Timing
Your audit provider can conduct the follow-up assessment(s) within up to nine months after the conclusion of the initial assessment[26].
5.4.10.2. Prerequisites
If you don’t need temporary TISAX labels, you can directly request a follow-up assessment. You don’t need to have a “corrective action plan assessment” prior to a follow-up assessment.
5.4.10.3. Expiration of temporary TISAX labels
In case you need temporary TISAX labels, you may want to ensure there is no gap to receiving the permanent TISAX labels. We therefore recommend requesting your follow-up assessment well ahead of the latest possible date[27]. The reason is that you want to have enough buffer time to address any minor findings identified during a follow-up assessment.
5.4.11. TISAX assessment process diagram
The previous sections are now summarised in the following process diagram:
5.4.12. Assessment ID
Each TISAX assessment of an assessment scope is identified by an “Assessment ID”. This ID refers to your assessment result and the corresponding TISAX assessment report.
This is what the Assessment ID looks like:
The Assessment ID is typically used when your audit provider communicates with you.
5.4.13. TISAX assessment report
The “TISAX assessment report”:
-
is (updated and) issued after each TISAX assessment.
-
documents your audit provider’s findings.
-
contains the overall assessment result (conform, minor non-conform, major non-conform).
-
contains all other information related to your TISAX assessment (such as assessment objective, scope, involved people and locations).
The “TISAX assessment report” can be of the following types (depending on the type of assessment):
-
Initial assessment report
-
Corrective action plan assessment report
-
Follow-up assessment report [28]
The “TISAX assessment report” always has the same structure[29]. Your audit provider simply extends it after each type of assessment. This means you only need to deal with the last version of the TISAX assessment report as it always contains the content of its older version(s).
The first sections of the “TISAX assessment report” is what you ultimately share with your partner.
It is one of the key features of TISAX that it is totally up to you to decide which parts of the TISAX assessment report you want to share with your partner or any other participant. The structure of the TISAX assessment report is designed to enable this kind of selective sharing. Each section expands the level of detail.
Here is what the structure of the “TISAX assessment report” looks like:
-
A. Assessment Related Information
Company name, assessment scope, Scope ID, Assessment ID, assessment level, assessment objective(s), assessment date(s), audit provider
This section does not contain any assessment result. -
B. Summarized Results
Management summary of the assessment result (conform, minor non-conform, major non-conform), number of findings, abstract categorisation of resulting risks -
C. Assessment result summary
Summary of the assessment result per chapter (for example “9 Access Control”) and per criteria catalogue (for example “Information Security”) -
D. Maturity Levels of VDA ISA (Result Tab)
Maturity level for each requirement -
E. Detailed Assessment Results
Detailed description of all findings, corresponding risk assessment results, required measures, implementation period
In the “exchange” step (detailed below) you decide up to which level your partner will have access to the content of your TISAX assessment report.
5.4.14. TISAX labels
We briefly touched on this topic in the registration preparation section. As explained, what once was an assessment objective now became a TISAX label.
The TISAX labels:
-
are the outcome of the TISAX assessment process.
-
summarise your assessment result.
-
are the statement that your information security management system fulfils a defined set of requirements.
The use of TISAX labels makes the TISAX-related communication with your partner and your TISAX audit provider easier because they refer to a defined output of the TISAX assessment process.
5.4.14.1. TISAX label hierarchy
The mapping between assessment objectives and corresponding TISAX labels is pretty straightforward. But there is another important aspect: Some TISAX labels are hierarchically linked. This means that if you receive a certain TISAX label, you automatically receive the TISAX labels “below” that particular label.
Example: If your assessment objective was “Very high availability”, you receive the corresponding TISAX label “Very high availability”. But because the assessment objective “Very high availability” is a superset of “High availability”, you automatically receive the TISAX label “High availability”, too.
This hierarchy currently exists for these TISAX labels:
-
“Info high” is a superset of “Confidential” and “High availability”.
-
“Info very high” is a superset of “Strictly confidential” and “Very high availability”.
-
“Strictly confidential” is a superset of “Confidential”.
-
“Very high availability” is a superset of “High availability”.
-
“Special data” is a superset of “Data”.
|
Please note: You may also receive TISAX labels retroactively. When we introduce a new label which is a subset of one of the TISAX labels you already received, you automatically receive the new label. Example: You received the TISAX label “Info high” at a time when the label “High availability” didn’t exist yet. When we introduced the label High availability, our system automatically assigned it to you. |
You can derive these hierarchical relationships by comparing the applicable requirements as specified in Table 8, “Applicability of requirements to the assessment objectives”.
This might not seem important for every participant. But imagine one partner requests you to show the TISAX label “Very high availability” and another one requests the TISAX label “High availability”. Then having both TISAX labels makes it easier for everyone because no one needs to understand that “High availability” is a subset of “Very high availability”. This may be particularly true for partners where having certain TISAX labels is part of rather stringent purchasing process. You surely won’t want to explain that “Very high availability” is “better” than “High availability”. You just show all your TISAX labels and the person doing the evaluation can simply check off the requirement “must have TISAX label ’High availability’“.
5.4.14.2. Validity period of TISAX labels
TISAX labels are generally valid for three years. The validity period starts at the end of the assessment process (even before the TISAX assessment report is issued).
Their validity period might be shorter if something significant regarding the TISAX assessment scope changes.
Examples: relocation of your company, new locations. (For instructions on what to do in such cases, please refer to Section 7.9.3.2, “How to request the change of a location” and Section 7.9.3.4, “How to add an additional location”.)
|
Please note: You can view your TISAX labels in the ENX portal only. They are not recorded in the TISAX assessment report. |
5.4.14.3. Renewal of TISAX labels
To keep your TISAX labels long-term, you need to renew[30] them every three years.
