Get through the TISAX assessment process and share the assessment result with your partner

Published by

ENX Association
an Association according to the French Law of 1901,
registered under No. w923004198 at the Sous-préfecture of Boulogne-Billancourt, France

Addresses
20 rue Barthélémy Danjou, 92100 Boulogne-Billancourt, France
Bockenheimer Landstraße 97-99, 60325 Frankfurt am Main, Germany

Author

Florian Gleich

Contact

tisax@enx.com
+49 69 9866927-77

Version

Date:

2021-01-06

Version:

2.3

Classification:

Public

ENX doc ID:

602

All rights reserved by ENX Association.
ENX, TISAX, and their respective logos are registered trademarks of ENX Association.
Third party trademarks mentioned are the property of their respective owners.

1. Overview

1.1. Purpose

Welcome to TISAX, the Trusted Information Security Assessment Exchange.

One of your partners requested that you prove that your information security management complies with a defined level according to the requirements of the “VDA[1] Information Security Assessment” (ISA). And now you want to know how to fulfil this request.

The purpose of this handbook is to enable you to fulfil your partner’s request — or to have an edge by anticipating it before a partner asks for it.

This handbook describes the steps you need to take in order to pass the TISAX assessment and for sharing your assessment result with your partner.

Establishing and maintaining an information security management system (ISMS) is already a complex task. Proving to your partner that your information security management is up to the job adds even more complexity. This handbook won’t help you manage your information security. However, it aims to make the work of proving your efforts to your partner as easy for you as possible.

1.2. Scope

This handbook applies to all TISAX processes that you may be part of.

It contains all you need to know to go through the TISAX process.

The handbook offers some advice on how to deal with the information security requirements at the core of the assessment. But it does not aim to generally educate you on what you need to do to pass the information security assessment.

1.3. Audience

The main audience of this handbook are companies that need or want to prove a defined level of information security management according to the requirements of the “VDA Information Security Assessment” (ISA).

As soon as you are actively involved in TISAX processes, you will benefit from the information provided in this handbook.

Companies that are requesting their suppliers to prove defined levels of information security management will benefit, too. This handbook allows them to understand what their suppliers are required to do to fulfil their request.

1.4. Structure

We begin with a brief introduction of TISAX, then we immediately move on with instructions on HOW to do things. You will find all you need to go through the process — in the order you need to know it.

The estimated reading time for the document is 75-90 minutes.

1.5. How to use this document

Sooner or later, you will probably want to understand most of what is described in this document. To be properly prepared, we recommend reading the entire handbook.

We structured the handbook along the three main steps of the TISAX process, so you can go to the section you need and read the rest later.

The handbook uses illustrations to help you improve your understanding. The colours in the illustrations often have additional meaning. We therefore recommend reading the document on a computer screen or as a colour hard copy.

We appreciate your feedback. If you think something is missing in this handbook or is not easy to understand, please don’t hesitate to let us know. We and all future readers of this handbook will be thankful for your feedback.

If you have already used a prior version of the TISAX participant handbook, you may find some helpful notes at the end of the document in Section 8, “Document history”.

1.6. Contact us

We’re here to guide you through the TISAX process and to answer any questions you may have.

Send us an email at:

tisax@enx.com

Or call us at:

+49 69 9866927-77

You can reach us during regular business hours in Germany (UTC+01:00).

We all speak Icon of the flag of the United Kingdom English and Icon of the flag of Germany German. Two colleagues are native speakers of Icon of the flag of Italy Italian.

1.7. The TISAX participant handbook in other languages and formats

The TISAX participant handbook is available in the following languages and formats:

Language Version Format Link Size

Icon of the flag of the United Kingdom English

2.3

Online

https://www.enx.com/handbook/tisax-participant-handbook.html

n/a

Offline

https://www.enx.com/handbook/tisax-participant-handbook-offline.html

6.4 MB

PDF

https://www.enx.com/handbook/TISAX%20Participant%20Handbook.pdf

6.4 MB

Icon of the flag of Germany German

2.3

Online

https://www.enx.com/handbook/tisax-teilnehmerhandbuch.html

n/a

Offline

https://www.enx.com/handbook/tisax-teilnehmerhandbuch-offline.html

6,4 MB

PDF

https://www.enx.com/handbook/TISAX-Teilnehmerhandbuch.pdf

5,0 MB

Icon of the flag of France French

2.3 beta

Online

https://www.enx.com/handbook/tph-fr.html

n/a

Offline

https://www.enx.com/handbook/tph-fr-offline.html

7,0 MB

PDF

https://www.enx.com/handbook/tph-fr.pdf

7,0 MB

Icon of the flag of China Chinese

2.3 beta

Online

https://www.enx.com/handbook/tph-cn.html

n/a

Offline

https://www.enx.com/handbook/tph-cn-offline.html

7,0 MB

PDF

https://www.enx.com/handbook/tph-cn.pdf

7,0 MB

Icon for important admonition

Important note:

The English version is the leading version.
All other languages are translations of the English version.
In case of doubt, the English version is authoritative.

1.7.1. About the online format

Each section has a unique ID (format: ID1234).
An ID references a specific section, regardless of the language.
If you want to link to a specific section, you can:

  • right-click on the section title and copy the link, or

  • click the section title and copy the link from the address bar of your browser.

Most figures are available in a larger size than displayed here by default. Click on the figure to open the larger version.

1.7.2. About the offline format

The offline format retains most features of the online format. Most notably, the figures are embedded in the HTML file. You need only one file to use the offline format.

Compared to the online format, the offline format comes without:

  • the larger images

  • the original fonts of the online format
    Your browser’s defaults define the fonts.

1.7.3. About the PDF format

The PDF format is based on the online format. We basically use a browser to save the online format as a PDF.

If you use the PDF format on your computer, you can still click all the references. But if you print the PDF version, you won’t have things like page numbers and you will have to look up the references yourself.

2. Introduction

The following sections introduce the TISAX concept.

If you are in a hurry, you can skip them and start right away at Section 4.3, “Registration preparation”.

2.1. Why TISAX?

Or rather, why are you here?

In order to answer this question, we will start with some thoughts about doing business in general and protecting information in particular.

Imagine your partner. He has confidential information. He wants to share it with his supplier — you. The cooperation between you and your partner creates value. The information your partner shares with you is an important part of this value creation. Therefore, he wants to protect it appropriately. And he wants to be sure that you are handling his information with the same due care.

But how can he be sure that his information is in good hands? He can’t just “believe” you. Your partner needs to see some proof.

Now there are two questions. Who defines what “secure” handling of information means? And next, how do you prove it?

2.2. Who defines what "secure" means?

You and your partner are not the only ones facing these questions for the first time. Almost everyone has to find answers to them and most of the answers will share similarities.

Instead of independently creating a solution for a common problem every time, a standard way of doing it the burden of creating everything from scratch. While defining a standard is a huge effort, it is made only once and those who follow it benefit every time.

There are surely different views of what’s the right thing to do for protecting information. But due to the aforementioned benefits, most companies settle on standards. A standard is the condensed form of all proven and time-tested best practices for a given challenge.

In your case, standards like ISO/IEC 27001 (about information security management systems, or ISMS) and their implementation establish a state-of-the-art way to securely handle confidential information. A standard like this saves you from having to reinvent the wheel every time. More importantly, standards provide a common basis when two companies need to exchange confidential data.

2.3. The automotive way

By nature, industry-independent standards are designed as one-size-fits-all solutions rather than tailored to specific needs of automotive companies.

A long time ago, the automotive industry formed associations that aimed — among other goals — to refine and define standards that suit their more specific needs. The “Verband der Automobilindustrie” (VDA) is one of them. In the working group that deals with information security, several members of the automotive industry came to the conclusion that they have similar needs to tailor existing information security management standards.

Their joint efforts led to a questionnaire that covers the automotive industry’s widely accepted information security requirements. It is called the “VDA Information Security Assessment” (ISA).

With the ISA, we now have an answer to the question “Who defines what “secure” means?” Through the VDA, the automotive industry itself offers this answer to its members.

2.4. How to prove security efficiently?

While some companies use the ISA for internal purposes only, others use it to assess the maturity of the information security management of their suppliers. In some cases, a self-assessment is sufficient for the business relationship. However, in certain cases, companies conduct a complete assessment of their supplier’s information security management (including on-site audits).

Along with generally increasing awareness of the need for information security management and the spreading adoption of the ISA as a tool for information security assessments, more suppliers were facing similar requests from different partners.

Those partners still applied different standards and had varying opinions on how to interpret them. But the suppliers essentially had to prove the same things, just in different ways.

And the more suppliers were asked by their partners to prove their level of information security management, the louder their complaints grew in terms of repeat efforts. Showing auditor after auditor the same information security management measures is simply not efficient.

What can be done to make this more efficient? Wouldn’t it help if the report of any auditor could be reused for different partners?

OEMs and suppliers in the VDA working group that is responsible for maintaining the ISA listened to their supplier’s complaints. Now they offer an answer to their suppliers as well as to all other companies in the automotive industry to the question “How to prove security?”

The answer is TISAX, short for “Trusted Information Security Assessment Exchange”.

3. The TISAX process

3.1. Overview

The TISAX process usually[2] starts with one of your partners requesting that you prove a defined level of information security management according to the requirements of the “VDA Information Security Assessment” (ISA). To comply with that request, you have to complete the 3-step TISAX process. This section gives you an overview of the steps you need to take.

The 3-step TISAX process consists of the following steps:

TISAX process overview
Figure 1. TISAX process overview
  1. Registration
    We gather information about your company and what needs to be part of the assessment.

  2. Assessment
    You go through the assessment(s), which are conducted by one of our TISAX audit providers.

  3. Exchange
    You share your assessment result with your partner.

Each step consists of sub-steps. These are outlined in the three sections below and described in detail in their respective sections further down.

Icon for info admonition

Please note:

While we would certainly like to tell you how long it will take you to get your TISAX assessment result, we kindly ask for your understanding that it is not possible for us to forecast this in a reliable way. The overall duration of the TISAX process depends on too many factors. The wide variety of company sizes and assessment objectives plus the respective readiness of an information security management system make this impossible.

However, TISAX defines a maximum duration of nine months for the entire TISAX assessment process.

3.2. Registration

Your first step is the TISAX registration.

The main purpose of the TISAX registration is to gather information about your company. We use an online registration process to help you provide us this information.

It is the prerequisite for all subsequent steps. It is subject to a fee.

During the online registration process:

  • We ask you for contact details and billing information.

  • You have to accept our terms and conditions.

  • You can define the scope of your information security assessment.

For a direct start with this step, please refer to Section 4, “Registration (Step 1)”.

The online registration process is described in detail in Section 4.5, “Online registration process”. But if you want to start right away, please go to Icon of the flag of the United Kingdom enx.com/en-US/TISAX/.

3.3. Assessment

Your second step is going through the information security assessment.

There are four sub-steps:

  1. Assessment preparation
    You have to prepare the assessment. The extent of this depends on the current maturity level of your information security management system. Your preparation has to be based on the ISA catalogue.

  2. Audit provider selection
    Once you are ready for the assessment, you have to choose one of our TISAX audit providers.

  3. Information security assessment(s)
    Your audit provider will conduct the assessment based on an assessment scope that matches your partner’s requirements. The assessment process will consist of the initial audit at a minimum.
    If your company does not pass the assessment right away, the assessment process may require additional steps.

  4. Assessment result
    Once your company passes the assessment, your audit provider will provide you with the official TISAX report. Your assessment result will also receive TISAX labels[3].

For more information about this step, please refer to Section 5, “Assessment (Step 2)”.

3.4. Exchange

Your third and last step is to share your assessment result with your partner. The content of the TISAX report is structured in levels. You can decide up to which level your partner will have access.

Your assessment result is valid for three years. Assuming you are still a supplier of your partner then, you will have to go through the three-step process again[4].

For more information about this step, please refer to Section 6, “Exchange (Step 3)”.


Now that you have a fundamental idea about what the TISAX process is, you will find instructions on how to complete each step in the following sections.

4. Registration (Step 1)

The estimated reading time for the registration section is 30-40 minutes.

4.1. Overview

The TISAX registration is your first step. It is the prerequisite for all subsequent steps.

The following sections will guide you through the registration:

  1. We start with explaining an essential new term.

  2. Then we advise you on what you should do to be prepared for the online registration process.

  3. Next, we guide you through the online registration process.

4.2. You are a TISAX participant

Let us first introduce a new term that is necessary to understand. So far, you have been the “supplier”. You are here to fulfil a requirement of your “customer”. TISAX itself however does not really differentiate between these two roles. For TISAX, everyone who registered is a “participant”. You — as well as your partner — “participate” in the exchange of information security assessment results.

Register to become a TISAX participant
Figure 2. Register to become a TISAX participant

To differentiate the two roles from the beginning, we refer to you, the supplier, as “active participant”. We refer to your partner as “passive participant”. As an “active participant” you get TISAX-assessed and you share your assessment result with other participants. The “passive participant” is the one who requested that you get TISAX-assessed. The “passive participant” receives your assessment result.

Passive participant and active participant
Figure 3. Passive participant and active participant

Any company can act in both roles. You might share an assessment result with your partner, while at the same time requesting your own suppliers to get TISAX-assessed.

TISAX participants can be active and passive at the same time
Figure 4. TISAX participants can be active and passive at the same time

Requesting your own suppliers to get TISAX-assessed may even be especially advisable if your own suppliers are handling your partner’s confidential information as well.

4.3. Registration preparation

In this section, we give you recommendations on how to prepare for the registration. We describe the registration process itself in detail in Section 4.5, “Online registration process”.

Before you start going through our online registration process, we strongly recommend:

  • gathering information in advance

  • and taking some decisions.

4.3.1. The legal foundation

Typically, you need to sign two contracts. The first contract you enter is between you and ENX Association: The “TISAX Participation General Terms and Conditions” (TISAX Participant GTCs). The second contract is between you and one of our TISAX audit providers. For the registration, we will look at the first contract only.

The TISAX Participant GTCs govern our mutual relationship and your relationship with other TISAX participants. They define the rights and duties for all of us. Besides the usual clauses you will find in most contracts, they define the handling of the information exchanged and obtained during the TISAX process in detail. A key objective of these rules is to keep TISAX assessment results confidential. As all TISAX participants are subject to the same rules, you can expect appropriate protection of your TISAX assessment result by your partner (in his role as passive participant).

Quite early in the online registration process, we will ask you to accept the TISAX Participant GTCs. As this is a real contract, we recommend reading the TISAX Participant GTCs before starting the online registration process. One reason is that depending on your role in your company, you may need to obtain a clearance from an in-house or external lawyer.

You can download the “TISAX Participation General Terms and Conditions”[5] on our website at:
Icon of the flag of the United Kingdom enx.com/en-US/TISAX/downloads/

During the online registration process, we will ask you to check two mandatory checkboxes:

  • We accept the TISAX Participation General Terms and Conditions

  • We confirm knowledge of Applicant’s release of Audit Providers’ professional duties of secrecy acc. to Sec. IX.5. and X.3 of the TISAX Participation General Terms and Conditions;

We have the second checkbox because some of our TISAX audit providers are certified public accountants. They have special requirements regarding professional secrecy. You may want to pay special attention to those clauses before checking the box.

If you usually require a non-disclosure agreement (NDA) between you and anyone who handles confidential information, please examine the respective sections of our GTCs. They should address all your concerns.

Concluding the legal section, we ask for your understanding that the system depends on everyone accepting the same rules. We therefore can’t accept any additional general terms and conditions[6].

4.3.2. The TISAX assessment scope

In the second step of the TISAX process, one of our TISAX audit providers will conduct the information security assessment. He needs to know where to start and where to stop. That’s why you need to define an “assessment scope”.

The “assessment scope” describes the scope of the information security assessment. In simple terms, every part of your company that handles your partner’s confidential information is part of the assessment scope. You can consider it a major element of the audit provider’s task description. It dictates what the audit provider needs to assess.

The assessment scope is important for two reasons:

  1. An assessment result will only fulfil your partner’s requirement if the respective assessment scope covers all parts of your company that handle partner information.

  2. A precisely defined assessment scope is an essential prerequisite for meaningful cost calculations by our TISAX audit providers.