For this you basically need to run through the TISAX process again (register an assessment scope, get TISAX-assessed again, share your assessment result). The registration is somewhat easier as you don’t need to re-create your company as a TISAX participant. And you can of course re-use all your contacts and locations that are already stored in the TISAX database.
|
Important note: Please register a NEW scope BEFORE approaching your audit provider. Your audit provider can start a new assessment process only if you can provide a new Scope ID. In most cases, registering a new scope is easy. You just need to assign a new scope name, add contacts, select the assessment objective(s) and add locations. You can re-use contacts and locations that are already in the system from any previously registered scope. |
|
Important note: Please reuse the existing location records that you created and used during the registration of your previous scope. Don’t create a new location record with the same address. |
|
Important note: If always having valid TISAX labels during the relationship with your partner is a requirement, we strongly advise that you put a reminder in your calendar to start the necessary renewal process. We recommend starting the renewal at least one year before your TISAX labels expire. |
Now that you received your TISAX labels, you can proceed to the last step and share them with your partner.
6. Exchange (Step 3)
The estimated reading time for the exchange section is 7 minutes.
You have gone through the TISAX process so far, but your partner still has not seen any “proof” that your information security management system is capable of protecting his confidential data. This section now describes how to share your assessment result with your partner and present the requested proof.
6.1. Premise
It is one of TISAX’ key features that your assessment result is fully under your control. Without your explicit permission, all information related to your assessment is not shared with anyone.
6.2. The exchange platform
The ENX portal provides the exchange platform.
Your audit provider will upload the first two sections (A and B) of your TISAX assessment report. At this stage, the information is not available to anyone except you.
You can use the account created during the registration to access the portal and use the exchange platform.
You can access the portal at this address:
enx.com/en-US/SignIn
6.3. General prerequisites
You can share your assessment result with your partner only if these two prerequisites are fulfilled:
-
Your audit provider has submitted the assessment result to the exchange platform.
The assessment result will be available on the exchange platform usually 5-10 business days after the TISAX assessment report is issued. -
We have received your payment for the fee (if applicable).
The status of your assessment scope is “Active” when both prerequisites are fulfilled.
|
Please note: Every assessment scope goes through a life cycle. At this stage, your assessment scope must have the status “Active”. For more information on the status of an assessment scope, please refer to Section 7.5.5, “Assessment scope status “Awaiting your payment””. |
To verify whether your assessment result is ready for sharing (assessment scope status = Active), follow these steps:
-
Log in to the ENX portal.
-
Go to the main navigation bar and select “MY TISAX”.
-
From the dropdown menu, select “SCOPES AND ASSESSMENTS”.
-
Go to the table and find the table row with your assessment scope.
-
Verify that your assessment scope has the assessment scope status “Active” (column “Scope Status”).
6.4. Permanence of exchanged results
|
Important note: You can’t revoke any publication or sharing permissions. The reason is that we want that all passive participants can rely on continual access to every assessment result they received. Otherwise they would have to manage and archive the assessment results on their own. The permission remains valid for the complete validity period of your TISAX assessment. If you created a publication or sharing permission by mistake, please contact us immediately. |
6.5. Sharing levels
The sharing levels map 1:1 to the main sections A-E of the TISAX assessment report.
Main sections of the TISAX assessment report | Sharing levels on the exchange platform | |
---|---|---|
1 |
A. Assessment Related Information |
|
2 |
B. Summarized Results |
|
3 |
C. Assessment result summary |
|
4 |
D. Maturity Levels of VDA ISA (Result Tab) |
|
5 |
E. Detailed Assessment Results |
The higher the sharing level, the more detail about your TISAX assessment will be accessible for the respective participant(s).
For more details on the content of each section of the TISAX assessment report, please refer to Section 5.4.7.4, “TISAX assessment report”.
6.6. Publish your assessment result on the exchange platform
You can share your assessment result with all other TISAX participants by publishing it on the exchange platform. Doing so allows all other TISAX participants to access your assessment result up to the granted shared level.
You can only publish your assessment result if the overall assessment result is “conform”.
The sharing levels for publishing your assessment result on the exchange platform are limited to these options:
-
Do not publish (Default)
-
A. Assessment Related Information
-
A + Labels
-
A + Labels + B. Summarized Results
We recommend the sharing level “A + Labels” for this general type of publication.
|
Important note: You can publish your assessment result only if the prerequisites described in Section 6.3, “General prerequisites” are fulfilled. |
To publish your assessment result on the exchange platform, follow these steps:
-
Log in to the ENX portal.
-
Go to the main navigation bar and select “MY TISAX”.
-
From the dropdown menu, select “SCOPES AND ASSESSMENTS”.
-
Go to the table and find the table row with your assessment scope.
-
Verify that your assessment scope has the assessment scope status “Active” (column “Scope Status”).
-
Go to the end of the table row of your assessment scope and click the button with the down arrow .
-
Select “Scope Information”.
-
In the new window (“Scope Information”), select the tab “EXCHANGE”.
-
Go to the section “PUBLISHING”, open the dropdown menu, and select the desired sharing level (see recommendation above).
|
Please note: The assessment results are published on the exchange platform only. They can be accessed by other TISAX participants only. There is no public listing of all TISAX participants. Only the raw number of TISAX participants may be mentioned on the public TISAX website. |
6.7. Share your assessment result with a particular participant
Besides the aforementioned option to publish your TISAX assessment result on the exchange platform, you can share it selectively with particular TISAX participants with a higher sharing level.
In contrast to the aforementioned publication, you can share your assessment result even if the overall assessment result is (major/minor) non-conform.
Sharing assessment results is an integral part of TISAX. You only had your information security management system assessed once, but now you can share your assessment result with as many partners as you like.
The options for sharing your assessment result on the exchange platform are:
-
A: Assessment Related Information
-
A + Labels
-
A + Labels + B: Assessment Summary
-
A + Labels + B + C: Summarized Results
-
A + Labels + B + C + D: Detailed Assessment Results
-
A + Labels + B + C + D + E: Maturity Levels according to ISA
We recommend the sharing level “A + Labels” for sharing. This is sufficient for the majority of partners. You can always select a higher sharing level later.
|
Please note: Some TISAX participants process the assessment results of their partners automatically. They synchronise their own system with the ENX portal. Only assessment results shared specifically with this participant are synchronised. A publication alone, as described in Section 6.6, “Publish your assessment result on the exchange platform”, is not recognised. Among the OEMs using TISAX, BMW is an example of this. If you are a partner of BMW, please ensure to share (not just publish) your assessment result with BMW. |
6.7.1. Prerequisites
These are the prerequisites for sharing your assessment result with your partner (or any other TISAX participant):
-
You can share your TISAX assessment result only with other TISAX participants.
-
Your partner needs to be a TISAX participant.
-
You need the Participant ID of your partner.[31]
-
You need to pay the fee (if applicable).
|
Important note: You can share your assessment result only if the general prerequisites described in Section 6.3, “General prerequisites” are fulfilled. |
6.7.2. How to create a sharing permission
To share your assessment result with another TISAX participant, follow these steps:
-
Log in to the ENX portal.
-
Go to the main navigation bar and select “MY TISAX”.
-
From the dropdown menu, select “SCOPES AND ASSESSMENTS”.
-
Go to the table find the table row with your assessment scope.
-
Verify that your assessment scope has the assessment scope status “Active” (column “Scope Status”).
-
Go to the end of the table row of your assessment scope and click the button with the down arrow .
-
Select “Scope Information”.
-
In the new window (“Scope Information”), select the tab “EXCHANGE”.
-
Go to the section “SHARING” and click the button “Share”.
-
In the new window (“SHARE THIS SCOPE”), enter your partner’s Participant ID (or select him from the participant list in the neighbouring search box).
-
Select the desired sharing level.
-
Click the button “Next”.
-
Read and understand the instructions regarding the permanence of the sharing permission.
-
Mark the two “confirm” check boxes.
-
Click the button “Submit”.
Everything else is done by the exchange platform. For sharing level A and B, the information is available on the exchange platform. Your partner can now log into the ENX portal and see your shared assessment result[32].
For higher sharing levels (C-E), the exchange platform notifies your audit provider. Then your audit provider sends the information (matching the selected sharing level) to the main participant contact of your partner.
6.8. Sharing your assessment result outside TISAX
The rule[33] is that you can use the TISAX exchange platform only to let other TISAX participants know about your assessment result.
6.8.1. The reasons for the strict governing of the exchange mechanism
TISAX provides a standardised exchange mechanism for assessment results. This provides an added value in comparison to the exchange of the results of other certifications (e.g. ISO), where this happens in various ways and does not always contain all the information required for the complete picture.
OEMs in particular appreciate this standardisation. But other companies also benefit from clearly defined procedures.
6.8.2. A guide to writing about TISAX in public
While you can’t publicly write about the assessment result, you can mention your TISAX efforts. On the ENX portal, we provide advice on how to approach public statements. We also provide TISAX logos you can use.
After logging in into the ENX portal, you can access the information here:
enx.com/en-US/myenxportal/marketing/
Direct ZIP archive download (document and logos):
enx.com/en-US/myenxportal/marketing/TISAX-Trademark-and-Logos-Terms-and-Conditions.zip
In case you are wondering whether there’s a certificate you could hang on your wall:
Due to the standardised exchange process mentioned above we don’t provide such a certificate.
6.8.3. Sharing with a partner who is not yet a TISAX participant
If you want to share your TISAX assessment result with a particular partner who is a) not yet a TISAX participant and has b) not yet received TISAX labels (by going through the assessment process), you can follow these steps:
-
Instruct your partner to register as a TISAX participant.
He just has to register as a TISAX participant. He doesn’t need to continue to register an assessment scope. -
Instruct your partner to contact us.
Usually, we process a new registration only if the company also registers an assessment scope. On request by your partner, we process his registration. Thus, he will become a TISAX participant. He can now receive your TISAX assessment result through the regular exchange process.
The purpose of this approach is to ensure that your partner agrees to adhere to the “TISAX Participation General Terms and Conditions” that govern the exchange of TISAX assessment results.
Only the registration of an assessment scope incurs costs. Because registering as a TISAX participant is free, your partner can receive your assessment result for free. However, without an own assessment result, your partner can receive only up to five assessment results and can’t see any of the publications.
6.8.4. Sharing with employees of your partner who have no direct access to the ENX portal
Only those employees of your partner that have an account for our ENX portal can directly see your result. If you need to prove your TISAX labels to an employee of your partner without portal access, you can use a special PDF document for this. To obtain the document, please follow these steps:
-
Share your assessment result with your partner as described in Section 6.7, “Share your assessment result with a particular participant”.
-
Log in to the ENX portal.
-
Go to the main navigation bar and select “MY TISAX”.
-
From the dropdown menu, select “SCOPES AND ASSESSMENTS”.
-
Go to the table and find the table row with your assessment scope.
-
Verify that your assessment scope has the assessment scope status “Active” (column “Scope Status”).
-
Go to the end of the table row of your assessment scope and click the button with the down arrow .
-
Select “Scope Information”.
-
In the new window (“Scope Information”), select the tab “EXCHANGE”.
-
Go to the section “SHARING” and find the table row with the sharing permission (as created in step 1).
-
Go to the end of the table row of the sharing permission and click the button with the down arrow .
-
Select “Edit”
-
In the new window (“SHARE THIS SCOPE”), scroll to the bottom and select “Request Shared Information as PDF”.
-
Wait a moment until the document is generated.
-
Download the document (“Copy of information shared with ACME.pdf (66.84 KB)”)
7. Annexes
7.1. Annex: Example invoice
This is an example of the invoice we send.
For more information, please refer to Section 4.3.4, “Fee”.
7.2. Annex: Example confirmation email
We send the confirmation email once you completed all the mandatory steps during the online registration process.
For more information when we send this confirmation email, please refer to Section 4.5.8, “Confirmation email”.
Subject: [TISAX] Scope S3ZY5V Approved Dear John Doe Thank you for the TISAX assessment scope registration. I have carried out your scope registration and approved your scope. Attached you can find the TISAX scope excerpt including all scope information and the current TISAX audit provider list. What’s next? With the attached TISAX scope excerpt you can now request quotes from all TISAX audit providers for your scope. Assistance needed? For further questions regarding TISAX, please read the TISAX FAQs or the TISAX Participant Handbook. If you need further assistance regarding TISAX, please do not hesitate to contact the TISAX hotline via email (tisax@enx.com) or via phone (+49 69 986692-777). Kind regards, Your TISAX Team
7.3. Annex: Example TISAX Scope Excerpt
You receive the “TISAX Scope Excerpt” attached to the confirmation email.