Icon for important admonition

Important note:

If your company has an ISO/IEC 27001 certification: The definition of the “TISAX assessment scope” and the scope definition required for the ISO/IEC 27001 certification are similar. The difference is that in TISAX the scope is predefined.

4.3.2.1. Scope description

The scope description defines the assessment scope. For the scope description, you have to choose one of two scope types:

  1. Standard scope

  2. Custom scope

    1. Extended scope

    2. Narrowed scope

4.3.2.2. Standard scope

The standard scope description is the basis for a TISAX assessment. Other TISAX participants only accept assessment results based on the standard scope description.

The standard scope description is predefined and you can’t change it. If you want to use a custom scope description, you can choose to either extend or narrow the scope of your assessment.

A major benefit of having a standard scope is that you don’t have to come up with your own definition.

This is the standard scope description[7]:

The standard scope comprises all processes and involved resources at the sites defined below that are subject to security requirements from partners in the automotive industry. Involved processes and resources include collection of information, storage of information and processing of information.

Examples for involved resources: Work equipment, employees, IT systems including cloud services such as infrastructure/ platform/software as a service, physical sites, relevant contractors

Examples for sites: Office sites, development sites, production sites, data centres

We strongly recommend choosing the standard scope. All TISAX participants accept information security assessment results based on the standard scope.

4.3.2.3. Custom scope

The standard scope is what almost all TISAX participants choose. However, in certain and rare circumstances you may need to choose a custom scope.

Scope types: extended scope
Figure 5. Scope types: extended scope, standard scope, narrowed scope
  1. Extended scope

    You can extend the scope. An extended scope contains MORE than the standard scope. The audit provider will perform more checks.

    Purpose: An extended scope may be relevant if you want to use your TISAX assessment for internal purposes or outside of the automotive industry.

    TISAX labels and sharing results: An extended scope always includes the standard scope. Therefore, an extended scope will receive TISAX labels[8]. Other TISAX participants will still accept the assessment result.

    Description: While the standard scope has a predefined description, you need to write your own custom scope description if you need an extended scope.

  2. Narrowed scope

    You can narrow the scope. A narrowed scope contains LESS than the standard scope. The audit provider may shorten or skip certain checks.

    Purpose: If you have locations that belong to different assessment scopes and that use services at a particular site (such as a data centre), you may use a narrowed scope for those services. Thus, a TISAX audit provider can easily reuse the assessment result of the service’s narrowed scope.

    Example: You have many locations (possibly part of different scopes) and you have a central IT department at one of those locations. Defining a narrowed scope just for the IT department may make it easier to reuse the respective assessment result in the other scopes.

    TISAX labels and sharing results: Narrowed scopes don’t receive TISAX labels. Your assessment result is recorded in the ENX portal with the date, validity period and whether the overall assessment result is conform or non-conform. You could share such an assessment result. But sharing an assessment result without TISAX labels will look like a “failed” assessment to most recipients. Other TISAX participants generally don’t accept assessment results of narrowed scopes.

    Description: As for the extended scope, you need to write your own custom scope description if you need a narrowed scope.
    Here is an example of a narrowed scope description:
    Physical security, resources and processes of the part of the data centre that are used to fulfil services of Company X[9].

    Icon for important admonition

    Important note:

    An assessment with a narrowed scope won’t receive TISAX labels. We therefore generally advise against choosing a narrowed scope — mainly because other participants usually don’t accept assessment results with narrowed scopes. Please consult your partner before choosing a narrowed scope.

4.3.2.4. Scoping

Your next task after defining the scope type is to decide which locations belong to the assessment scope.

If your company is small (one location), this is an easy task. You simply add your location to the assessment scope.

If your company is large, you should consider registering more than one assessment scope.

Having a single scope that contains all your locations has advantages:

  • You have one assessment report, one assessment result, one expiration date.

  • You can benefit from reduced costs for the assessment because a TISAX audit provider only has to assess your central processes, procedures and resources once.

But a single scope may have disadvantages such as:

  • The assessment result is only available once the TISAX audit provider has assessed all locations. This fact may be relevant if you urgently need an assessment result.

  • The assessment result depends on all locations passing the assessment. If just one location fails, you won’t have a positive assessment result.[10]

4.3.2.5. Scope tailoring

The question whether to have just one scope or several scopes is one that only you can answer. But answering the questions in the following diagram may help you decide.

Scope tailoring decision tree
Figure 6. Scope tailoring decision tree
Icon for info admonition

Please note:

Don’t let this decision intimidate you. You can change any scope as long as the audit provider didn’t conclude the assessment.

For example, during your assessment preparation you may find that the scope does not fit — and change it accordingly. Or your audit provider may recommend changing the scope during the earlier stages of the assessment.

Please note: Adding to the scope increases the fee and you won’t get a refund if you remove locations from the scope.

4.3.2.6. Scope locations

Now that you have decided which locations are part of your assessment scope, you can continue gathering some location-specific information.

For each location we ask for information like company name and address. We also ask for some additional information that allows our TISAX audit providers to get a better idea of your company structure. Your answers will be the basis of their effort estimations.

Please prepare yourself to provide the following details for each of your locations (the red asterisk * indicates mandatory information in the online process):

Table 1. Location-specific details
Field Options

Location Name *

n/a

D&B D-U-N-S NUMBER

n/a

Location Type *

Building(s) owned and used exclusively by company
Building(s) rented by company
Floor/office rented by company in a shared building
Office shared with other companies
Own Datacenter
Shared Datacenter

Passive Site Protection *

Yes
No

Industry
(Several selections possible)

Information Technology

  • ❏ IT Services

  • ❏ Telecommunication Services

  • ❏ Software Development

Management

  • ❏ Consulting

Media

  • ❏ Marketing

  • ❏ Agency

  • ❏ Printing Services

  • ❏ Photography

  • ❏ Translation Services

Research And Development

  • ❏ Vehicle Testing

  • ❏ Vehicle Simulation

  • ❏ Prototype Construction

  • ❏ Miniature Car Models

  • ❏ Development Services

  • ❏ CAx Development Services

Production

  • ❏ Production Services

  • ❏ Contract Manufacturing

  • ❏ Shop Floor

  • ❏ Logistics

Sales And Aftersales

  • ❏ Import, NSC

  • ❏ Dealership

  • ❏ Financial Services

  • ❏ Insurance

  • ❏ Claims Settlement

Other Industry
(please enter)

Employees at Location: Overall *

0
1-10
11-100
101-1.000
1.001-5.000
More than 5.000

Employees at Location: IT *

0
1-10
11-25
26-50
More than 50

Employees at Location: IT Security *

0
Part Time
1-5
6-25
More than 25

Employees at Location: Location Security *

0
Part Time
1-3
4-10
More than 10

Certifications for this Location

ISO 27001
Other (please enter)
ISAE 3402
SOC2

Icon for info admonition

Please note:

Regarding the “Industry”: Select to the best of your knowledge. There is no right or wrong when selecting from the options above. If you can’t find an option that matches your type of business, just enter the appropriate option under “Other”.

For each location you have to specify a “location name”. The purpose of the location name is to make it easier to refer to the location when you assign them to an assessment scope.

We recommend assigning location names based on the following pattern:

Pattern:

[Geographical reference]

Example:

for the fictitious company “ACME”

  • Frankfurt
    (for a location in the German city Frankfurt)

4.3.2.7. Scope name

For each scope, you have to specify a “scope name”. The purpose of the scope name is to make it easier to refer to the scope in every TISAX-related communication (e.g. with your TISAX audit provider).

You can specify any name you want. But you shouldn’t assign the same scope name for more than one scope.

When you later want to renew your TISAX assessment, you need to create a new scope (possibly identical to the current scope). We therefore recommend adding the year of the assessment to the scope name.

We recommend assigning scope names based on the following pattern:

Pattern:

[Geographical or functional reference] [Year of the assessment]

Examples:

for the fictional company “ACME”

  • 2020
    (without geographical reference if your company has just one location)

  • Frankfurt 2020
    (for a scope with several locations in the German city of Frankfurt)

  • Lower Saxony 2020
    (for a scope with all locations in the German state of Lower Saxony)

  • Germany 2020
    (for a scope with all locations in the country of Germany)

  • EMEA 2020
    (for a scope with all locations in the EMEA region (“Europe, Middle East, Asia”))

  • Prototype development 2020
    (functional reference for a scope with all locations involved in developing prototypes)

4.3.2.8. Contacts

In order to communicate with you, we collect information about contacts at your company.

We ask for at least one contact for your company as TISAX participant in general and one for each assessment scope. You have the option to provide additional contacts.

During your registration preparations, you should decide who at your company will be a contact.

We ask for the following contact details:

Table 2. Contact details
Contact detail Mandatory? Example

1.

Salutation

Yes

Mrs., Mr.

2.

Academic degree

Dr., Ph.D., other

3.

First name

Yes

John

4.

Last name

Yes

Doe

5.

Job title

Yes

Head of IT

6.

Department

Yes

Information Technology

7.

Primary phone number

Yes

+49 69 986692777

8.

Secondary phone number

9.

Email address

Yes

john.doe@acme.com

10.

Preferred language

Yes

English (default)

11.

Other languages

German, French

12.

Personal address identifier

HPC 1234

13.

Street address

Yes

Bockenheimer Landstraße 97-99

14.

Postal code

Yes

60325

15.

City

Yes

Frankfurt

16.

State/Province

17.

Country

Yes

Germany

Icon for important admonition

Important note:
 
We recommend assigning at least one alternate for each contact. If a contact is temporarily unavailable or leaves the company, someone else can manage your company’s participant data.
If you need to assign a new contact (without any other remaining valid contacts), you have to go through a complex process. Our process ensures that only persons who are legally allowed to speak for the company can approve assigning a new main contact.

4.3.2.9. Publication and sharing

The main purpose of TISAX is to publish your assessment result to other TISAX participants and to share your assessment result with your partner(s).

You can decide about the publication and sharing of your assessment result either during the registration process or at any time later.

If you are going through the TISAX process as a pre-emptive step, you can already decide to publish your assessment result to the community of TISAX participants. Otherwise, there is nothing to prepare for at this stage.

If your partner requested that you to go through the TISAX process, you need to share your assessment result sooner or later. You can already share status information with your partner during the registration. Once your assessment result is available, your partner will then automatically have the permission to access it[11].

There are two things you need to share status information:

  1. Your partner’s TISAX Participant ID

    The TISAX Participant ID identifies your partner as a TISAX participant.

    Usually, your partner should provide you his TISAX Participant ID.

    For your convenience, our registration form provides a drop-down list of Participant IDs for some companies that frequently receive shared assessment results.[12]

    But if your partner is a large OEM, sometimes departments communicate the requirement to get TISAX-assessed, while not knowing their own company’s Participant ID. In such cases you can contact us. We can provide you the Participant ID of your partner.

  2. The required sharing level

    The sharing level defines the depth to which your partner can access your assessment result.

    Either your partner requests a specific sharing level or you decide up to which level you want to grant your partner access to your assessment result.

    For more information on sharing levels, please refer to Section 6.5, “Sharing levels”.

So you may want to make sure you have this information.

Icon for info admonition

Please note:

  • You can always decide to publish your assessment result later.

  • You can always create a sharing permission for your partner later.

Icon for important admonition

Important note:

If you don’t publish your assessment result or don’t share it, no one can see your assessment result.

Icon for important admonition

Important note:

You can’t revoke publication or sharing.

For more information on publishing and sharing your assessment result, please refer to Section 6, “Exchange (Step 3)”.

4.3.3. Assessment objectives

You have to define your assessment objective(s) during the registration process. The assessment objective determines the applicable requirements that your information security management system (ISMS) has to fulfil. The assessment objective is entirely based on the type of data you handle on behalf of your partner.

In the following sections, we describe the assessment objectives and provide advice on how to select the right assessment objective(s).

The use of assessment objectives makes the TISAX-related communication with your partner and our TISAX audit providers easier because they refer to a defined input to the TISAX assessment process.

Icon for info admonition

Please note:

Some partners may request you to get TISAX-assessed with a certain “assessment level” (AL) instead of specifying an assessment objective. For more information on assessment levels, please refer to Section 4.3.3.6, “Protection needs and assessment levels” (sub-section “Additional information”).

4.3.3.1. List of assessment objectives

There are currently eight TISAX assessment objectives. You have to select at least one assessment objective. You may select more than one.

Consider your assessment objective the benchmark for your information security management system. The assessment objective is a key input for the TISAX process. All TISAX audit providers base their assessment strategy mainly on the assessment objective.

The current TISAX assessment objectives are:

Table 3. The current TISAX assessment objectives
No. Assessment objective Abbreviation

1.

Information with high protection needs

Info high

2.

Information with very high protection needs

Info very high

3.

Protection of prototype parts and components

Proto parts

4.

Protection of prototype vehicles

Proto vehicles

5.

Handling of test vehicles

Test vehicles

6.

Protection of prototypes during events and film or photo shootings

Events + Shootings

7.

Data protection
According to Article 28 (“Processor”) of the European General Data Protection Regulation (GDPR)

Data

8.

Data protection with special categories of personal data
According to Article 28 (“Processor”) with special categories of personal data as specified in Article 9 of the European General Data Protection Regulation (GDPR)

Special data

Example: If you are conducting test drives on public roads, then the assessment objective No. 7 “Handling of test vehicles” is one of your assessment objectives.

For some of the following illustrations, we will use a table representation of the eight TISAX assessment objectives. Furthermore, we will shorten the long forms for an easier visual representation.

TISAX assessment objectives (table representation
Figure 7. TISAX assessment objectives (table representation, long and short forms)
Icon for important admonition

Important note:

Within TISAX, the “assessment objective” is generally the process input. However, some partners may request you to get TISAX-assessed with a certain “assessment level” (AL).

For more information on the relationship between protection needs and assessment levels, please refer to Section 4.3.3.6, “Protection needs and assessment levels”.

4.3.3.2. Assessment objectives and ISA

Each assessment objective maps to a criteria catalogue of the ISA.

Example: Both “Information” assessment objectives with high or very high protection needs map to the criteria catalogue “Information Security” of the ISA. The Excel sheet is the same for both assessment objectives. You can distinguish the protection needs (high, very high) on the basis of the description of each requirement (under the respective subheading “Additionally in case of (very) high protection needs:”; see Section 5.2.2, “Understand the ISA document”.

For further background information on the TISAX assessment objectives regarding their relationship to the ISA criteria catalogues and the assessment levels, please refer to Section 5.2.2, “Understand the ISA document”.

4.3.3.3. Assessment objectives and TISAX labels

Your partner may speak of “TISAX labels”. “Assessment objectives” and “TISAX labels” are almost the same. The difference is that you start into the assessment process with the “assessment objectives” and if you pass the assessment you receive the corresponding “TISAX labels”.

Example: Your partner requires you to get the TISAX label “Information with high protection needs”. Then you select “Information with high protection needs” as your assessment objective.

The figure below shows you the input and output of the TISAX process:

Assessment objectives and TISAX labels
Figure 8. Assessment objectives and TISAX labels

For more information on TISAX labels, please refer to Section 5.4.13, “TISAX labels”.

4.3.3.4. Assessment objectives and their dependencies

The assessment objective “Information with high protection needs” is the minimum for a TISAX assessment. Additional assessment objectives are optional. However, depending on the information you handle, you may have to add further assessment objectives. You will find more information on which assessment objectives you may need further down.

Some assessment objectives have dependencies with other assessment objectives. Either the assessment objective “Information with high protection needs” or “Information with very high protection needs” is the basis for all other assessment objectives.

Example: If you need to achieve the assessment objective “Protection of prototype parts and components”, then you have to also automatically achieve the assessment objective “Information with high protection needs”. You will find more information about the dependencies further down.

The assessment objectives and their dependencies
Figure 9. The assessment objectives and their dependencies
4.3.3.5. Assessment objective selection

Ideally, your partner tells you precisely which assessment objectives you have to achieve.

You have to select the assessment objective based on your own judgement if:

  1. you want to get TISAX-assessed before a partner asks for it, or

  2. your partner does not tell you which assessment objective to achieve.

Icon for important admonition

Important note:

At this point, we strongly recommend considering your other partners. Are there existing partners that have the same or higher requirements? Do you expect future partners to have higher requirements?

You may want to consider selecting assessment objectives with a higher protection needs. Doing so prevents issues when other partners have higher requirements.

If you have to select the assessment objective based on your own judgement, you may find it helpful to consider the following aspects:

Table 4. Advice for selecting an assessment objective
No. Assessment objective Information

1.

Information with high protection needs
(Info high)

You may derive the protection needs (high, very high) from the document classification of your partner.

2.

Information with very high protection needs
(Info very high)

3.

Protection of prototype parts and components
(Proto parts)

For all companies that manufacture, store or use customer-provided components or parts classified as requiring protection at their own locations.

Requirements for physical security and for security considering the surrounding area, organisational requirements and specific requirements for handling prototypes are part of the assessment.

4.

Protection of prototype vehicles
(Proto vehicles)

For all companies that manufacture, store or use customer-provided vehicles classified as requiring protection at their own locations.

Requirements for physical security and for security considering the surrounding area (including the existence of protected garages and workshop areas), organisational requirements and specific requirements for handling prototypes are part of the assessment.

After a successful assessment, you automatically receive the TISAX label “Protection of prototype parts and components”.

5.

Handling of test vehicles
(Test vehicles)

For all companies that conduct tests and test drives (e.g. test drives on public roads or test tracks) with customer-provided vehicles classified as requiring protection.

Organisational requirements, specific requirements for handling prototypes incl. camouflage and handling of vehicles during test drives in public and on test tracks are part of the assessment.

Requirements for physical security and for security considering the surrounding area are not necessarily part of the assessment. If your locations are equipped accordingly, we recommend also selecting the assessment objective “Protection of prototype vehicles”.

6.

Protection of prototypes during events and film or photo shootings
(Events + Shootings)

For all companies that conduct presentations or events (e.g. market research, events, marketing events) and film and photo shootings with customer-provided vehicles, components or parts classified as requiring protection.

Organisational requirements and specific requirements for handling prototypes incl. requirements for presentations, events and film and photo shootings in protected rooms and in public are part of the assessment.

Requirements for physical security and for security considering the surrounding area are not necessarily part of the assessment. If your locations are equipped accordingly, we recommend also selecting the assessment objective “Protection of prototype vehicles”.

7.

Data protection
(Data)

If you handle personal data as a processor according to Article 28 of the GDPR, you probably have to select “Data protection”.

8.

Data protection with special categories of personal data
(Special data)

If you handle special categories of personal data (like health or religion) as a processor according to Article 28 of the GDPR, then you probably have to select “Data protection with special categories of personal data”.

Further explanations:

  • If you have precise requirements from your partner, you usually don’t need to discuss your assessment objectives with your partner. However, if you don’t have precise requirements from your partner, we strongly recommend consulting your partner before initiating the assessment process.

  • The ISA describes the implementation difference between “high” and “very high” protection needs (if there is any) for each requirement.
    For more information on this, please refer to Figure 14, “Screenshot: Main elements of the questions in the ISA criteria catalogues”.

4.3.3.6. Protection needs and assessment levels

Your partner has various types of information, of which some may deserve a higher level of protection than others. The ISA accommodates this by differentiating three “protection needs”: normal, high and very high. Your partner classifies his information and usually assigns protection needs.

The TISAX assessment objectives pair an ISA criteria catalogue with either “high” or “very high” protection needs.

Table 5. Mapping of ISA criteria catalogues and protection needs to TISAX assessment objectives
No. ISA criteria catalogue Protection needs TISAX assessment objective

1.

Information security

high

Information with high protection needs

2.

Information security

very high

Information with very high protection needs

3.

Prototype protection

high

Protection of prototype parts and components

4.

Prototype protection

high

Protection of prototype vehicles

5.

Prototype protection

high

Handling of test vehicles

6.

Prototype protection

high

Protection of prototypes during events and film or photo shootings

7.

Data protection

high

Data protection
According to Article 28 (“Processor”) of the European General Data Protection Regulation (GDPR)

8.

Data protection

very high

Data protection with special categories of personal data
According to Article 28 (“Processor”) with special categories of personal data as specified in Article 9 of the European General Data Protection Regulation (GDPR)

The higher the protection needs, the more your partner is interested in making sure that it is safe to let you handle theor information. Therefore, TISAX differentiates three “assessment levels” (AL). The assessment level defines the depth to which our TISAX audit providers have to look and which audit methods they have to apply. Simplified, this means a higher assessment level results in a higher assessment intensity and the use of more enhanced assessment methods.

Table 6. Mapping of the TISAX assessment objectives to assessment levels
No. TISAX assessment objective Assessment level (AL)

1.

Information with high protection needs

AL 2

2.

Information with very high protection needs

AL 3

3.

Protection of prototype parts and components

AL 3

4.

Protection of prototype vehicles

AL 3

5.

Handling of test vehicles

AL 3

6.

Protection of prototypes during events and film or photo shootings

AL 3

7.

Data protection
According to Article 28 (“Processor”) of the European General Data Protection Regulation (GDPR)

AL 2

8.

Data protection with special categories of personal data
According to Article 28 (“Processor”) with special categories of personal data as specified in Article 9 of the European General Data Protection Regulation (GDPR)

AL 3

Assessment level 1 (AL 1):

Assessments in assessment level 1 are mainly for internal purposes in the true sense of a self-assessment.

For an assessment in assessment level 1, an auditor checks for the existence of a completed self-assessment. He does not assess the content of the self-assessment. He does not require further evidence.

Results of assessments in assessment level 1 have a low trust level and are thus not used in TISAX. But it is of course possible that your partner may request such a self-assessment outside of TISAX.

Assessment level 2 (AL 2):

For an assessment in assessment level 2, the audit provider does a plausibility check on your self-assessment (for all locations within the assessment scope). He supports this by checking evidence[13] and conducting interviews with you and further colleagues.

The audit provider does the interviews generally via audio conference. At your request, he can conduct the interviews in person.

Assessments in assessment level 2 generally do not include an on-site inspection. However, assessments always include an on-site inspection if you have selected one of the “prototype” assessment objectives.

If you have evidence you don’t want to send to the audit provider, you can request an on-site inspection. In this way, the audit provider can still check your “for your eyes only” evidence.

Assessment level 3 (AL 3):

For an assessment in assessment level 3, the audit provider does all the checks as for an assessment in assessment level 2. However, all checks will be more comprehensive, and he will thoroughly verify your self-assessment result in an in-depth on-site inspection and face-to-face interviews.

The following table provides a simplified overview of the audit methods associated with each assessment level:

Table 7. Applicability of assessment methods to different assessment levels
Assessment method Assessment level 1
(AL 1)
Assessment level 2
(AL 2)
Assessment level 3
(AL 3)

Self-assessment

Yes

Yes

Yes

Evidence

No

Plausibility check

Thorough verification

Interviews

No

Via audio conference[14]

In person, on site

On-site inspection

No

At your request

Yes

Additional information:

  • Information classification and protection needs
    The mapping of information classification (such as confidential or secret) to protection needs can be different for various partners. Therefore, as much as we would like to, we can’t provide you a simple table where the information classification of your partner exactly maps to a protection need.

  • Just knowing an assessment level is not enough
    Some partners may request you to get TISAX-assessed with a certain assessment level. Please understand that just knowing the assessment level is not sufficient to start the TISAX process. An assessment level only makes sense in combination with a ISA criteria catalogue and a corresponding protection need. Usually, partners request you to achieve a TISAX label (criteria catalogue plus protection need). However, as protection needs map 1:1 to assessment levels, it is sufficient if you know the criteria catalogue(s) plus the assessment level.

  • Assessment level hierarchy
    Higher assessment levels always include lower assessment levels. For example, if your assessment is based on assessment level 3, it will automatically fulfil all requests for assessment level 2.

  • Our recommendation regarding assessment levels
    If you have to select an assessment objective (and thus implicitly a corresponding assessment level) based on your own judgement, we recommend selecting assessment objectives that imply an assessment level 3. The efforts for TISAX assessments in assessment level 3 are not generally higher than those in assessment level 2.
    Suppliers that have several partners often select assessment objectives that imply an assessment level 3. In this way, they are prepared for all future requests and don’t have to bother with different assessment levels.

  • Further commercial considerations
    Regarding assessment levels, the total cost of a TISAX assessment consists of the sum of your internal efforts and the cost of the assessment. While the cost of an assessment in assessment level 2 is lower, your internal efforts may be higher. This is due to the fact that an assessment in assessment level 2 usually requires a more comprehensive self-assessment and a better internal documentation. For assessments in assessment level 3, showing things together with some basic documentation is often enough evidence for the auditor. But without an on-site inspection, the auditor will request precise documentation. Therefore, choosing assessment level 3 over assessment level 2 is not uncommon. But it is a choice made by smaller rather than larger companies.

4.3.3.7. Assessment objectives and your own suppliers

TISAX does not necessarily require you to subject all of your own suppliers to the same requirements. If your assessment objective is “Information security with very high protection needs”, this does NOT automatically mean that your own suppliers have to achieve the same assessment objective. It does not even mean they need to have TISAX labels at all.

But you still have to check for all of your suppliers whether using their services increases risks or introduces new risks.

Two very simplified examples:

  1. You have a policy that regular email can’t be used for data with very high protection needs. Therefore, your email provider does not need to achieve the TISAX label with very high protection needs.
    You could come to a similar conclusion if you send only encrypted emails and the email provider can’t see any of the data with very high protection needs.

  2. You dispose of printed data with very high protection needs in the shredder. In such a case, of course, the waste disposal service provider does not have to meet the same requirements as you.

However, the risk assessment may show that your supplier also has to meet the requirements for very high protection needs. In this case, TISAX labels are an option to prove this to you accordingly.

4.3.4. Fee

We raise a fee. Our price list informs you about applicable fees, possible discounts and our payment terms.

You can download the price list on our website at:
Icon of the flag of the United Kingdom enx.com/en-US/TISAX/downloads/
Direct PDF download:
Icon of the flag of the United Kingdom enx.com/tisaxgtcen.pdf

There are some invoice-related aspects you should consider during your registration preparations:

  • Invoice address selection
    By default, we will send the invoice to the address you provided as your participant location. But you have the option of providing a different address for receiving the invoice.
    Please consider thoroughly checking the invoice address. Accounting laws require that the address on our invoice exactly matches your company’s (invoice) address.

  • Changing the invoice address
    In contrast to all other information you provide, we can’t change the invoice address once you have selected it in the process. Please contact us if you need to receive the invoice at another address.
    Please note: Should you pause and resume the registration process before you have selected an invoice address, you won’t be able to do this later. We will notice missing invoice addresses, contact you in order to obtain this information, and add it for you.

  • Order reference
    If you need to see a specific purchase order number or something similar on our invoice, then you have the option to provide us an order reference.

  • VAT number
    All our charges are subject to German value added tax (VAT) if applicable.
    We need this number for processing payments from the EU. It is mandatory to provide a VAT number, if your invoice address is in one of the following countries:
    Austria, Belgium, Bulgaria, Croatia, Cyprus (Greek part), Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Slovakia, Slovenia, Spain, Sweden, United Kingdom

  • Supplier management

    Icon for important admonition

    Important note:

    Please understand that due to the mutuality between all TISAX participants, we can’t accept any additional terms (such as general purchasing terms, codes of conduct).

Additional information about our invoicing process:

  • We can’t accept individual purchasing terms.

  • We accept:

    • money transfers into the bank account specified on the invoice

    • credit card payments (during the registration process via our payment service provider “Stripe”)

  • Our invoice will contain the following references to your registration:

    • The name and email address of your main participant contact

    • The assessment scope name

    You can find an example invoice in the appendix in Section 7.1, “Annex: Example invoice”.

  • We provide most facts you would typically require for processing our invoice directly on it. These and even more facts are available in our document “Information for Members and Business Partners”. Send us an email and we send you a current version.

Icon for info admonition

Please note:

We are aware that sometimes a company’s internal payment approval process is rather lengthy. Therefore, your immediate next step in the TISAX process does not depend on us receiving the payment. But please be aware that you can’t share your assessment result if we haven’t received your payment.
For this reason, we recommend you ensure that we send our invoice to the appropriate recipient and that it contains an order reference if applicable. You may also want to track internally whether someone paid the invoice.

Icon for important admonition

Important note:

We — ENX Association — invoice the fee. It is only a part of the total cost of a TISAX assessment. Your TISAX audit provider invoices the costs for the assessment(s).

For more information on audit provider-related costs, you may want to refer to Section 5.3.4, “Evaluating offers”.

Icon for important admonition

Important note:

The fee is due regardless whether you:

  • continue the TISAX process or not.

  • successfully pass the TISAX assessment process.

Therefore, the invoice may arrive before you’ve started the initial assessment.

4.4. ENX portal

The next section will describe the online registration process where you enter all the data you gathered as advised in the previous section. Before you start the online registration process, please let us briefly explain the purpose and benefits of the ENX portal.

The ENX portal allows us to maintain a database of all TISAX participants and it plays an important role throughout the entire TISAX process. During the TISAX registration you enter your data which the TISAX audit providers can then use (if you agree) to calculate their offers and to plan the assessment procedures. Once you go through the TISAX assessment process, you will use the exchange platform on the ENX portal to share your assessment result with your partner.

The portal’s name is “ENX portal” instead of “TISAX portal”, because we also use the portal to manage other business activities (like the ENX network).

4.5. Online registration process

If you prepared according to our advice above (Section 4.3, “Registration preparation”), you are ready to start the online registration process.

4.5.1. Time required

How long it will take you depends heavily on the number of scopes and locations you register. For a registration as participant with one scope with one location, you should expect a minimum time of 20 minutes.

We recommend completing the registration in a single session, because currently you can’t easily catch up some steps later. Should you still need to pause, we will contact you to request any missing data.

4.5.2. Start here

Please start your registration on our website at:
Icon of the flag of the United Kingdom enx.com/en-us/Account/Login/Register/

Basically, all you need to do is follow the on-screen instructions. Nevertheless, we briefly describe the process below.

4.5.3. Portal account

Your first step is to create an account for yourself in the ENX portal. This is a purely administrative task. You need the portal account to be able to manage your company’s “participant data”.

By creating this account, you don’t automatically become an official TISAX contact inside your company[15]. Right now, you are just filling out our online forms. You can define the “participant contact” and “scope contact” later in the online registration process and assign these roles to others.

Icon for info admonition

Please note:

Should the ENX portal claim that your email address is already in use, please contact us. This message may indicate that for some other reason you are already stored in our system.

Icon for info admonition

Please note:

As described, portal accounts are not necessarily “participant contacts” or “scope contacts” (see below) with an active role in the assessment process.

Vice versa, a “participant contact” or “scope contact” doesn’t automatically include the same rights to manage the participant data as with a portal account. This means, colleagues named as “participant contact” or “scope contact” can’t automatically access the participant data in the ENX portal.

If you want to assign the right to manage the participant data to a contact who you already created in the ENX portal (regardless whether you assigned him a role), please contact us. We will send an invitation email to the contact. The email contains a link that will lead to the creation of a portal account for the contact.

Please ensure you have already created the new contact before asking us to assign this right.

4.5.4. Participant registration

Your second step is to register your company as a TISAX participant. The “TISAX participant” is the company that exchanges assessment results with other participants.

4.5.5. Participant contact

We request you to specify the main participant contact.

This is the person that is generally responsible for all information security assessment topics of your company. This can be either you or someone else in your company.

The primary participant contact is usually all we need. Should you prefer to have all communication sent by us and our TISAX audit providers in the context of this registration also to other persons as well, please add additional participant contacts.

Icon for important admonition

Important note:
 
We recommend assigning at least one alternate for each contact. If a contact is temporarily unavailable or leaves the company, someone else can manage your company’s participant data.
If you need to assign a new contact (without any other remaining valid contacts), you have to go through a complex process. Our process ensures that only persons who are legally allowed to speak for the company can approve assigning a new main contact.

Icon for info admonition

Please note:

You can always add or remove contacts at a later point in time (even after completing the online registration process and even once you completed assessments).

Icon for info admonition

Please note:

You can’t use group email addresses for participant contacts (like “info@acme.com” or “IT@acme.com”).

This is in line with the ISA requirements regarding user logins.