For more information, please refer to Section 4.5.8, “Confirmation email”.
7.4. Annex: Participant status
7.4.1. Overview: Participant status
The “participant status” defines where you (as a company) are in the TISAX process.
Your “participant status” can be:
The tables in each status’ section below describe:
-
your situation
(what’s true right now when you are at this status) -
your next action
(what you need to do to progress to the next status; if applicable) -
our next action
(what we need to do to elevate your status; if applicable) -
the next status
(if applicable)
The following illustration shows the actions that lead to progress from one status to the next:
7.4.2. Participant status “Incomplete”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Incomplete |
You have not completed the TISAX registration. |
Continue at enx.com/en-US/SignIn |
We will send you a reminder by email (usually within a few days). |
7.4.3. Participant status “Awaiting approval”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Awaiting approval |
Your TISAX registration is complete. |
Wait for our next action. |
We will check and typically approve your application. |
7.4.4. Participant status “Preliminary”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Preliminary |
You have successfully completed the TISAX registration process. |
Pay the fee (if applicable). |
None |
7.4.5. Participant status “Registered”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Registered |
You have successfully completed the TISAX assessment process and received TISAX labels. |
None |
None |
(Expired) |
|
Please note: If you want to access the assessment results of your partner(s): The conceptual prerequisite for being able to receive assessment results of other participants is either:
|
7.4.6. Participant status “Expired”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Expired |
You have not paid the fee. |
None |
None |
n/a |
7.5. Annex: Assessment scope status
7.5.1. Overview: Assessment scope status
The “assessment scope status” defines where your assessment scope is regarding its life cycle.
Please be aware that the “assessment scope status” is different from the “assessment status”. For more information on the “assessment status”, please refer to Section 7.6, “Annex: Assessment status”.
Your “assessment scope status” can be:
The tables in each status’ section below describe:
-
your situation
(what’s true right now when you are at this status) -
your next action
(what you need to do to progress to the next status; if applicable) -
our next action
(what we need to do to elevate your status; if applicable) -
the next status
(if applicable)
The following illustration shows the actions that lead to progress from one status to the next:
The off-page reference “A” in the figure above links the assessment scope status “Active” with the “assessment status”. For more information on the “assessment status”, please refer to Section 7.6, “Annex: Assessment status”.
7.5.2. Assessment scope status “Incomplete”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Incomplete |
Either you have not completed the assessment scope registration. |
Continue at enx.com/en-US/SignIn |
We will send you a reminder by email (usually within a few days). |
For more information on where this status is playing a role, please refer to Section 4.5.7, “Assessment scope registration”.
7.5.3. Assessment scope status “Awaiting your order”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Awaiting your order |
You have not finished your scope registration. |
Continue at enx.com/en-US/SignIn |
We will send you a reminder by email (usually within a few days). |
For more information on where this status is playing a role, please refer to Section 4.5.7, “Assessment scope registration”.
7.5.4. Assessment scope status “Awaiting ENX approval”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Awaiting ENX approval |
Your assessment scope registration is complete. |
Wait for our next action. |
We will check and typically approve your application. |
For more information on where this status is playing a role, please refer to Section 4.5.7, “Assessment scope registration”.
7.5.5. Assessment scope status “Awaiting your payment”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Awaiting your payment |
Your assessment scope registration is complete and approved. |
Pay the fee (if applicable).
34. While at assessment scope status “Awaiting your payment” or “Registered”, “Assessment Related information” includes assessment scope location(s), assessment scope status and assessment objective(s). It doesn’t include assessment results or TISAX labels.
|
Waiting for your payment. |
For more information on where this status is playing a role, please refer to Section 4.5.8, “Confirmation email”.
7.5.6. Assessment scope status “Registered”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Registered |
Your assessment scope is registered. |
Go through the TISAX assessment process. |
None |
7.5.7. Assessment scope status “Active”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Active |
You have successfully completed the TISAX assessment process and received TISAX labels. |
Publish and share your assessment result. |
None |
For more information on publishing and sharing, please refer to Section 6, “Exchange (Step 3)”.
7.5.8. Assessment scope status “Expired”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Expired |
Either:
|
Start a new assessment scope registration. |
None |
|
|
||||
|
||||
|
||||
|
7.6. Annex: Assessment status
7.6.1. Overview: Assessment status
The “assessment status” defines where you are in the assessment process. The status changes with your progression from one assessment type to the next (like “initial assessment” to “corrective action plan assessment”).
Please be aware that the “assessment status” is different from the “assessment scope status”. For more information on the “assessment scope status”, please refer to Section 7.5, “Annex: Assessment scope status”.
Your “assessment status” can be:
The tables in each status’ section below describe:
-
your situation
(what’s true right now when you are at this status) -
your next action
(what you need to do to progress to the next status; if applicable) -
our next action
(what we need to do to elevate your status; if applicable) -
the next status
(if applicable)
The following illustration shows the actions that lead to progress from one status to the next:
The off-page reference “A” in the figure above links the assessment scope status “Active” with the assessment status “Waiting for corrective action plan assessment”. For more information on the “assessment scope status”, please refer to Section 7.5, “Annex: Assessment scope status”.
7.6.2. Assessment status “Initial assessment ordered”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Initial assessment ordered |
You have selected one of our TISAX audit providers and ordered an initial assessment. |
Continue the TISAX assessment process. |
None |
7.6.3. Assessment status “Initial assessment ongoing”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Initial assessment ongoing |
Your initial assessment has either:
|
None |
None |
Waiting for corrective action plan assessment (if applicable) |
7.6.4. Assessment status “Waiting for corrective action plan assessment”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Waiting for corrective action plan assessment |
Your audit provider has conducted an initial assessment. |
Create a corrective action plan. |
None |
Waiting for follow-up (if applicable) |
The assessment status “Waiting for corrective action plan assessment” is limited to nine months. For more information, please refer to Section 5.4.9.3, “Corrective action plan requirements”.
7.6.5. Assessment status “Waiting for follow-up”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Waiting for follow-up |
Your audit provider approved your corrective action plan. |
Request a follow-up assessment. |
None |
The assessment status “Waiting for follow-up” is limited to nine months. For more information, please refer to Section 5.4.9.3, “Corrective action plan requirements”.
7.6.6. Assessment status “Finished”
Status | Situation | Your next action | Our next action | Next status |
---|---|---|---|---|
Finished |
Your audit provider conducted a follow-up assessment. |
Publish and share your assessment result. |
None |
n/a |
7.7. Annex: The reasoning against “pre-assessments” and “gap analyses”
We generally advise against asking an audit provider to conduct a “pre-assessment” or a “gap analysis”. In almost all cases it makes more sense to start the TISAX assessment process right away.
In this section we address the most common concerns.
Do you consider a pre-assessment because:
-
You are concerned that your customer might see a potentially unfavourable assessment result?
You have full control over who sees your assessment results. It is your decision whether the audit provider uploads anything to the ENX portal. If no one should see it, no one sees it (except the auditor, of course).
Besides, the audit provider always only uploads the first two sections of the TISAX assessment report and never uploads the detailed assessment results anyway.
-
You think a pre-assessment might save money?
-
With a pre-assessment, you:
-
pay for the pre-assessment
-
may have the internal costs of fixing any non-conformities
-
pay for the full TISAX assessment (“initial assessment”)
Even if there are no findings, you always pay for two full assessments.
-
-
Starting with a TISAX assessment, you:
-
pay for the “initial assessment”
-
may have the internal costs of fixing any findings
-
may pay a lot less (compared to the initial assessment) for the so-called “follow-up assessment”, where the auditor only focusses on whether you fixed the non-conformities from the initial assessment
Even with findings, you only pay for a full assessment plus the short follow-up assessment.
-
-
-
You think you could fail the assessment with permanent consequences?
You can’t permanently fail, because you can have as many assessments as you want. If the assessment result doesn’t meet your expectations or if you fail to fix the non-conformities with corrective actions within the required nine month time period, you simply consider the failed attempt as your pre-assessment and start anew. And no one has to see the results of your first attempt. You just share the assessment result of the successful assessment.
Further considerations:
-
If the assessment result is better than expected, you may receive temporary TISAX labels. You could directly share those with your partner. This is not possible with a pre-assessment.
-
If the audit provider who conducts the pre-assessment should also conduct the TISAX assessment, he can’t consult you. Otherwise, you have to choose another audit provider for the TISAX assessment.
While most auditees don’t benefit from a pre-assessment, we want to mention the following advantages.
The auditor:
-
can focus on critical aspects where you lack confidence in your ISMS
-
can spend more time than usual and increase the insights
-
can document findings differently
After reading the sections about the TISAX assessment process, it will be even easier for you to understand our reasoning.
7.8. Annex: Custom scopes
Almost all TISAX participants choose the standard scope. However, in certain and rare circumstances you may need to choose a custom scope.
There are two types of custom scopes:
7.8.1. Custom extended scope
You can extend the scope. A custom extended scope contains MORE than the standard scope. The audit provider will perform more checks.
Purpose: A custom extended scope may be relevant if you want to use your TISAX assessment for internal purposes or outside of the automotive industry.
TISAX labels and sharing results: A custom extended scope always includes the standard scope. Therefore, a custom extended scope will receive TISAX labels[35]. Other TISAX participants will still accept the assessment result.
Description: While the standard scope has a predefined description, you need to write your own scope description if you need a custom extended scope.
7.8.2. Full custom scope
You can fully define your own scope.
Purpose: If you have locations that belong to different assessment scopes and that use services at a particular site (such as a data centre), you may use a full custom scope for those services. Thus, a TISAX audit provider can easily reuse the assessment result of the service’s full custom scope.
Example: You have many locations (possibly part of different scopes) and you have a central IT department at one of those locations. Defining a full custom scope just for the IT department may make it easier to reuse the respective assessment result in the other scopes.
TISAX labels and sharing results: Full custom scopes don’t receive TISAX labels. Your assessment result is recorded in the ENX portal with the date, validity period and whether the overall assessment result is conform or non-conform. You could share such an assessment result. But sharing an assessment result without TISAX labels will look like a “failed” assessment to most recipients. Other TISAX participants generally don’t accept assessment results of full custom scopes.
Description: As for the custom extended scope, you need to write your own scope description if you need a full custom scope.
|
Important note: To emphasize how rare the use of full custom scopes is: There is a 98% chance that your audit provider will revert your full custom scope to a standard scope. No participant ever successfully chose a full custom scope without advice from his audit provider. An assessment with a full custom scope won’t receive TISAX labels. We therefore generally advise against choosing a full custom scope — mainly because other participants generally don’t accept assessment results with full custom scopes. |
7.9. Annex: Participant data life cycle management
The following sections describe what you need to do if something related to your participant data changes.
7.9.1. Lost access to participant data (ENX portal)
If no one in your company who had access to the ENX portal and thus your participant data is left, please contact us. We will try to help you to regain access your company’s participant data.
7.9.2. Administration of contacts
Your company’s main participant contacts and all other “administrative contacts” with portal accounts can always go to the ENX portal and:
-
add new contacts
-
delete existing contacts
-
change contact details of existing contacts
7.9.2.1. How to add a new contact
To add a new contact, follow these steps:
-
Log in to the ENX portal.
-
Go to the main navigation bar and select “MY TISAX”.
-
From the dropdown menu, select “ADMINISTRATORS”.
-
Click the button “Create new TISAX Administrator”.
-
Enter the contact’s data.
-
Click the button “Save Contact”.
-
Go to the table and find the table row with the contact.
-
Go to the end of the table row of the contact and click the button with the down arrow .
-
Select “Edit TISAX Administrator”.
-
In the new window (“Edit TISAX Contact”), scroll down to the section “ENX PORTAL ACCESS”.