Icon for info admonition

Please note:

You can choose if each contact should have access to your company’s participant data. Either:

  1. You just add the contact. The contact is stored in our system, but can’t login and manage any data.

  2. Or you invite the contact. Then the ENX portal sends an invitation email to the contact. The contact must follow the invitation link in the email. Once the contact has created his own personal account for the ENX portal, he can manage your company’s participant data.

4.5.6. General Terms and Conditions

Your third step is to accept the “TISAX Participation General Terms and Conditions”.

You may want to refer back to the explanatory notes in Section 4.3.1, “The legal foundation”.

4.5.7. Assessment scope registration

Your fourth step is to register the assessment scope of your information security assessment.

We ask you to:

  • assign an assessment scope name.
    We will use the “scope name” to reference to this scope in further communication.

  • choose an assessment scope type.
    (Standard, Custom)
    You may want to refer back to the explanatory notes in Section 4.3.2, “The TISAX assessment scope”.

  • specify the main scope contact.
    This is the person who is generally responsible for the assessment of a particular scope. This can be either you or someone else in your company.
    The main scope contact is usually all we need. Should you prefer to have all communication sent by us and our TISAX audit providers in the context of this particular scope also to other persons, you can add additional participant contacts.

  • select your assessment objective(s).
    You may want to refer back to the explanatory notes in Section 4.3.3, “Assessment objectives”.

  • add assessment scope location(s).
    We request that you specify all locations that are part of the assessment scope.
    You may want to refer back to the explanatory notes in Section 4.3.2, “The TISAX assessment scope”.

  • select publication and sharing levels (optional).
    You can already decide to publish your assessment result to other TISAX participants and to share your assessment result with your partner(s). Typically, you would be allowing us to at least show that your company is a participant and that you successfully passed the TISAX process.
    You can safely skip this step during your initial registration. You can always define access to your assessment result later.
    You may want to refer back to the explanatory notes in Section 4.3.2.9, “Publication and sharing”.

    Icon for important admonition

    Important note:

    You can’t revoke any publication or sharing permissions.
    For details, please refer to Section 6.4, “Permanence of exchanged results”.

  • specify who receives the invoice.
    We reuqest that you specify who will receive our invoice(s).
    You may want to refer back to the explanatory notes in Section 4.3.4, “Fee”.

Icon for info admonition

Please note:

Every assessment scope goes through a lifecycle. At this stage, your assessment scope either has the status “Incomplete”, “Awaiting your order” or “Awaiting ENX approval”.

For more information on the status of an assessment scope, please refer to Section 7.5.1, “Overview: Assessment scope status.

Icon for info admonition

Please note:

For large corporations with many locations, TISAX offers the simplified group assessment. You can consider this option if:

  • you have at least three locations in your scope[16] and

  • your information security management system is in top form and centrally organised[17].

For a simplified group assessment the initial effort is higher. However, this pays off the more locations you have.

For more information on the “simplified group assessment”, please refer to the document “TISAX Simplified Group Assessment”.

You can download the document “TISAX Simplified Group Assessment” on our website at:
Icon of the flag of the United Kingdom enx.com/en-US/TISAX/downloads/

Direct PDF download:
Icon of the flag of the United Kingdom enx.com/sga.pdf

Icon for info admonition

Please note:

Once we have registered your assessment scope, you can’t change it yourself.

If you can credibly assure us that you have NOT yet sent your “TISAX scope excerpt” to our audit providers, please contact us. We can change it for you.

If you already sent your “TISAX scope excerpt” to (one of) our audit providers, you just create the new location(s) in the ENX portal (if applicable) and discuss any changes with your audit provider. Your audit provider will conduct the assessment based on the changes. Together with the assessment result, your audit provider will then notify us about the necessary changes to the assessment scope.

Icon for info admonition

Please note:

Once you created a new location, you can’t edit it. For minor changes (change of company name, typos in street name, postal code, city, etc.), please contact us. We will do the editing for you.

Icon for info admonition

Please note:

It is not possible for you to delete an assessment scope in the ENX portal. If you created an assessment scope by mistake, please contact us. We will delete it for you.

4.5.8. Confirmation email

Once you completed all of the mandatory steps above, we will check your application. We will then send you a confirmation email.

This email has two important elements:

  • A contact list of all TISAX audit providers
    You must choose one of our TISAX audit providers to conduct an assessment of your assessment scope. You can use the contacts to request offers.
    For more information on audit provider selection, please refer to Section 5.3, “Audit provider selection”.

  • The “TISAX Scope Excerpt” as an attached PDF file

    It contains:

For an example of our confirmation email, please refer to Section 7.2, “Annex: Example confirmation email”.

For an example of the “TISAX Scope Excerpt”, please refer to Section 7.3, “Annex: Example TISAX Scope Excerpt”.

You will receive our confirmation email usually within 3 business days.

If you don’t hear from us within 7 business days, please verify that you provided all information. We will start processing your registration only when everything is complete. If you think everything is complete but we haven’t contacted you, please get in touch with us.

We send our confirmation email to the main participant contact and to all additional participant contacts.

Icon for info admonition

Please note:

Every assessment scope goes through a life cycle. At this stage, your assessment scope has the status “Approved”.

For more information on the status of an assessment scope, please refer to Section 7.5.5, “Assessment scope status “Awaiting your payment”.

The next two sub-sections provide detailed information about the purpose of your Participant ID and the Scope ID.

4.5.8.1. Participant ID

The Participant ID:

  • identifies a TISAX participant.

  • is unique for each participant.

  • is assigned by us upon completion of the registration.

  • is a prerequisite for ordering an information security assessment by any of our TISAX audit providers.

  • looks like this:

    Format of the Participant ID
    Figure 10. Format of the Participant ID[18]
Icon for info admonition

Please note:

There are two ways to find your Participant ID:

  1. Check your “TISAX Scope Excerpt”.
    Please refer to Section 4.5.8, “Confirmation email” above.
    If you don’t have your “TISAX Scope Excerpt” at hand, please contact us to obtain it.

  2. Log in to the ENX portal, go to the main navigation bar and select “DASHBOARD”. There you will find your Participant ID.

4.5.8.2. Scope ID

The Scope ID:

  • identifies an assessment scope.

  • is unique for each assessment scope.

  • is assigned by us upon completion of the registration.

  • is a prerequisite for being allowed to order an information security assessment by any of our TISAX audit providers.

  • looks like this:

    Format of the Scope ID
    Figure 11. Format of the Scope ID
Icon for info admonition

Please note:

There are two ways to find your Scope ID:

  1. Check your “TISAX Scope Excerpt”.
    Please refer to Section 4.5.8, “Confirmation email” above.
    If you don’t have your “TISAX Scope Excerpt” at hand, please contact us to obtain it.

  2. Log in to the ENX portal, go to the main navigation bar, select “MY TISAX” and then “SCOPES AND ASSESSMENTS”. There you will find your Scope ID(s).

Icon for info admonition

Please note:

Every assessment scope (identified by its Scope ID) runs through a life cycle.

For more information on the status of an assessment scope, please refer to Section 7.5, “Annex: Assessment scope status.

4.5.9. Status information

At this stage, there are two relevant statuses that we use to describe your position in the TISAX process:

  1. Participant status

  2. Assessment scope status

The following diagram illustrates the conditions that must be met to reach a certain status:

Conditions for the participant status and assessment scope status
Figure 12. Conditions for the participant status and assessment scope status

You can find the status definitions and what you need to do to progress to the next status in the annex.

For more information on the:

4.5.10. Changes of your registration information

Icon for info admonition

Please note:

For all answers regarding the data life cycle, please refer to Section 7.7, “Annex: Participant data life cycle management”. It contains instructions for cases where you want to change or update data such as your company name or your contact information.


Congratulations, you are now a registered TISAX participant. You are ready to continue with the next step in the TISAX process.

5. Assessment (Step 2)

The estimated reading time for the assessment section is 30-35 minutes.

5.1. Overview

The TISAX assessment is your second step. This is where you do most of the work of getting TISAX-assessed.

The following sections will guide you through the assessment:

  1. We start with explaining how you can use the ISA self-assessment to find out whether you are prepared for a TISAX assessment.

  2. Then we advise you how to choose one of our TISAX audit providers.

  3. Next, we describe your way through the assessment process.

  4. At the end, we explain the “process outcome”: your assessment result and the associated TISAX labels.

5.2. Self-assessment based on the ISA

To be ready for a TISAX assessment, you primarily need to have your information security management system (ISMS) in top form. To find out whether your ISMS matches the expected maturity level, you have to conduct a self-assessment based on the ISA.

The “Information Security Assessment” (ISA) is a criteria catalogue published by the “German Association of the Automotive Industry” (Verband der Automobilindustrie e.V. - VDA). It is the automotive industry’s standard for information security assessments.

The following sections focus on practical instructions for conducting a self-assessment based on the ISA.

The explanations, examples and screenshots in this handbook are based on “Version: 5.0.3” of the ISA document.

Icon for info admonition

Please note:

You will find information on changes compared with previous versions of the ISA in its Excel sheet “Change history”.

Icon for info admonition

Please note:

For information about which ISA version is applicable to your assessment when the VDA publishes a new version, please refer to Section 7.8, “Annex: ISA life cycle management”.

5.2.2. Understand the ISA document

Before you start your self-assessment, here are some explanations you may find useful. We provide these in addition to the official explanations and definitions in the ISA document, but with a focus on use for TISAX assessments.

5.2.2.1. Criteria catalogues

The ISA currently has three “criteria catalogues”[19]:

1.

Information Security

2.

Prototype Protection

3.

Data Protection

Each criteria catalogue has its own Excel sheet:

Screenshot: ISA criteria catalogues as Excel sheets
Figure 13. Screenshot: ISA criteria catalogues as Excel sheets

The core of the ISA is the criteria catalogue “Information Security”. The questions in this criteria catalogue are mandatory for all TISAX assessments.

The other criteria catalogues are optional. Their applicability depends on your assessment objective(s).

The aforementioned assessment objectives map to these criteria catalogues:

Table 8. Mapping between TISAX assessment objectives and ISA criteria catalogues
No. Assessment objective ISA criteria catalogue

1.

Information with high protection needs

Information Security

2.

Information with very high protection needs

Information Security

3.

Protection of prototype parts and components

Prototype Protection

4.

Protection of prototype vehicles

Prototype Protection

5.

Handling of test vehicles

Prototype Protection

6.

Protection of prototypes during events and film or photo shootings

Prototype Protection

7.

Data protection
According to Article 28 (“Processor”) of the European General Data Protection Regulation (GDPR)

Data Protection

8.

Data protection with special categories of personal data
According to Article 28 (“Processor”) with special categories of personal data as specified in Article 9 of the European General Data Protection Regulation (GDPR)

Data Protection

Example: If you have selected the assessment objective “Data Protection”, then you will have to answer the questions in the criteria catalogues “Information Security” AND “Data Protection”.

You may have noticed that there is more than one assessment objective per criteria catalogue. How do you know which requirements are applicable to which assessment objective?

The following table shows you which requirements are applicable:

Table 9. Applicability of requirements to the assessment objectives
No. Assessment objective Applicable requirements

1.

Information with high protection needs

  • All requirements from the criteria catalogue “Information Security” (columns “Requirements (must)” and “Requirements (should)”)

  • Plus the additional requirements in the column “Additional requirements for high protection needs” (if applicable)

2.

Information with very high protection needs

  • All requirements from the criteria catalogue “Information Security” (columns “Requirements (must)” and “Requirements (should)”)

  • Plus the additional requirements in the columns “Additional requirements for high protection needs” and “Additional requirements for very high protection needs” (if applicable)

3.

Protection of prototype parts and components

  • All requirements applicable to the assessment objective “Information with high protection needs”

  • Plus the requirements in the following chapters of the criteria catalogue “Prototype Protection”:

    • 8.1 Physical and Environmental Security

    • 8.2 Organizational Requirements

    • 8.3 Handling of vehicles, components and parts

4.

Protection of prototype vehicles

  • All requirements applicable to the assessment objective “Information with high protection needs”

  • Plus the requirements in the following chapters of the criteria catalogue “Prototype Protection”:

    • 8.1 Physical and Environmental Security

    • 8.2 Organizational Requirements

    • 8.3 Handling of vehicles, components and parts

  • Plus the additional requirements in the column “Additional requirements for vehicles classified as requiring protection” (if applicable)

5.

Handling of test vehicles

  • All requirements applicable to the assessment objective “Information with high protection needs”

  • Plus the requirements in the following chapters of the criteria catalogue “Prototype Protection”:

    • 8.2 Organizational Requirements

    • 8.3 Handling of vehicles, components and parts

    • 8.4 Requirements for trial vehicles

6.

Protection of prototypes during events and film or photo shootings

  • All requirements applicable to the assessment objective “Information with high protection needs”

  • Plus the requirements in the following chapters of the criteria catalogue “Prototype Protection”:

    • 8.2 Organizational Requirements

    • 8.3 Handling of vehicles, components and parts

    • 8.5 Requirements for events and shootings

7.

Data protection

  • All requirements applicable to the assessment objective “Information with high protection needs”

  • All requirements from the criteria catalogue “Data Protection”

8.

Data protection with special categories of personal data

  • All requirements applicable to the assessment objective “Information with very high protection needs”

  • All requirements from the criteria catalogue “Data Protection”

The screenshot below shows the main elements of the questions in each criteria catalogue. We explain all elements further down.

Screenshot: Main elements of the questions in the ISA criteria catalogues
Figure 14. Screenshot: Main elements of the questions in the ISA criteria catalogues
5.2.2.2. Chapters

Each criteria catalogue groups the questions in chapters.

Example: “4 Identity and Access Management”

The grouping is based on the various aspects of information security management systems.

5.2.2.3. Control questions

You find the questions for each criteria catalogue in the respective Excel sheets.

Example: “4.1.2 To what extent is the user access to network services, IT systems and IT applications secured?”

The control questions are also referred to as “controls”. This is “auditor speak”. The ISO standards that the ISA builds upon use the term “control”.

5.2.2.4. Self-assessment form fields

Between the columns “Maturity level” and “Control question” are form fields you need to fill in when you are conducting a self-assessment:

Table 10. Self-assessment form fields and their purpose
Form field Purpose Mandatory?

Implementation description
(Column F)

Here you should briefly describe what you implemented to address this control question in your company.

Yes

Reference Documentation
(Column G)

Here you should specify in which document(s) you prove the implementation.

Yes

Findings/Result
(Column H)

Here you can write down any findings where you think a gap exists between what should be and what is.

No

Only the brief description of your implementation and the reference to your documentation are mandatory. This information will help our TISAX audit providers to better understand your company and to prepare the assessment.

There are more optional columns to support your self-assessment:

  • Measures/recommendations (Column R)

  • Date of assessment (Column S)

  • Date of completion (Column T)

  • Responsible department (Column U)

  • Contact (Column V)

Icon for important admonition

Important note:

If you open the downloaded Excel file and select one of the criteria catalogue worksheets (e.g. Information Security), you probably won’t immediately see the self-assessment form fields. To show them, you need to click on the grouping button for level “2”[20]. The button is above and to the left of cell C1. This will expand the view to show the self-assessment form fields.

Screenshot: Excel grouping button

Another tip is to use the arrow keys to scroll down. Because due to the large size of the cells, the scrolling with the scroll bar may require excellent fine motor skills. If you use your pointing device’s scroll feature, you may also accidentally skip over some of the larger cells.

5.2.2.5. Objective

To the right of the column “Control question” is the column “Objective” (column J). Its content describes what you need to achieve regarding this aspect of your information security management.

Example (for control question 4.1.2): “Only securely identified (authenticated) users are to gain access to IT systems. For this purpose, the identity of a user is securely determined by suitable procedures.”

5.2.2.6. Requirements

The requirements are what you are expected to fulfil in order to achieve the objective.

The requirements are spread across four columns:

  1. Requirements (must) (Column K)

  2. Requirements (should) (Column L)

  3. Additional requirements for high protection needs (Column M)

  4. Additional requirements for very high protection needs (Column N)

You have to fulfil all requirements up to the protection need you need to achieve (which you can derive from your assessment objective).

For more information about the ISA definitions of the requirement levels “must” and “should”, please refer to the “Key terms” in the Excel sheet “Definitions”.

Icon for important admonition

Important note:

It is very important for you to understand that even fulfilling all the requirements does NOT automatically guarantee that the audit provider will confirm that you achieve the objective.

The requirements and their wording are based on a theoretical implementation by a fictional average company of unknown size.

The audit provider has to always weigh the objective against the unique implementation at your company. What is appropriate for the average company might not be sufficient in your particular situation.

In cases of doubt, consult our TISAX audit providers.

For more information, please refer to Section 5.2.5, “Address the self-assessment result”.

5.2.2.7. Maturity levels

The ISA uses the concept of “maturity levels” to rate the quality of all aspects of your information security management system. The more sophisticated your information security management system is, the higher your maturity level will be.

The ISA differentiates six maturity levels. You can find the detailed definition in the Excel sheet “Maturity levels”. For a consolidated view on the maturity levels, we quote the informal descriptions as provided in the ISA:

Table 11. Informal description of the maturity levels
Maturity level In one word Description

0

Incomplete

A process is not available, not followed or not suitable for achieving the objective.

1

Performed

An undocumented or incompletely documented process is followed and indicators exist that it achieves its objective.

2

Managed

A process achieving its objectives is followed. Process documentation and process implementation evidence are available.

3

Established

A standard process integrated into the overall system is followed. Dependencies on other processes are documented and suitable interfaces are created. Evidence exists that the process has been used sustainably and actively over an extended period.

4

Predictable

An established process is followed. The effectiveness of the process is continually monitored by collecting key figures. Limit values are defined at which the process is considered to be insufficiently effective and requires adjustment. (Key Performance Indicators)

5

Optimizing

A predictable process with continual improvement as a major objective is followed. Improvement is actively advanced by dedicated resources.

You have to rate the maturity level of your information security management system per question. Enter your maturity level in the column “Maturity level” (column E).

Screenshot: Example of maturity level selection in the ISA document (Excel sheet “Information Security”)
Figure 15. Screenshot: Example of maturity level selection in the ISA document (Excel sheet “Information Security”)

For more information on target maturity levels and their impact on your assessment result, please refer to Section 5.2.4, “Interpret the self-assessment result”.


With this improved understanding, you are now ready to start the self-assessment.

5.2.3. Conduct the self-assessment

Open the Excel file and go through all the control questions of each criteria catalogue applicable to your assessment objective(s) and determine the maturity level that matches the current state of your information security management system. Do this based on your own best judgement. There is no right or wrong at this stage.

Once you completed the self-assessment, the “Result” column (H) in the Excel sheet “Results (ISA5)” should be completely filled, either with numbers (0-5) or “n.a.” (as in “not applicable”).

Screenshot: Example of “Results (ISA5)” sheet in the ISA document
Figure 16. Screenshot: Example of “Results (ISA5)” sheet in the ISA document

If you have questions regarding the ISA, please contact us.

5.2.4. Interpret the self-assessment result

The next five sub-sections explain how to analyse and interpret your self-assessment result. The analysis will tell you whether you are ready or not yet ready for a TISAX assessment.

5.2.4.1. Analysis

Your result score summarises the self-assessment result.

You find the result score (“Result with cutback to target maturity level”) in the Excel sheet “Results (ISA5)” (cell D6). We will explain “cutback” soon.

Screenshot: Your result score and the maximum result score (Excel sheet “Results (ISA5)”
Figure 17. Screenshot: Your result score and the maximum result score (Excel sheet “Results (ISA5)”, cell D6 and G6)

For understanding and subsequently interpreting your self-assessment result and your result score, you need to differentiate two analysis levels:

  1. Question level
    This level has all the questions. For each question, there is a target maturity level and your maturity level.

  2. Score level
    On this level, there is the overall result that summarises the results of all the questions. There is a maximum result score and your result score.

The figure below shows the analysis levels:

Analysis of the self-assessment result on the question level and the score level
Figure 18. Analysis of the self-assessment result on the question level and the score level

The figure below shows you where to find the results on the score level and the results on the question level:

Score level and question level in the Excel sheet “Results (ISA5)”
Figure 19. Score level and question level in the Excel sheet “Results (ISA5)”

The next figure shows a simplified view of the analysis levels, the ISA target definitions and your own results:

The targets and your results on the question level and the score level
Figure 20. The targets and your results on the question level and the score level

The following sections explain the result and its analysis in detail.

5.2.4.2. The target maturity level (on question level)

The ISA defines a “target maturity level” of 3 for each question.

For more information on the definition of each maturity level, please refer to Section 5.2.2, “Understand the ISA document”.

The ISA defines the target maturity levels in the Excel sheet “Results (ISA5)” (starting at column G, row 22; see figure below).

The target maturity level definition in the Excel sheet “Results (ISA5)”
Figure 21. The target maturity level definition in the Excel sheet “Results (ISA5)”
5.2.4.3. Your result (on question level)

In order to receive TISAX labels, you usually need to have maturity levels for each question that are equal to or above the target maturity level.

Example: If the target maturity level for question X is “3”, your maturity level for that question should be “3” or higher. If your maturity level for that question is below “3”, you may not receive TISAX labels.

This has to happen for each question. If the target maturity level for two questions is “3”, you can’t compensate for a maturity level of “2” for one question with a maturity level of “4” for the other question.

The ISA document automatically transfers your maturity levels from the Excel sheet “Information Security” (column E) to the Excel sheet “Results (ISA5)” (starting at column H, row 23):

Your maturity levels in the Excel sheet “Results (ISA5)”
Figure 22. Your maturity levels in the Excel sheet “Results (ISA5)”

Your maturity level is subject to a calculation before the ISA document summarises it in your result score. Basically, your maturity level is “cut back” to the target maturity level. This is done so that questions where your maturity level is above the target maturity level don’t compensate for questions where your maturity level is below the target maturity level.

Here’s how the ISA calculates your result on the question level:

  • It takes your maturity level and compares it to the question’s target maturity level.

  • If your maturity level is above the target maturity level, it is “cut back” to the target maturity level.

  • If your maturity level is below or equal to the target maturity level, nothing happens for this question.

Example (see figure below): The target maturity level is “3”. Your maturity level is “4”. Your “cut back result” for this question will be “3”.

Cutback calculation of the result maturity level
Figure 23. Cutback calculation of the result maturity level

The figure below shows that if your maturity level is higher than the target maturity level, the ISA cuts it back (the colours green, orange and red match with the colours used in the “Result” column, see Figure 22, “Your maturity levels in the Excel sheet “Results (ISA5)””).

Cutback illustration with the colours used in the Excel sheet “Results (ISA5)”
Figure 24. Cutback illustration with the colours used in the Excel sheet “Results (ISA5)”

Below is another way to view the maturity levels on the question level. The colours of the circles illustrate the target maturity level or the “distance” to it (example: the circle is orange if the maturity level is “-1” below the target maturity level). The check marks illustrate your maturity level.

Maturity levels on question level
Figure 25. Maturity levels on question level
Icon for info admonition

Please note:

It is possible to successfully pass a TISAX assessment even if you don’t reach the target maturity level for all questions. The main question in such cases is whether you have a relevant risk. If your maturity level is below the target value, but there is no risk, this might still be sufficient.

5.2.4.4. The target (on score level)

The ISA defines an “ideal” overall maturity level — the “maximum result score” (or “Maximum score”, cell G6).

Maximum result score (Excel sheet “Results (ISA5)”)
Figure 26. Maximum result score (Excel sheet “Results (ISA5)”)

In theory, this overall maturity level is the average of all target maturity levels (on the question level). This would be a maximum result score of “3.0”.

However, it is “3.0” only if all questions apply to your situation. As soon as a question is not applicable to your situation, the average changes and the maximum result score is lower than “3.0”.

Based on a view shown further above (Figure 25, “Maturity levels on question level”), you can see below what’s put into the average for the maximum result score:

The maximum result score (on score level)
Figure 27. The maximum result score (on score level)
5.2.4.5. Your result (on score level)

Your overall result score (“Result with cutback to target maturity levels”, cell D6):

  • summarises the overall maturity level of your information security management system.

  • is the average of all your maturity levels (on question level).

  • can be below or equal to the maximum result score.

  • should be as close to the maximum result score as possible. The more your result score is below the maximum result score, the less likely it is that you will receive TISAX labels.

Your result score (Excel sheet “Results (ISA5)”)
Figure 28. Your result score (Excel sheet “Results (ISA5)”)

Again using a view shown further above (Figure 25, “Maturity levels on question level”), you can see below what’s put into the average for the result score:

Your result score (on score level)
Figure 29. Your result score (on score level)

The result score tells you whether you:

  • are ready for a TISAX assessment.

  • can expect to receive TISAX labels.

If your result score (“Result with cutback to target maturity levels”) is below “3.0”, then at least for one question your maturity level doesn’t match the target maturity level. In this case, you probably must improve your information security management system before you are ready for your TISAX assessment.

Icon for info admonition

Please note:

For the overall score, there are formal limits for an acceptable “distance” between your result score and the maximum result score (“Result with cutback to target maturity levels”).

If your result score is more than:

  • 10% below, the overall assessment result will be “minor non-conform”.

  • 30% below, the overall assessment result will be “major non-conform”.

Icon for important admonition

Important note:

Having a result score (“Result with cutback to target maturity levels”) of “3” is not a guarantee that you will pass the TISAX assessment without any prohibitive findings. Please bear in mind that the audit provider may view certain aspects differently than you do.

5.2.4.6. Are you ready?

The purpose of the analysis above is to know whether you are ready for a TISAX assessment.

You are definitely ready for a TISAX assessment if your result score (“Result with cutback to target maturity levels”) is (close to) “3.0”. In this case, all values in the “Results” column (H) are green (no orange or red).

If they are not green, you need to address your self-assessment result (please refer to Section 5.2.5, “Address the self-assessment result”).

The figure below shows the ISA spider web diagram on the Excel sheet “Results (ISA5)”. The green line marks the target maturity level per chapter. If your maturity levels are on or above that line, you are ready for a TISAX assessment. If they are below that line, this may not be sufficient to receive TISAX labels.

Screenshot: Target maturity level fulfilment in the ISA spider web diagram (Excel sheet “Results (ISA5)”)
Figure 30. Screenshot: Target maturity level fulfilment in the ISA spider web diagram (Excel sheet “Results (ISA5)”)

If you “unfold” the ISA spider web to the question level, you get a similar green/red view on the question level:

“Unfolding” the ISA spider web diagram
Figure 31. “Unfolding” the ISA spider web diagram

5.2.5. Address the self-assessment result

Your self-assessment result may show that you need to improve your information security management system before you are ready to receive TISAX labels.

For some gaps between your maturity level and the target maturity level, you may already know how to close them. For others, you might need external advice. In this case, you can ask our TISAX audit providers for consulting services. TISAX allows them to consult, but doesn’t require it. Please note that any audit provider doing consulting for you can no longer conduct TISAX assessments for you.

Icon for important admonition

Important note:

Not properly addressing the self-assessment result before getting assessed is a major stumbling block for many companies. Please don’t underestimate the effort it may take to shape your information security management system according to the requirements. Many companies need to formally set up a large project to prepare for a TISAX assessment.

Icon for info admonition

Please note:

When you’re looking for external help for getting through the TISAX process, you will find that various companies offer consulting and training services. None of these companies are associated with us.

As things currently stand, we:

  • don’t offer official trainings, either directly or through third parties.

  • don’t make any statements about the quality of third party services and therefore advise caution.

5.3. Audit provider selection

Only audit providers that we contracted can conduct TISAX assessments[21] to find out what is required to become a TISAX audit provider.]. TISAX audit providers are allowed to conduct TISAX assessments for you only if they haven’t had any previous consulting assignments with you.

All our TISAX audit providers are obliged to conduct TISAX assessments only for those companies that are registered TISAX participants.

Icon for info admonition

Please note:

Every assessment scope goes through a life cycle. At this stage, your assessment scope must have the status “Approved” or “Registered”

For more information on the status of an assessment scope, please refer to Section 7.5.5, “Assessment scope status “Awaiting your payment”.

5.3.1. Contact information

Once you are registered, you can contact all TISAX audit providers and request offers. Their contact information is provided in the registration confirmation email you received[22] (please refer to <Section 4.5.8, “Confirmation email”).

Icon for info admonition

Please note:

Please request offers from our TISAX audit providers only AFTER you are registered. The audit providers will check for an existing registration. They have to reject requests without registration.

This is also the reason why you receive the audit provider contact information only in the registration confirmation email and not from our public website.

5.3.2. Coverage

While currently many of the audit provider contacts are based in Germany, it is important to understand that all our audit providers are able to generally conduct TISAX assessments worldwide. Most of them even have their own employees in many countries.

On our website, we offer a page where you can select your country and then see which audit provider has local sales staff and/or local auditors (Icon of the flag of the United Kingdom enx.com/en-US/TISAX/xap/).

5.3.3. Requesting offers

In order to allow our TISAX audit providers to precisely calculate the expected assessment efforts, you should always include the “TISAX Scope Excerpt”.

Thumbnail of a scope excerpt (first page)
Figure 32. Thumbnail of a scope excerpt (first page)

For more information, please refer to Section 4.5.8, “Confirmation email”.

Icon for info admonition

Please note:

Impartiality is a key characteristic of our TISAX audit providers. They will ensure that no conflict of interest exits. You may want to consider this when contacting them. If your company is somehow related to an audit provider, you can’t expect to be assessed by him.

5.3.4. Evaluating offers

You can freely choose among all our TISAX audit providers. They are all bound to the same contract. They all conduct the assessments based on the same criteria and the same auditing methods. In terms of the assessment result, there won’t be a difference regardless which audit provider you choose. Your assessment result will be accepted by all TISAX participants.

Besides obvious factors such as price, reputation and likeableness, there are some aspects of an offer you can look for:

  • Availability: How soon can the assessment process start? This might be an important aspect if getting TISAX-assessed is urgent for you.

  • Travel-related costs for on-site appointments: Audit providers with offices in your country might have lower travel-related costs.

  • Language: Will you and every other interviewee in your company be able to communicate with the auditor in your native language?

  • Which assessments are included?
    For more information on assessments, please refer to Section 5.4.2, “TISAX assessment types and elements”.
    Usually, the offers include the initial assessment and the corrective action plan assessment. As the efforts for follow-up assessments are difficult to predict, they are typically offered after the other assessments are completed.

Ultimately, it will come down to trust. You will need to form a trust relationship with your audit provider as he will have quite an insight in your company.

Icon for info admonition

Please note:

We advise against asking for or ordering items like a “pre-assessment”. While we acknowledge the desire to prepare for the assessment in such a way, in almost all cases it makes more sense to start the assessment right away. In terms of price there shouldn’t be much of a difference between a “pre-assessment” and the real assessment. And for the latter you always have the chance to fix findings with corrective actions. This will become clearer once you read through the next section.

Icon for info admonition

Please note:

Every assessment goes through a life cycle.

For more information on the status of an assessment, please refer to Section 7.6, “Annex: Assessment status.

Once you’ve chosen one of our TISAX audit providers, you can finally initiate the TISAX assessment process.

5.4. TISAX assessment process

5.4.1. Overview

The TISAX assessment process consists of several types of assessments. In most cases, there will be more than one assessment.

You should view the assessment process as an interlaced sequence of steps where:

  • You prepare your information security management system to be in top form.

  • The audit provider checks whether your information security management system fulfils a defined set of requirements. He may find gaps.

  • You then close the gaps within defined periods.

  • The audit provider then checks again whether you closed the gaps.

These alternating steps are done until all gaps are closed.

It is important to understand that you initiate each sub-step in the assessment process. The entire assessment process is under your control. And of course it is up to you to stop and exit the assessment process whenever you want.[23]

5.4.2. TISAX assessment types and elements

The TISAX assessment process is made up of these three types of TISAX assessments:

  • Initial assessment

  • Corrective action plan assessment

  • Follow-up assessment [24]

The initial assessment marks the start of the TISAX assessment process.

The other two TISAX assessments may take place and may do so several times. They will take place either:

  • until you closed all gaps

  • or you exit the TISAX assessment process

  • or you reach the maximum time period of nine months (at which point another initial assessment is required).

All TISAX assessments will be described in the coming sections.

Icon for info admonition

Please note:

Every assessment goes through a life cycle.