-
Select “Yes”.
-
In the appearing section “WEB ROLES”, click the button “Add Role”.
-
Select the role you want to assign (e.g. “TISAX Administrator”).
-
Click the button “Add Role”.
-
Click the button “Save Contact”.
7.9.2.2. How to delete an existing contact
To delete an existing contact, follow these steps:
-
Log in to the ENX portal.
-
Go to the main navigation bar and select “MY TISAX”.
-
From the dropdown menu, select “ADMINISTRATORS”.
-
Go to the table and find the table row with the contact.
-
Go to the end of the table row of the contact and click the button with the down arrow .
-
Select “Delete TISAX Administrator”.
-
In the appearing confirmation request, click the button “Delete”.
7.9.2.3. How to update details of an existing contact
To update the details of an existing contact, follow these steps:
-
Log in to the ENX portal.
-
Go to the main navigation bar and select “MY TISAX”.
-
From the dropdown menu, select “ADMINISTRATORS”.
-
Go to the table and find the table row with the contact.
-
Go to the end of the table row of the contact and click the button with the down arrow .
-
Select “Edit TISAX Administrator”.
-
Update the details.
-
Click the button “Save Contact”.
7.9.3. Administration of locations
Your company’s main participant contacts and all other “administrative contacts” with portal accounts can always go to the ENX portal and request the:
-
change of the company name
-
change of a location (move/relocation)
-
change of a street name
-
addition of a new location
We describe the necessary steps in the following sections.
|
Please note:
|
|
Important note: Once you clicked the button “Save Location” in the ENX portal, you can’t change it yourself anymore. For the situations described below, you can request changes. |
7.9.3.1. How to request the change of your company name
Your situation: |
Your company has changed its name. |
Example: |
The old company name is “ACME Tires Corporation”. |
If you want to request the change of your company’s name, please follow these steps:
-
Log in to the ENX portal.
-
Go to the main navigation bar and select “MY TISAX”.
-
From the dropdown menu, select “LOCATIONS”.
-
Go to the table and find the table row with your location.
-
Go to the end of the table row of your location and click the button with the down arrow .
-
Select “Request Change”.
-
In the new window (“Request Change”), go to the form field “Subject of the change”, open the dropdown menu and select “Company Name”.
-
Continue filling out the form
-
Submit the form
We will check your request, possibly accept the request to change the company name, and inform you once it is done.
7.9.3.2. How to request the change of a location
Your situation: |
Your company moved to a new location. |
Example: |
The old location is “ACME Corporation, Bockenheimer Landstraße 97-99, 60325 Frankfurt, Germany”. |
|
Important note: If an official authority renamed the street of your location, please refer to Section 7.9.3.3, “How to request the change of a street name” for more information. |
If one of your locations relocated to a new address, please follow these steps:
-
Create a new location:
-
Log in to the ENX portal.
-
Go to the main navigation bar and select “MY TISAX”.
-
From the dropdown menu, select “Locations”.
-
Click the button “Create TISAX Location”.
-
In the new window (“CREATE TISAX LOCATION”), fill out the form with the details of the new location.
-
Click the button “Save Location”.
-
-
Remember the “Location ID” of the newly created location. You can find the “Location ID” in the first column in the table “MY LOCATIONS”. Your audit provider needs the “Location ID” to update your assessment scope in the ENX portal.
-
Inform your audit provider about the relocation (provide the “Location ID” of the old location as well as of the new location).
Have you already completed the assessment?-
If the answer is NO, then there is nothing else to do for you regarding the change of the location.
-
If the answer is YES, then you need to request a “scope extension assessment” from your audit provider. For more information, please refer to Section 7.10, “Annex: Scope extension assessment”.
-
The audit provider will check your request and update your assessment scope in the ENX portal.
|
Please note: An audit provider can only update your assessment scope if you have already ordered the assessment from this audit provider. |
7.9.3.3. How to request the change of a street name
Your situation: |
Your location’s street name has changed. Your company is still at the same physical site. |
Example: |
The old location is “ACME Corporation, Bockenheimer Landstraße 97-99, 60325 Frankfurt, Germany”. |
If an official authority renamed the street of your location, please follow these steps:
-
Log in to the ENX portal.
-
Go to the main navigation bar and select “MY TISAX”.
-
From the dropdown menu, select “Locations”.
-
Go to the table and find the table row with your location.
-
Go to the end of the table row of your location and click the button with the down arrow .
-
Select “Request Change”.
-
In the new window (“Request Change”), go to the form field “Subject of the change”, open the dropdown menu, and select “Address”.
-
Continue filling out the form
-
Submit the form
We will check your request, possibly accept the request to change the street name, and inform you once it is done.
|
Important note: These steps only apply when your company is still at the same physical site, but an official authority changed the name of the street. |
7.9.3.4. How to add an additional location
If you open an additional location during the validity period of your existing TISAX labels, you can request a “scope extension assessment” from your audit provider.
For more information, please refer to Section 7.10, “Annex: Scope extension assessment”.
7.10. Annex: Scope extension assessment
Besides the standard assessment types described in Section 5.4.3, “TISAX assessment types”, there is another special assessment type: the “scope extension assessment”.
You can extend an existing TISAX assessment scope if want to add one or more:
-
assessment objectives, or
-
locations.
You can’t select another audit provider to conduct a “scope extension assessment”. The assessment is similar to the standard assessment types. However, your audit provider will most likely consider reusing applicable results from previous assessments.
Once the scope extension assessment is concluded without non-conformities, your audit provider will:
-
update your assessment scope in the ENX portal.
-
issue the scope extension assessment report.
A scope extension assessment does not extend the original validity period of your existing TISAX labels.
|
Please note: If the reason for the scope extension assessment is either a relocation or an additional location, you have to create the new location in the ENX portal. Please provide the “Location Excerpt” or at least the “Location ID” to your audit provider. |
7.11. Annex: ISA life cycle management
An ENX working group is maintaining the ISA.
These facts may be of interest to you:
-
The VDA officially publishes new versions.