For more information on the status of an assessment, please refer to Section 7.6, “Annex: Assessment status.

5.4.3. TISAX assessment elements

Each TISAX assessment consists of the following elements:

  • Formal opening meeting[25][26]

    • It aims to cover all organisational topics.

    • It does not necessarily have to be a physical meeting.

    • Topics can be covered in one go or spread over several occasions.

    • It is a “logical container” for all organisational pre-assessment topics.

  • Assessment procedure

    • Your audit provider checks all requirements.

    • Assessment methods are selected according to the respective assessment level.

  • Formal closing meeting[27]

    • It concludes a TISAX assessment.

    • The audit provider presents his findings.

    • The audit provider announces the assessment result.

    • It does not necessarily have to be a physical meeting.

    • It is a “logical container” for all organisational post-assessment topics.

After the “closing meeting” the audit provider prepares and sends you the draft version of the updated “TISAX report”. You can voice objections if you think the audit provider misunderstood something.[28] Then the audit provider issues the final “TISAX report”.

All these elements will be described in the next sections.

5.4.4. About conformity

Before we continue outlining the TISAX assessment process, we want to explain you a key concept that is essential for your understanding of the next sections.

The purpose of a TISAX assessment is to determine whether your information security management system fulfils a defined set of requirements. The audit provider checks whether your information security management system “conforms” to the requirements.

Step 1: The checks are made for each applicable requirement individually.

If your approach “conforms” to all requirements, you pass the assessment and receive the TISAX labels that correspond with your assessment objectives.

If your approach does not conform to a given requirement, the audit provider differentiates two types of “non-conformity”:

  1. Minor non-conformity
    This applies when the non-conformity neither questions the overall effectiveness of your information security management system nor creates a significant information security risk.
    Examples: Isolated or sporadic mistakes, implementation deficits

  2. Major non-conformity
    This applies when the non-conformity creates doubts regarding the overall effectiveness of your information security management system or if it causes significant information security risks.
    Examples: Systematic non-conformities, implementation deficits that create critical risks to the security of confidential information, implementation deficits that are not addressed by an appropriate corrective action

Icon for info admonition

Please note:

For the assessment result, everything below full or ideal conformity to the requirements is called a finding. TISAX differentiates four types of findings:

  • Observation

  • Room for improvement

  • Minor non-conformity

  • Major non-conformity

Only the two non-conformities are relevant for the assessment result.

Step 2: All results of the previous “per-requirement” step are merged into the overall assessment result.

The overall assessment result can be:

  1. Conform
    The overall assessment result is “conform”. All requirements are fulfilled.

  2. Minor non-conform
    The overall assessment result is “minor non-conform” if you have at least one “minor non-conformity” for a requirement.

  3. Major non-conform
    The overall assessment result is “major non-conform” if you have at least one “major non-conformity” for a requirement.
    (Without an approved corrective action plan, every non-conformity results in an overall assessment result of “major non-conform”.)

If your overall assessment result is:

  • “minor non-conform”, you can receive temporary TISAX labels until all non-conformities are resolved.

  • “major non-conform”, you have to resolve the respective issue first before you can receive any TISAX labels.
    With appropriate compensating measures and corrective actions approved by the audit provider it is possible to change your overall assessment result from “major non-conform” to “minor non-conform” and thus receive temporary TISAX labels.

It is important to understand that your overall assessment result will improve during the course of the entire TISAX assessment process.

Please consider this oversimplified example: You may have an overall assessment result of “major non-conform” after the initial assessment. Afterwards you mitigate the corresponding risk. That changes your overall assessment result from “major non-conform” to “minor non-conform”. And once the risk is eliminated, your final overall assessment result will be “conform”.

All this will be explained below in much more detail. And you can find more about TISAX labels further down in Section 5.4.13, “TISAX labels”.

5.4.5. Your preparation for the TISAX assessment process

The audit provider will prepare the assessment based on your self-assessment. Therefore, please consider that you have to make your self-assessment available to your audit provider ahead of time. The exact delivery deadlines are agreed upon in the formal opening meeting.

A well-prepared audit provider will reduce the time required for the assessment. Besides the self-assessment, he will also request related documentation prior to the assessment. This can be documentation you referenced in the self-assessment and other documentation the audit provider considers relevant.

Based on this information, your audit provider will plan the assessment procedure.

5.4.6. Initial assessment

This is the first TISAX assessment and marks the formal start of the TISAX assessment process.

Icon for important admonition

Important note:

The initial assessment marks the start of two important periods:

  1. Maximum validity period of three years for TISAX labels

  2. Maximum duration of nine months for the entire TISAX assessment process
    This period starts with the initial assessment. It ends with the last follow-up assessment.
    This is a hard deadline. If you don’t successfully complete the assessment process within this period, you won’t receive TISAX labels.

The periods both start on the day of the closing meeting.

5.4.6.1. The first formal opening meeting

Like all TISAX assessments, the initial assessment starts with a formal opening meeting. Unlike for the other TISAX assessment types, this meeting covers the most topics as it is the start of the interaction with your audit provider. The formal opening meeting is usually done with a conference call or web conference.

The purpose of this meeting is to:

  • check assessment prerequisites

  • introduce the assessment project leader and the assessment team

  • plan the assessment


Assessment prerequisites to be checked are:

  • Do you have a valid TISAX registration?

  • Is the contract between you and your audit provider signed?


Assessment planning includes:

  • Assessment scope verification

    • Is your scope registered and appropriate?[29]

  • Assessment objective check

    • Does the assessment objective match your own and/or your partner’s requirements?

  • Staff on your side

    • Based on their ISMS-related roles in your company, who must be available for interviews (by phone, or in person during on-site assessments)?

  • Communication between you and the audit provider

    • How will you exchange confidential information? You will send confidential documentation to the audit provider and he will send confidential assessment reports.

    • Who will be included in communications?

    • If applicable: How will you conduct conference calls and web conferences for interviews?

  • Key assessment topics

    • Based on your self-assessment, the audit provider will present the key topics he will focus on.

  • Time planning

    • Deadlines for documentation you have to send (including your self-assessment based on the ISA and related documentation, if not sent already)

    • Appointments for interviews and on-site inspections (if applicable)

    • Deadlines for assessment reports (draft and final)

5.4.6.2. Assessment procedure

According to the prepared plan, the audit provider conducts the initial assessment. How this will look in detail depends on your assessment objectives. The assessment mainly consists of conference calls, on-site interviews and on-site inspections in varying degrees of depth[30].

The audit provider presents all his findings during the initial assessment.

5.4.6.3. Closing meeting

In the closing meeting, your audit provider again summarises all his findings.

5.4.6.4. TISAX report

After the closing meeting, the audit provider prepares and sends you the draft version of the “TISAX report”. You can voice objections if you think the audit provider misunderstood something.[31] Then the audit provider issues the “TISAX report”.

At this stage, the current overall assessment result will either be:

  • Conform, or

  • Major non-conform
    Having unaddressed (minor) non-conformities always results in an overall assessment result of “major non-conform”. Your overall assessment result can only be “minor non-conform” once you defined actions that will implement measures to address the non-conformities.
    For more information on how to achieve this, please refer to Section 5.4.8.4, “Temporary TISAX labels”.

If your overall assessment result is “conform” right at the initial assessment, you can skip the rest of the assessment section and proceed to the exchange of your result.

If your overall assessment result is “major non-conform”, your next task is to work out a plan for how to address the findings and how to close any gaps the audit provider found. The plan is officially called the “corrective action plan”.

5.4.7. Corrective action plan preparation

Your “corrective action plan” defines how you plan to address the findings of the initial assessment. Your audit provider will assess the appropriateness of your “corrective action plan” (see next section).

For creating your “corrective action plan”, you should consider the following requirements:

  • Corrective actions

    • For each non-conformity you need to define one or more “corrective actions”, which will implement measures that address the non-conformity.

  • Implementation date

    • You need to define an implementation date for each corrective action.

    • The implementation period should provide sufficient time to thoroughly implement the measures.

  • Compensating measures

    • For all non-conformities that create critical risks, you need to define compensating measures that address the non-conformities until the corrective actions are implemented.

  • Implementation period

    • For all corrective actions that take longer than three months to implement, you need to justify the implementation period.

    • For all corrective actions that take longer than six months, you additionally need to provide evidence that shows that a faster implementation is not possible.

    • The implementation period for any corrective action can’t be longer than nine months.

Once your corrective action plan is complete, you can request the “corrective action plan assessment”.

Icon for important admonition

Important note:

We recommend starting with the implementation as soon as possible. There is no need to wait for the result of the “corrective action plan assessment”.
The “corrective action plan assessment” usually takes place once you submitted your corrective action plan to your audit provider.

5.4.8. Corrective action plan assessment

The purpose of the “corrective action plan assessment” is to verify that your “corrective action plan” (see above) fulfils the TISAX requirements.

You submit your “corrective action plan” to your audit provider. Your audit provider assesses the plan according to the requirements (see below). If your plan fulfils the requirements, your audit provider will issue the updated “TISAX report”.

This assessment usually doesn’t take long. It can be a physical meeting as well as a conference call or web conference.

5.4.8.1. Prerequisites for a corrective action plan assessment

The prerequisites for a “corrective action plan assessment” are either:

  • a recent[32] initial assessment with non-conformities

  • or a “corrective action plan” that already has been assessed, but did not fulfil the requirements.

5.4.8.2. Combination with initial assessment

The “corrective action plan assessment” is not necessarily an independent event. You have the option to already present your “corrective action plan” during the closing meeting of the initial assessment. The audit provider can then directly conduct the “corrective action plan assessment”.

If you combine the “corrective action plan assessment” with the initial assessment, and your “corrective action plan” fulfils the requirements, you can agree with the audit provider that you don’t need an “initial assessment report”. Instead, your audit provider would just prepare the “corrective action plan assessment report”. This report allows you to directly receive temporary TISAX labels.

5.4.8.3. Corrective action plan requirements

The audit provider assesses your “corrective action plan” against the following requirements:

  • Measures are appropriate

  • Critical risks are mitigated with appropriate compensating measures[33]

  • Implementation periods are appropriate

    • Implementation periods start on the day the initial assessment was concluded

  • No implementation period is longer than:

    • three months without additional justification

    • six months without additional justification and evidence

    • nine months

5.4.8.4. Temporary TISAX labels

If your overall assessment result is “minor non-conform”, you receive temporary TISAX labels.

The benefit of temporary TISAX labels is that your partner generally accepts them under the condition that you later receive permanent TISAX labels. This may help you if proving the effectiveness of your information security management system to your partner is urgent.

The prerequisite for temporary TISAX labels is a corrective action plan assessment report with the overall assessment result “minor non-conform”.

Regarding the validity period, temporary TISAX labels:

  • expire nine months after the closing meeting of the initial assessment.

  • are valid until all non-conformities are resolved.

    • This is established in the follow-up assessment and documented in the follow-up assessment report.

  • can’t be renewed.

Icon for info admonition

Please note:

The “corrective action plan assessment” is optional.

You can proceed straight to the follow-up assessment if you:

  • don’t need temporary TISAX labels and

  • are confident to implement any corrective actions without getting your plan approved by your audit provider

Once you’ve completed all corrective actions, you should request the “follow-up assessment”.

5.4.9. Follow-up assessment

The purpose of the “follow-up assessment” is to assess whether all previously identified non-conformities are resolved. Usually you request the follow-up assessment once you are sure that all non-conformities are resolved.

But you can have as many follow-up assessments as you need. If during a follow-up assessment your audit provider still attests existing or even new non-conformities, you simply update your corrective action plan and start this part of the assessment process again.

This assessment can be a physical meeting as well as a conference call or web conference.

5.4.9.1. Timing

Your audit provider can conduct the follow-up assessment(s) within up to nine months after the conclusion of the initial assessment[34].

5.4.9.2. Prerequisites

If you don’t need temporary TISAX labels, you can directly request a follow-up assessment. You don’t need to have a “corrective action plan assessment” prior to a follow-up assessment.

5.4.9.3. Expiration of temporary TISAX labels

In case you need temporary TISAX labels, you may want to ensure there is no gap to receiving the permanent TISAX labels. We therefore recommend requesting your follow-up assessment well ahead of the latest possible date[35]. The reason is that you want to have enough buffer time to address any minor findings identified during a follow-up assessment.

5.4.10. TISAX assessment process diagram

The previous sections are now summarised in the following process diagram:

TISAX assessment process diagram (part 1/2)
Figure 33. TISAX assessment process diagram (part 1/2)
TISAX assessment process diagram (part 2/2)
Figure 34. TISAX assessment process diagram (part 2/2)

5.4.11. Assessment ID

Each TISAX assessment of an assessment scope is identified by an “Assessment ID”. This ID refers to your assessment result and the corresponding TISAX report.

This is what the Assessment ID looks like:

Format of the Assessment ID
Figure 35. Format of the Assessment ID

The Assessment ID is typically used when your audit provider communicates with you.

5.4.12. TISAX report

The “TISAX report”:

  • is (updated and) issued after each TISAX assessment.

  • documents your audit provider’s findings.

  • contains the overall assessment result (conform, minor non-conform, major non-conform).

  • contains all other information related to your TISAX assessment (such as assessment objective, scope, involved people and locations).

The “TISAX report” can be of the following types (depending on the type of assessment):

  • Initial assessment report

  • Corrective action plan assessment report

  • Follow-up assessment report [36]

The “TISAX report” always has the same structure[37]. Your audit provider simply extends it after each type of assessment. This means you only need to deal with the last version of the TISAX report as it always contains the content of its older version(s).

The first sections of the “TISAX report” is what you ultimately share with your partner.

It is one of the key features of TISAX that it is totally up to you to decide which parts of the TISAX report you want to share with your partner or any other participant. The structure of the TISAX report is designed to enable this kind of selective sharing. Each section expands the level of detail.

Here is what the structure of the “TISAX report” looks like:

  • A: Assessment-related information
    Company name, assessment scope, Scope ID, Assessment ID, assessment level, assessment objective(s), assessment date(s), audit provider
    This section does not contain any assessment result.

  • B: Overall assessment result
    Management summary of the assessment result (conform, minor non-conform, major non-conform), number of findings, abstract categorisation of resulting risks

  • C: Assessment result summary
    Summary of the assessment result per chapter (for example “9 Access Control”) and per criteria catalogue (for example “Information Security”)

  • D: Detailed assessment results
    Detailed description of all findings, corresponding risk assessment results, required measures, implementation period

  • E: Maturity levels of ISA (result tab of ISA)
    Maturity level for each requirement
    In the “exchange” step (detailed below) you decide up to which level your partner will have access to the content of your TISAX report.

5.4.13. TISAX labels

We briefly touched on this topic in the registration preparation section. As explained, what once was an assessment objective now became a TISAX label.

Assessment objectives and TISAX labels
Figure 36. Assessment objectives and TISAX labels

The TISAX labels:

  • are the outcome of the TISAX assessment process.

  • summarise your assessment result.

  • are the statement that your information security management system fulfils a defined set of requirements.

The use of TISAX labels makes the TISAX-related communication with your partner and your TISAX audit provider easier because they refer to a defined output of the TISAX assessment process.

5.4.13.1. TISAX label hierarchy

The mapping between any assessment objective and the corresponding TISAX labels is pretty straightforward. But there is another important aspect: Some TISAX labels are hierarchically linked. This means that if you receive a certain TISAX label, you automatically receive all TISAX labels “below” that particular label.

Example (with abbreviated label names): If your assessment objective was “Info very high”, you receive the corresponding TISAX label “Info very high”. But because the assessment objective “Info very high” is an extension of “Info high”, you automatically receive the TISAX label “Info high”, too.

TISAX assessment objectives and TISAX labels (dependencies and hierarchy)
Figure 37. TISAX assessment objectives and TISAX labels (dependencies and hierarchy)

This might not seem important for every participant. But imagine one partner requests you to show the TISAX label “Info very high” and another one requests the TISAX label “Info high”. Then having both TISAX labels makes it easier for everyone because no one needs to understand that “Info high” is a subset of “Info very high”. This may be particularly true for partners where having certain TISAX labels is part of rather stringent purchasing process. You surely won’t want to explain that “Info very high” is “better” than “Info high”. You just show all your TISAX labels and the person doing the evaluation can simply check off the requirement “must have TISAX label ’Info high’“.

5.4.13.2. Validity period of TISAX labels

TISAX labels are generally valid for three years. The validity period starts at the end of the assessment process (even before the TISAX report is issued).

Their validity period might be shorter if something significant regarding the TISAX assessment scope changes.

Examples: relocation of your company, new locations. (For instructions on what to do in such cases, please refer to Section 7.7.4, “Relocations” and Section 7.7.5, “Additional location (scope extension assessment)”.)

Icon for info admonition

Please note:

You can view your TISAX labels in the ENX portal only. They are not recorded in the TISAX report.

5.4.13.3. Renewal of TISAX labels

To keep your TISAX labels long-term, you need to renew[38] them every three years.

For this you basically need to run through the TISAX process again (register an assessment scope, get TISAX-assessed again, share your assessment result). The registration is somewhat easier as you don’t need to re-create your company as a TISAX participant. And you can of course re-use all your contacts and locations that are already stored in the TISAX database.

Icon for important admonition

Important note:

Please register a NEW scope BEFORE approaching your audit provider. Your audit provider can start a new assessment process only if you can provide a new Scope ID.

In most cases, registering a new scope is easy. You just need to assign a new scope name, add contacts, select the assessment objective(s) and add locations. You can re-use contacts and locations that are already in the system from any previously registered scope.

Icon for important admonition

Important note:

If always having valid TISAX labels during the relationship with your partner is a requirement, we strongly advise that you put a reminder in your calendar to start the necessary renewal process.

We recommend starting the renewal at least one year before your TISAX labels expire.


Now that you received your TISAX labels, you can proceed to the last step and share them with your partner.

6. Exchange (Step 3)

The estimated reading time for the exchange section is 7 minutes.

You have gone through the TISAX process so far, but your partner still has not seen any “proof” that your information security management system is capable of protecting his confidential data. This section now describes how to share your assessment result with your partner and present the requested proof.

6.1. Premise

It is one of TISAX’ key features that your assessment result is fully under your control. Without your explicit permission, all information related to your assessment is not shared with anyone.

6.2. The exchange platform

The ENX portal provides the exchange platform.

Your audit provider will upload the first two sections (A and B) of your TISAX report. At this stage, the information is not available to anyone except you.

You can use the account created during the registration to access the portal and use the exchange platform.

You can access the portal at this address:
Icon of the flag of the United Kingdom enx.com/en-US/SignIn

6.3. General prerequisites

You can share your assessment result with your partner only if these two prerequisites are fulfilled:

  1. Your audit provider has submitted the assessment result to the exchange platform.
    The assessment result will be available on the exchange platform usually 5-10 business days after the TISAX report is issued.

  2. We have received your payment for the fee (if applicable).

The status of your assessment scope is “Active” when both prerequisites are fulfilled.

Icon for info admonition

Please note:

Every assessment scope goes through a life cycle. At this stage, your assessment scope must have the status “Active”.

For more information on the status of an assessment scope, please refer to Section 7.5.5, “Assessment scope status “Awaiting your payment”.

To verify whether your assessment result is ready for sharing (assessment scope status = Active), follow these steps:

  1. Log in to the ENX portal.

  2. Go to the main navigation bar and select “MY TISAX”.

  3. From the dropdown menu, select “SCOPES AND ASSESSMENTS”.

  4. Go to the table and find the table row with your assessment scope.

  5. Verify that your assessment scope has the assessment scope status “Active” (column “Scope Status”).

6.4. Permanence of exchanged results

Icon for important admonition

Important note:

You can’t revoke any publication or sharing permissions.

The reason is that we want that all passive participants can rely on continual access to every assessment result they received. Otherwise they would have to manage and archive the assessment results on their own.

The permission remains valid for the complete validity period of your TISAX assessment.

If you created a publication or sharing permission by mistake, please contact us immediately.

6.5. Sharing levels

The sharing levels map 1:1 to the main sections A-E of the TISAX report.

Table 12. Main sections of the TISAX report and the sharing levels on the exchange platform
Main sections of the TISAX report Sharing levels on the exchange platform

1

A: Assessment-related information

2

B: Overall assessment result

3

C: Assessment result summary

4

D: Detailed assessment results

5

E: Maturity levels of ISA (result tab of ISA)

The higher the sharing level, the more detail about your TISAX assessment will be accessible for the respective participant(s).

For more details on the content of each section of the TISAX report, please refer to Section 5.4.6.4, “TISAX report”.

6.6. Publish your assessment result on the exchange platform

You can share your assessment result with all other TISAX participants by publishing it on the exchange platform. Doing so allows all other TISAX participants to access your assessment result up to the granted shared level.

You can only publish your assessment result if the overall assessment result is “conform”.

The sharing levels for publishing your assessment result on the exchange platform are limited to these options:

  • Do not publish (Default)

  • A: Assessment-Related Information

  • A + Labels

  • A + Labels + B: Overall Assessment Result

We recommend the sharing level “A + Labels” for this general type of publication.

Icon for important admonition

Important note:

You can publish your assessment result only if the prerequisites described in Section 6.3, “General prerequisites” are fulfilled.

To publish your assessment result on the exchange platform, follow these steps:

  1. Log in to the ENX portal.

  2. Go to the main navigation bar and select “MY TISAX”.

  3. From the dropdown menu, select “SCOPES AND ASSESSMENTS”.

  4. Go to the table and find the table row with your assessment scope.

  5. Verify that your assessment scope has the assessment scope status “Active” (column “Scope Status”).

  6. Go to the end of the table row of your assessment scope and click the button with the down arrow ENX portal icon down image.

  7. Select “Scope Information”.

  8. In the new window (“Scope Information”), select the tab “EXCHANGE”.
    figure screenshot portal exchange en

  9. Go to the section “PUBLISHING”, open the dropdown menu and select the desired sharing level (see recommendation above).

Icon for info admonition

Please note:

The assessment results are published on the exchange platform only. They can be accessed by other TISAX participants only. There is no public listing of all TISAX participants. Only the raw number of TISAX participants may be mentioned on the public TISAX website.

6.7. Share your assessment result with a particular participant

Besides the aforementioned option to publish your TISAX assessment result on the exchange platform, you can share it selectively with particular TISAX participants with a higher sharing level.

In contrast to the aforementioned publication, you can share your assessment result even if the overall assessment result is (major/minor) non-conform.

Sharing assessment results is an integral part of TISAX. You only had your information security management system assessed once, but now you can share your assessment result with as many partners as you like.

The options for sharing your assessment result on the exchange platform are:

  • A: Assessment Related Information

  • A + Labels

  • A + Labels + B: Assessment Summary

  • A + Labels + B + C: Summarized Results

  • A + Labels + B + C + D: Detailed Assessment Results

  • A + Labels + B + C + D + E: Maturity Levels according to ISA

We recommend the sharing level “A + Labels” for sharing. This is sufficient for the majority of partners. You can always change the sharing level later.

Icon for info admonition

Please note:

Some TISAX participants process the assessment results of their partners automatically. They synchronise their own system with the ENX portal. Only assessment results shared specifically with this participant are synchronised. A publication alone, as described in Section 6.6, “Publish your assessment result on the exchange platform”, is not recognised.

Among the OEMs using TISAX, BMW is an example of this. If you are a partner of BMW, please ensure to share (not just publish) your assessment result with BMW.

6.7.1. Prerequisites

These are the prerequisites for sharing your assessment result with your partner (or any other TISAX participant):

  • You can share your TISAX assessment result only with other TISAX participants.

  • Your partner needs to be a TISAX participant.

  • You need the Participant ID of your partner.[39]

  • You need to pay the fee (if applicable).

Icon for important admonition

Important note:

You can share your assessment result only if the general prerequisites described in Section 6.3, “General prerequisites” are fulfilled.

6.7.2. How to create a sharing permission

To share your assessment result with another TISAX participant, follow these steps:

  1. Log in to the ENX portal.

  2. Go to the main navigation bar and select “MY TISAX”.

  3. From the dropdown menu, select “SCOPES AND ASSESSMENTS”.

  4. Go to the table find the table row with your assessment scope.

  5. Verify that your assessment scope has the assessment scope status “Active” (column “Scope Status”).

  6. Go to the end of the table row of your assessment scope and click the button with the down arrow ENX portal icon down image.

  7. Select “Scope Information”.

  8. In the new window (“Scope Information”), select the tab “EXCHANGE”.
    figure screenshot portal exchange share en

  9. Go to the section “SHARING” and click the button “Share”.

  10. In the new window (“SHARE THIS SCOPE”), enter your partner’s Participant ID (or select him from the participant list in the neighbouring search box).

  11. Select the desired sharing level.

  12. Click the button “Next”.

  13. Read and understand the instructions regarding the permanence of the sharing permission.

  14. Mark the two “confirm” check boxes.

  15. Click the button “Submit”.

Everything else is done by the exchange platform. For sharing level A and B, the information is available on the exchange platform. Your partner can now log into the ENX portal and see your shared assessment result[40].

For higher sharing levels (C-E), the exchange platform notifies your audit provider. Then your audit provider sends the information (matching the selected sharing level) to the main participant contact of your partner.

6.8. Sharing your assessment result outside TISAX

The rule[41] is that you can use the TISAX exchange platform only to let other TISAX participants know about your assessment result.

6.8.1. The reasons for the strict governing of the exchange mechanism

TISAX provides a standardised exchange mechanism for assessment results. This provides an added value in comparison to the exchange of the results of other certifications (e.g. ISO), where this happens in various ways and does not always contain all the information required for the complete picture.

OEMs in particular appreciate this standardisation. But other companies also benefit from clearly defined procedures.

6.8.2. A guide to writing about TISAX in public

While you can’t publicly write about the assessment result, you can mention your TISAX efforts. On the ENX portal, we provide advice on how to approach public statements. We also provide TISAX logos you can use.

After logging in into the ENX portal, you can access the information here:
Icon of the flag of the United Kingdom enx.com/en-US/myenxportal/marketing/
Direct ZIP archive download (document and logos):
Icon of the flag of the United Kingdom enx.com/myenxportal/marketing/tisax-trademark-and-logos-guidelines

In case you are wondering whether there’s a certificate you could hang on your wall:
Due to the standardised exchange process mentioned above we don’t provide such a certificate.

6.8.3. Sharing with a partner who is not yet a TISAX participant

If you want to share your TISAX assessment result with a particular partner who is a) not yet a TISAX participant and has b) not yet received TISAX labels (by going through the assessment process), you can follow these steps:

  1. Instruct your partner to register as a TISAX participant.
    He just has to register as a TISAX participant. He doesn’t need to continue to register an assessment scope.

  2. Instruct your partner to contact us.
    Usually, we process a new registration only if the company also registers an assessment scope. On request by your partner, we process his registration. Thus, he will become a TISAX participant. He can now receive your TISAX assessment result through the regular exchange process.

The purpose of this approach is to ensure that your partner agrees to adhere to the “TISAX Participation General Terms and Conditions” that govern the exchange of TISAX assessment results.

Only the registration of an assessment scope incurs costs. Because registering as a TISAX participant is free, your partner can receive your assessment result for free. However, without an own assessment result, your partner can receive only up to five assessment results and can’t see any of the publications.

6.8.4. Sharing with employees of your partner who have no direct access to the ENX portal

Only those employees of your partner that have an account for our ENX portal can directly see your result. If you need to prove your TISAX labels to an employee of your partner without portal access, you can use a special PDF document for this. To obtain the document, please follow these steps:

  1. Share your assessment result with your partner as described in Section 6.7, “Share your assessment result with a particular participant”.

  2. Log in to the ENX portal.

  3. Go to the main navigation bar and select “MY TISAX”.

  4. From the dropdown menu, select “SCOPES AND ASSESSMENTS”.

  5. Go to the table and find the table row with your assessment scope.

  6. Verify that your assessment scope has the assessment scope status “Active” (column “Scope Status”).

  7. Go to the end of the table row of your assessment scope and click the button with the down arrow ENX portal icon down image.

  8. Select “Scope Information”.

  9. In the new window (“Scope Information”), select the tab “EXCHANGE”.
    figure screenshot portal exchange en

  10. Go to the section “SHARING” and find the table row with the sharing permission (as created in step 1).

  11. Go to the end of the table row of the sharing permission and click the button with the down arrow ENX portal icon down image.

  12. Select “Edit”

  13. In the new window (“SHARE THIS SCOPE”), scroll to the bottom and select “Request Shared Information as PDF”.

  14. Wait a moment until the document is generated.

  15. Download the document (“Copy of information shared with ACME.pdf (66.84 KB)”)

7. Annexes

7.1. Annex: Example invoice

This is an example of the invoice we send.

For more information, please refer to Section 4.3.4, “Fee”.

Invoice example

7.2. Annex: Example confirmation email

We send the confirmation email once you completed all the mandatory steps during the online registration process.

For more information when we send this confirmation email, please refer to Section 4.5.8, “Confirmation email”.

Subject: [TISAX] Scope S3ZY5V Approved

Dear John Doe

Thank you for the TISAX assessment scope registration. I have carried out your scope registration and approved your scope. Attached you can find the TISAX scope excerpt including all scope information and the current TISAX audit provider list.

What’s next?

With the attached TISAX scope excerpt you can now request quotes from all TISAX audit providers for your scope.

Assistance needed?

For further questions regarding TISAX, please read the TISAX FAQs or the TISAX Participant Handbook (https://enx.com/en-US/TISAX/faqs/).If you need further assistance regarding TISAX, please do not hesitate to contact the TISAX hotline via email (tisax@enx.com) or via phone (+49 69 986692-777).

Kind regards,

Your TISAX Team

7.3. Annex: Example TISAX Scope Excerpt

You receive the “TISAX Scope Excerpt” attached to the confirmation email.

For more information, please refer to Section 4.5.8, “Confirmation email”.

figure scope excerpt first page en

7.4. Annex: Participant status

7.4.1. Overview: Participant status

The “participant status” defines where you (as a company) are in the TISAX process.

Your “participant status” can be:

The tables in each status’ section below describe:

  • your situation
    (what’s true right now when you are at this status)

  • your next action
    (what you need to do to progress to the next status; if applicable)

  • our next action
    (what we need to do to elevate your status; if applicable)

  • the next status
    (if applicable)

The following illustration shows the actions that lead to progress from one status to the next:

figure-participant-status-overview
Figure 38. Participant status overview

7.4.2. Participant status “Incomplete”

Status Situation Your next action Our next action Next status

Incomplete

You have not completed the TISAX registration.
Either you have not accepted the general terms and conditions.
Or you have not specified the main participant location.
Or you have not assigned a main participant contact.
Or other information we require is missing.

Continue at Icon of the flag of the United Kingdom enx.com/en-US/SignIn

We will send you a reminder by email (usually within a few days).

Awaiting approval

7.4.3. Participant status “Awaiting approval”

Status Situation Your next action Our next action Next status

Awaiting approval

Your TISAX registration is complete.
You may or may not have registered an assessment scope yet.

Wait for our next action.

We will check and typically approve your application.
However, you usually trigger our checking by also registering an assessment scope.
We will assign a Participant ID and the Scope ID(s).
We will send you a confirmation email. The attached “TISAX Scope Excerpt” (PDF) summarises the information we have in our database.

Preliminary

7.4.4. Participant status “Preliminary”

Status Situation Your next action Our next action Next status

Preliminary

You have successfully completed the TISAX registration process.

Pay the fee (if applicable).
Go through the TISAX assessment process.
Publish and share your assessment result.

None

Registered

7.4.5. Participant status “Registered”

Status Situation Your next action Our next action Next status

Registered

You have successfully completed the TISAX assessment process and received TISAX labels.
You have published and shared your assessment result.
You receive TISAX labels only when you successfully passed the TISAX assessment process. In the ENX portal, this is reflected by having an assessment scope with the assessment scope status “Active”.

None

None

(Expired)

Icon for info admonition

Please note:

If you want to access the assessment results of your partner(s):

The conceptual prerequisite for being able to receive assessment results of other participants is either:

  • You share your own assessment result (this “proves” that you are a serious TISAX participant and a member of the automotive community).

  • We acknowledge you based on your reputation in the automotive industry (like OEMs, tier 1 suppliers).