-
The audit provider will use the ISA version that is valid when you order your initial assessment
-
By mutual agreement, you can use a newer ISA version if one is published between your order and the start of the initial assessment.
-
You can find the publication date of a given ISA version in the Excel sheet “Cover”.
-
Example:
Version: 5.0 | Revision 4 | 2021-04-16
-
7.12. Annex: Helpful documents
This section lists documents we consider helpful.
-
White paper “Harmonization of classification levels”
“This White Paper describes the Information security working group’s proposal for determining a scheme focusing on the protection objective of confidentiality; this means that information is not made accessible to unauthorized persons, organizations or processes. Additionally, the protection objectives such as availability, integrity and reliability are not the focus of this White Paper.”
Publisher: Verband der Automobilindustrie e.V. (“German Association of the Automotive Industry”)
Available languages: English, German
-
White paper “Information Security Risk Management”
“The objective of this White Paper is to inform companies in the automotive industry with regard to risk-oriented information security management and to enable those to establish an effective information security risk management. It is intended to support organizations in preparing or conducting a TISAX assessment to meet the requirements of the VDA ISA control question 1.4.1. It´s content it is to be considered as implementation recommendations, not as a mandatory requirements.”
Publisher: Verband der Automobilindustrie e.V. (“German Association of the Automotive Industry”)
Available languages: English, German
7.13. Annex: Complaint management
7.13.1. Causes for complaint
Our complaint management differentiates between these two areas:
-
ENX Association — the organisation that governs TISAX
-
Audit providers — the organisations that conduct the TISAX assessments
7.13.1.1. Complaints about ENX Association
If you have a complaint about ENX Association, please contact our “TISAX manager on duty” (see contact details below).
7.13.1.2. Complaints about audit providers
First, you should try to solve the issue directly with the auditor.
The next step should be the person responsible for TISAX at the audit provider.
Thereafter, your next contact would be the person responsible for the audit provider’s quality management.
If the issue is still unsolved, you should contact our “TISAX manager on duty” (see contact details below).
There are even options above the “TISAX manager on duty”. In such cases, you would talk to ENX Association’s managing director.
The VDA has no role in the complaint management.
|
Please note: The audit provider must inform you about your right to complain during the kick-off meeting. If he doesn’t, this would already be a reason for a complaint. |
7.13.1.3. Requirements for complaints
If you want to involve us, we need the following information:
-
Who is complaining?
-
Company name
-
TISAX Participant ID
-
Contact (name, email address, phone number)
-
-
Which assessment is it?
-
Assessment ID
-
If the assessment is not yet recorded in the ENX portal: Scope ID
-
-
Who is the audit provider?
-
Audit provider company name
-
Name of the auditor(s)
-
-
What are you complaining about?
-
General complaint about the performance of the audit provider
-
Complaint about the approach of the auditor
-
Complaint about the assessment with regards to content
-
-
For complaints about the assessment with regards to content: Which finding do you object?
-
Control (e.g. 1.6.1 "To what extent are information security events processed?")
-
Finding (full text)
-
Objection against:
-
Interpretation of the control
-
Ascertainment with regards to content (available evidence is not assessed correctly)
-
Risk assessment (appropriateness not considered)
-
-
Reasoning why you assess things differently
-
7.13.2. Contact for complaints
Please contact the “TISAX manager on duty”:
Send him an email at: |
|
Or call him at: |
You can reach him during regular business hours in Germany (UTC+01:00).
He speaks English and German.
8. Document history
Version 2.7.3
-
Section “Protection needs and assessment levels” updated (wording in paragraph “Difference between AL 2 and AL 3” clarified)
Version 2.7.2
-
Broken link fixed
Version 2.7.1
-
Two more languages (Czech, Polish) added
Verion 2.7
-
Four more languages (Japanese, Brazilian Portuguese, Italian, Korean) added
-
Language switcher for HTML versions added (in upper right-hand corner)
-
Layout of the PDF versions improved
-
Various sections updated with the two new confidentiality assessment objectives
-
Section “List of assessment objectives” updated (wording of assessment objective “Special data” corrected; note regarding the label transition added)
-
Typing errors corrected
Version 2.6
-
General note regarding the assessment objectives and labels we added in this version: In previous versions, the assessment objectives and labels had a long “official name” and a “short name” (Example: “Handling of information with high protection needs” and “Info high”). Since most people almost only used the short name, the short form is now the “official name”. The old long name is now termed “Description”. Furthermore, we use only the English official name in the ENX portal and in all translations of the TISAX participant handbook.
-
Section “List of assessment objectives” updated with the two assessment objectives “High availability” and “Very high availability” and “Figure 6. TISAX assessment objectives (table representation, long and short forms)” removed
-
Section “Assessment objectives and ISA” updated to reflect the fact that only a subset of the criteria catalogue Information Security applies to the two assessment objectives “High availability” and “Very high availability”
-
Section “Assessment objectives and their dependencies” removed
-
Section “Assessment objective selection” updated with the two assessment objectives “High availability” and “Very high availability”
-
Section “Protection needs and assessment levels” updated with the two assessment objectives “High availability” and “Very high availability” and “Table 5. Mapping of ISA criteria catalogues and protection needs to TISAX assessment objectives” removed
-
Section “Criteria Catalogues” updated with the two assessment objectives “High availability” and “Very high availability”
-
Section “Requirements” updated to reflect the fact that only a subset of the criteria catalogue Information Security applies to the two assessment objectives “High availability” and “Very high availability”
-
Section “TISAX label hierarchy” updated to reflect the fact that a hierarchy now only exists in a few cases anymore and “Figure 36. TISAX assessment objectives and TISAX labels (dependencies and hierarchy)” removed
-
Section “Annex: Helpful documents” updated to reflect changes in the links
-
Various minor clarifications and small corrections
-
Typing errors corrected
Version 2.5.1
-
Broken links fixed
Version 2.5
-
Section “Administration of locations” added
-
Section “Annex: Helpful documents” updated to reflect changes in the links
Version 2.4
-
Imprecise statement regarding the maximum duration of the TISAX assessment process removed from Section 3.1, “Overview”
-
“TISAX report” renamed to “TISAX assessment report”
-
Note regarding the differences between ISO 27001 and TISAX updated
-
Section “Scope description” updated; custom scope section moved to annex
-
“Standard scope description” updated to version 2.0
-
Section “Publication and sharing” updated with note about sharing the assessment status
-
Section “Protection needs and assessment levels” updated with content about “assessment level 2.5”, the “video-supported remote assessment method”, the differences between AL 2 and AL 3, plausibility check vs. verification
-
Link to the start of the registration process updated
-
Section “Portal account” updated to reflect the changed invitation process
-
Download links to the ISA document changed (now also available on enx.com)
-
Section “Evaluating offers” updated with a basis for cost estimates
-
Section “Kick-off meeting” added (with content moved here from section “The first formal opening meeting”)
-
Section “About conformity” updated with a new table about the four types of findings
-
Section “Initial assessment” updated with note regarding time constraints
-
Section “TISAX assessment report” updated with note regarding a pro-active corrective action plan
-
Section “Corrective action plan preparation” updated with the requirements “finding” and “root cause” and a note regarding corrective action plan templates
-
Section “Corrective action plan assessment” updated with a remark regarding email as the sole communication mode
-
Section “Prerequisites for a corrective action plan assessment” renamed to “Reasons for a corrective action plan assessment” and two reasons added
-
Section “Temporary TISAX labels” updated with examples and clarifications regarding the validity period
-
Section “TISAX report” renamed to “TISAX assessment report”
-
Section “Renewal of TISAX labels” updated with note regarding the reuse of location records in the ENX portal
-
Section “Annex: The reasoning against “pre-assessments” and “gap analyses”” added
-
Section “Annex: Custom scopes” added (“Extended scope” and “Narrowed scope” replaced with “Customer extended scope” and “Full custom scope”
-
Section “Annex: Scope extension assessment” updated with reasons and a note regarding adding location records to the participant’s ENX portal account
-
Section “Annex: ISA life cycle management” updated to reflect the current situation
-
Section “Annex: Helpful documents” updated to reflect changes in the links
-
Section “Annex: Complaint management” added
-
Phone numbers are now clickable
-
Various minor clarifications and small corrections
-
Typing errors corrected
-
Note for TISAX audit providers: This update is based on ENX doc ID 612 version 2.1
Version 2.3
-
Subtitle reworded
-
Change from Word/PDF to HTML as the primary format for the handbook
-
Further translations available (Chinese and French, see next bullet point)
-
Section “The TISAX participant handbook in other languages and formats” added
-
All links to the ENX homepage changed from "https://portal.enx.com" to "https://enx.com" (the old links still work)
-
“VDA ISA” becomes “ISA”
-
Section Section 5.2, “Self-assessment based on the ISA” updated to reflect changes introduced with ISA version 5
-
Rows of all tables listing assessment objectives reordered to match the changed order of the criteria catalogs in ISA 5
-
Figures listing assessment objectives updated to match the changed order of the criteria catalogues ISA 5
-
Section “Scope tailoring” updated (figure 6, typing error corrected, assessment objectives updated)
-
Section “Fee” updated with information about credit card payments
-
Section “TISAX assessment process diagram” updated (figure 34, reference to managed service provider removed)
-
Section “Annex: Helpful documents” updated (White Paper “Information Security Risk Management” added)
Version 2.2.1
-
Typing errors corrected
Version 2.2
-
Cover printing issue fixed
-
All links to our homepage and the downloads changed
-
We now also speak Italian
-
Section “Custom scope” extended
-
Section “Scope locations” updated
-
Assessment objectives “Connection to 3rd parties” removed; figures 7, 9, and 38 updated; tables 4, 5, 6, and 8 updated
-
Wording “with assessment level” changed to “in assessment level”
-
Reference to “TISAX activation list” in section “Protection needs and assessment levels” removed
(no longer applicable) -
Section “Assessment objectives and your own suppliers” added
-
Section “Participant contact” updated with information regarding group email addresses and inviting contacts to allow them to manage participant data in the ENX portal
-
Section “Assessment scope registration” updated with information about changes to the assessment scope
-
Section “Status information” updated (figure 12)
-
Section “Address the self-assessment result” updated with information regarding external help by third parties
-
Section “Coverage” updated with link to audit provider coverage matrix
-
Section “Requesting offers” updated
-
Section “Evaluating offers” updated with information regarding “pre-assessments”
-
Section “Renewal of TISAX labels” updated with information regarding the need to register a new scope
-
Various sub-sections of section “Exchange (Step 3)” updated to reflect interface changes in the ENX portal
-
Section “Share your assessment result with a particular partner” updated with recommendation regarding the sharing level and note regarding automated processing of shared assessment results
-
Section “Sharing your assessment result outside TISAX” added
-
Section “ISA lifecycle management” added
-
Section “Annex: Assessment scope status” updated (new status “Awaiting your order”, status “Awaiting approval” renamed to “Awaiting ENX approval”, status “Approved” renamed to “Awaiting your payment”, figure 40)
-
Section “Annex: Example confirmation email” updated
-
Section “Annex: Example TISAX Scope Excerpt” updated
-
Section “Annex: Assessment status” updated (new status “Initial assessment ongoing”, status “Waiting for follow-up assessment” renamed to “Waiting for follow-up”, figure 41)
-
Section “Annex: Volkswagen legacy assessments” (and references to it) removed (no longer relevant)
Version 2.1.2
-
Formal limit for “distance” between “your result score” and “maximum result score” corrected from 25% to 30%
Version 2.1.1
-
Typing errors corrected
Version 2.1
-
Section “Managed Service Providers” removed
-
New TISAX assessment objectives / labels (data protection labels based on GDPR; four instead of two prototype labels; Renaming: protection needs instead of protection levels; selection advice updated)
-
Updates due to changes in the ISA (version 4.0 to 4.1)
-
Reference to the new document “TISAX Simplified Group Assessment” (addendum to this handbook)
-
Suggestions for assigning location names and scope names added
-
“Registration fee” renamed to “fee”
-
Recommendation for contact deputies added
-
Selection of charging model removed