  • You prove that you have a legitimate interest in receiving assessment results from other participants. We have to verify this in an elaborate process that can incur a substantial fee. For further details, please contact us.

7.4.6. Participant status “Expired”

Status Situation Your next action Our next action Next status

Expired

You have not paid the fee.
Or you or we have cancelled our mutual contract (the GTCs).

None

None

n/a

7.5. Annex: Assessment scope status

7.5.1. Overview: Assessment scope status

The “assessment scope status” defines where your assessment scope is regarding its life cycle.

Please be aware that the “assessment scope status” is different from the “assessment status”. For more information on the “assessment status”, please refer to Section 7.6, “Annex: Assessment status.

Your “assessment scope status” can be:

The tables in each status’ section below describe:

  • your situation
    (what’s true right now when you are at this status)

  • your next action
    (what you need to do to progress to the next status; if applicable)

  • our next action
    (what we need to do to elevate your status; if applicable)

  • the next status
    (if applicable)

The following illustration shows the actions that lead to progress from one status to the next:

Assessment scope status overview
Figure 39. Assessment scope status overview

The off-page reference “A” in the figure above links the assessment scope status “Active” with the “assessment status”. For more information on the “assessment status”, please refer to Section 7.6, “Annex: Assessment status.

7.5.2. Assessment scope status “Incomplete”

Status Situation Your next action Our next action Next status

Incomplete

Either you have not completed the assessment scope registration.
Or you have not provided all the required information.

Continue at Icon of the flag of the United Kingdom enx.com/en-US/SignIn

We will send you a reminder by email (usually within a few days).

Awaiting your order

For more information on where this status is playing a role, please refer to Section 4.5.7, “Assessment scope registration”.

7.5.3. Assessment scope status “Awaiting your order”

Status Situation Your next action Our next action Next status

Awaiting your order

You have not finished your scope registration.

Continue at Icon of the flag of the United Kingdom enx.com/en-US/SignIn

We will send you a reminder by email (usually within a few days).

Awaiting ENX approval

For more information on where this status is playing a role, please refer to Section 4.5.7, “Assessment scope registration”.

7.5.4. Assessment scope status “Awaiting ENX approval”

Status Situation Your next action Our next action Next status

Awaiting ENX approval

Your assessment scope registration is complete.

Wait for our next action.

We will check and typically approve your application.
We will assign the Scope ID(s).
We will send you a confirmation email. The attached “TISAX Scope Excerpt” (PDF) summarises the information we have in our database.

Awaiting your payment

For more information on where this status is playing a role, please refer to Section 4.5.7, “Assessment scope registration”.

7.5.5. Assessment scope status “Awaiting your payment”

Status Situation Your next action Our next action Next status

Awaiting your payment

Your assessment scope registration is complete and approved.
You have received our confirmation email and the “TISAX Scope Excerpt”.

Pay the fee (if applicable).
Request offers from our TISAX audit providers.
From the status “Awaiting your payment” onwards, you:

  • can start sharing some assessment-related information with your partner.[42]

  • can pre-configure the publication of your assessment result (this will only become effective once your assessment scope status changes to “Active”.


42. While at assessment scope status “Awaiting your payment” or “Registered”, “Assessment-related information” includes assessment scope location(s), assessment scope status and assessment objective(s). It doesn’t include assessment results or TISAX labels.

Waiting for your payment.

Registered

For more information on where this status is playing a role, please refer to Section 4.5.8, “Confirmation email”.

7.5.6. Assessment scope status “Registered”

Status Situation Your next action Our next action Next status

Registered

Your assessment scope is registered.
We received your complete payment or your commercial status is “green” due to other circumstances.

Go through the TISAX assessment process.

None

Active

7.5.7. Assessment scope status “Active”

Status Situation Your next action Our next action Next status

Active

You have successfully completed the TISAX assessment process and received TISAX labels.

Publish and share your assessment result.
Any publications and sharing permissions pre-configured at a lower status now become effective.

None

Expired

For more information on publishing and sharing, please refer to Section 6, “Exchange (Step 3)”.

7.5.8. Assessment scope status “Expired”

Status Situation Your next action Our next action Next status

Expired

Either:

  • you have not completed your assessment scope registration within 90 days,

  • or there has been an undue delay with your payment of the fee,

  • or you have exited the TISAX process,

  • or the validity of your assessment result has expired (three years),

  • or you had major changes to the assessment scope (example: none of the locations in an assessment scope belong to your company any more).

Start a new assessment scope registration.

None

Incomplete
or
Awaiting your order
or
Awaiting ENX approval

7.6. Annex: Assessment status

7.6.1. Overview: Assessment status

The “assessment status” defines where you are in the assessment process. The status changes with your progression from one assessment type to the next (like “initial assessment” to “corrective action plan assessment”).

Please be aware that the “assessment status” is different from the “assessment scope status”. For more information on the “assessment scope status”, please refer to Section 7.5, “Annex: Assessment scope status.

Your “assessment status” can be:

The tables in each status’ section below describe:

  • your situation
    (what’s true right now when you are at this status)

  • your next action
    (what you need to do to progress to the next status; if applicable)

  • our next action
    (what we need to do to elevate your status; if applicable)

  • the next status
    (if applicable)

The following illustration shows the actions that lead to progress from one status to the next:

Assessment status overview
Figure 40. Assessment status overview

The off-page reference “A” in the figure above links the assessment scope status “Active” with the assessment status “Waiting for corrective action plan assessment”. For more information on the “assessment scope status”, please refer to Section 7.5, “Annex: Assessment scope status.

7.6.2. Assessment status “Initial assessment ordered”

Status Situation Your next action Our next action Next status

Initial assessment ordered

You have selected one of our TISAX audit providers and ordered an initial assessment.

Continue the TISAX assessment process.

None

Initial assessment ongoing

7.6.3. Assessment status “Initial assessment ongoing”

Status Situation Your next action Our next action Next status

Initial assessment ongoing

Your initial assessment has either:

  • started

  • or is completed, but your audit provider has not yet submitted the TISAX report

None

None

Waiting for corrective action plan assessment (if applicable)

7.6.4. Assessment status “Waiting for corrective action plan assessment”

Status Situation Your next action Our next action Next status

Waiting for corrective action plan assessment

Your audit provider has conducted an initial assessment.
Your audit provider has submitted the TISAX report to us.
The assessment result is (major/minor) non-conform.

Create a corrective action plan.
Start the corrective actions.
Request a corrective action plan assessment.

None

Waiting for follow-up (if applicable)

The assessment status “Waiting for corrective action plan assessment” is limited to nine months. For more information, please refer to Section 5.4.8.3, “Corrective action plan requirements”.

7.6.5. Assessment status “Waiting for follow-up”

Status Situation Your next action Our next action Next status

Waiting for follow-up

Your audit provider approved your corrective action plan.
You have implemented the corrective actions.

Request a follow-up assessment.

None

Finished

The assessment status “Waiting for follow-up” is limited to nine months. For more information, please refer to Section 5.4.8.3, “Corrective action plan requirements”.

7.6.6. Assessment status “Finished”

Status Situation Your next action Our next action Next status

Finished

Your audit provider conducted a follow-up assessment.
The assessment result has no non-conformities.
Your audit provider submitted the TISAX report to us.

Publish and share your assessment result.

None

n/a

7.7. Annex: Participant data life cycle management

The following sections describe what you need to do if something related to your participant data changes.

7.7.1. Change of company name

If you want to change your company’s name, please contact us.

7.7.2. Change of contacts

Your company’s main participant contacts and all other “administrative contacts” with portal accounts can always go to the ENX portal and:

  • add new contacts

  • delete existing contacts

  • change contact details of existing contacts

7.7.3. Lost access to participant data (ENX portal)

If no one in your company who had access to the ENX portal and thus your participant data is left, please contact us. We will try to help you to regain access your company’s participant data.

7.7.4. Relocations

If only the name of a street is officially changed, your company’s main participant contact just needs to contact us. We will update the location data accordingly.

But if one of your locations relocates to a new address, you need to:

  1. extend the assessment scope.
    Take the steps described in Section 7.7.5, “Additional location (scope extension assessment)”.

  2. send us an email to let us know the old location is no longer part of your company.
    We will update the assessment scope data accordingly. We will send you a confirmation.

7.7.5. Additional location (scope extension assessment)

If you open a new location during the validity period of your existing TISAX labels, you need to request a “scope extension assessment” from your audit provider. You can’t select another audit provider to conduct a “scope extension assessment”. The assessment is similar to the other assessment types. However, your audit provider will most likely consider reusing applicable results from previous assessments.

Once the scope extension assessment is concluded without non-conformities, your audit provider will:

  • update your assessment scope in the ENX portal.

  • issue the scope extension assessment report.

A scope extension assessment does not extend the original validity period of your existing TISAX labels.

7.8. Annex: ISA life cycle management

An ENX working group is maintaining the ISA. The VDA officially publishes new versions. We have defined a schedule that determines which version of the ISA is the basis for a TISAX assessment at any given point in time.

When the VDA publishes a new version that contains changes in form and content, our schedule starts and we distribute the new version to our TISAX audit providers. Generally, eight weeks later the audit providers CAN conduct assessments based on the new version. Sixteen weeks later the audit providers MUST conduct assessments based on the new version. These periods apply to assessments that are ordered AFTER the start of the schedule. If you ordered your assessment BEFORE the schedule started, your audit provider CAN conduct the assessment based on the older version of the ISA. However, your audit provider will usually recommend an assessment based on the newer version.

You can find the publication dates in the ISA in the tab “Change history” and on the ISA website of the VDA (www.vda.de/en/topics/safety-and-standards/information-security/information-security-requirements).

7.9. Annex: Helpful documents

This section lists documents we consider helpful.

  • Whitepaper “Harmonization of security levels”

    “One key element in achieving a needs-oriented level of information security is the classification and labeling of information. This White Paper provides orientation for harmonized and standardized classification levels in relation to confidentiality.”

    Available languages: German, English

    Publisher: Verband der Automobilindustrie e.V. (“German Association of the Automotive Industry”)

  • White Paper “Information Security Risk Management”

    “The objective of this White Paper is to inform companies in the automotive industry with regard to risk-oriented information security management and to enable those to establish an effective information security risk management. It is intended to support organizations in preparing or conducting a TISAX assessment to meet the requirements of the VDA ISA control question 1.4.1. It´s content it is to be considered as implementation recommendations, not as a mandatory requirements.”

    Available languages: German, English

    Publisher: Verband der Automobilindustrie e.V. (“German Association of the Automotive Industry”)

8. Document history

Version Notes

2.3

  • Subtitle reworded

  • Change from Word/PDF to HTML as the primary format for the handbook

  • Further translations available (Chinese and French, see next bullet point)

  • Section “The TISAX participant handbook in other languages and formats” added

  • All links to the ENX homepage changed from "https://portal.enx.com" to "https://enx.com" (the old links still work)

  • “VDA ISA” becomes “ISA”

  • Section Section 5.2, “Self-assessment based on the ISA” updated to reflect changes introduced with ISA version 5

  • Rows of all tables listing assessment objectives reordered to match the changed order of the criteria catalogs in ISA 5

  • Figures listing assessment objectives updated to match the changed order of the criteria catalogues ISA 5

  • Section “Scope tailoring” updated (figure 6, typing error corrected, assessment objectives updated)

  • Section “Fee” updated with information about credit card payments

  • Section “TISAX assessment process diagram” updated (figure 34, reference to managed service provider removed)

  • Section “Annex: Helpful documents” updated (White Paper “Information Security Risk Management” added)

2.2.1

  • Minor typing errors corrected

2.2

2.1.2

  • Formal limit for “distance” between “your result score” and “maximum result score” corrected from 25% to 30%

2.1.1

  • Minor typing errors corrected

2.1





1. Verband der Automobilindustrie e. V. (VDA), www.vda.de
2. You may want to consider going through the TISAX process as a pre-emptive step. Some companies do this in order to be better prepared. Already being TISAX-assessed may mean a much shorter onboarding period and therefore may give you an edge over not-yet-TISAX-assessed competitors.
3. “TISAX labels” are a concept to summarise your assessment result and are the output of the TISAX process. Please refer to Section 5.4.13, “TISAX labels” for more details.
4. You only need to take most of registration steps once when you start as a TISAX participant. When you renew your assessment result, you only need to update and confirm your registration data.
5. We will publish changes to our GTCs on the ENX portal and notify registered contacts.
6. This also applies to all other additional agreements (e.g. codes of conduct).
7. This is the standard scope description in version 1.0. We added versioning because we may update the description in the future.
8. “TISAX labels” are a concept to summarise your assessment result and are the output of the TISAX process. Please refer to Section 5.4.13, “TISAX labels” for more details.
9. “X” is your company.
10. A workaround for this is to: a) remove the location from the scope, b) solve the issues, c) add the location afterwards with a scope extension assessment
11. Please note that currently your partner is not automatically informed about new permissions. You may want to notify your partner once your assessment result is available to him.
12. If you want to be on that list, please contact us.
13. Evidence is anything that supports your assertion that you fulfil a certain requirement. Evidence is mostly documents. You will surely use internal documentation as evidence.
14. Interviews for assessments with assessment level 2 are generally conducted via audio conference. At your request, interviews can be conducted on site
15. Our regular communication by email is sent to participant contacts only. It is not sent to accounts that do not have the participant role. To have our emails sent to account owners as well, please ensure that they also defined at least as additional participant contact.
16. The theoretical minimum for simplified group assessments is three locations.
17. If you already know you will have to improve your information security management system, the recommended minimum is at least twelve locations.
18. To prevent possible confusion between numbers and letters (like 8 and B), certain letters are not allowed in Participant IDs. However, some older Participant IDs may contain the letter “G”.
19. The ISA also refers to the criteria catalogues as “modules”.
20. You can find the underlying Excel feature in the ribbon “Data”, section “Outline”.
21. Do you have audit providers for your company for similar assessments (like ISO 27001) that are interested in conducting TISAX assessment as well? Then share this handbook with them and tell them to contact us
22. Audit providers that are not included in our listing are not allowed to conduct TISAX assessments.
23. If you end the assessment process, you won’t receive TISAX labels.
24. There is actually a fourth type: The “scope extension assessment”. As this is a special case, it is described in detail in the annex in Section 7.7.5, “Additional location (scope extension assessment)”.
25. The formal opening meeting will be described in detail for the initial assessment only. For the other TISAX assessments, your audit provider will schedule and shape these meetings.
26. Some audit providers may use the term “kickoff meeting” synonymously for “formal opening meeting”.
27. The formal closing meeting will be described in detail for the initial assessment only. For the other TISAX assessments, your audit provider will schedule and shape these meetings.
28. If a dispute can’t be solved, you can escalate the issue. Please contact us for further details.
29. Changes to the scope are still possible at this stage.
30. For more information on audit methods and intensities, please refer to Section 4.3.3.6, “Protection needs and assessment levels”.
31. If a dispute can’t be solved, you can escalate the issue. Please contact us for further details.
32. The period between initial assessment and corrective action plan assessment can’t be longer than 9 months.
33. Please note that your overall assessment result can still be “major non-conform”, even if you have defined appropriate corrective actions. This is the case if your measures don’t/can’t immediately take effect.
34. This of course only applies to an initial assessment that identified non-conformities. You don’t need a follow-up assessment for an initial assessment with an assessment result of “conform”.
35. In theory, this can be nine month after the conclusion of the initial assessment.
36. Actually, there is a fourth type: The “scope extension assessment report”. As this is a special case, it is described in detail in Section 7.7.5, “Additional location (scope extension assessment)”.
37. The “TISAX report” is based on a template that all TISAX audit providers are obliged to use.
38. The word “renewal” can be misleading. To keep a TISAX label for more than three years, you need to run through the TISAX process again. This starts with registering a new assessment scope.
39. We don’t maintain a “TISAX-public” list of Participant IDs. The reason for this is that we want to prevent accidental sharing based on similar-sounding company names or other “human errors”. Therefore, you always have to obtain your partner’s Participant ID by contacting him directly.
40. Your partner has to log into the portal and actively look up your shared assessment result. Your partner doesn’t receive an automated notification about new shared assessment results.
41. The rule is defined in the “TISAX Participation General Terms and Conditions” (https://enx.com/tisaxgtcen.pdf).