Hanout Seminar TISAX 25 APR 2023
Hanout Seminar TISAX 25 APR 2023
Hanout Seminar TISAX 25 APR 2023
การรักษาความปลอดภัยข ้อมูลสารสนเทศ
ในอุตสาหกรรมยานยนต์ กับมาตรฐาน TISAX®
Agenda
Introduction
Impact to automotive
industrial
Assessment level
Sample controls
Related ISO Standard
1
TISAX® Overview TISAX – What is TISAX® ?
Trusted Information Security Assessment Exchange (TISAX®)
SGS is a TISAX® Audit Provider
TISAX® is an assessment and exchange mechanism for the information security of enterprises and
allows recognition of assessment results among the participants.
If you want to process sensitive information from your customers or evaluate the information security of
your own suppliers, TISAX® supports you in reducing efforts.
TISAX® is based on the Information Security Assessment (ISA) – a catalog of requirements concerning
ISO/IEC 27001 – developed by the German Association of the Automotive Industry (VDA).
The ENX Association acts as the governance organization within TISAX® and is responsible for the
further development of TISAX®, the monitoring of TISAX® audit providers and assessment execution, as
well as quality assurance.
The TISAX® assessment scheme ensures a uniform level of information security among car
manufacturers, service providers and suppliers.
It helps to protect data by ensuring integrity and availability in the manufacturing process. A dedicated
online platform allows the exchange of information security assessment results within the automotive
sector.
2
TISAX® - An impact to automotive industrial
Not only IATF certified Customers – much more…!!
Information Security
- All basic controls based on the standard ISO/IEC27001
Prototype Protection
- Includes prototypes of classified vehicles, components and parts
- Applied for protection classes High and Very high according to VDA ISA
Protection
- Compliance with the Art.28 of EU General Data Protection Regulation
3
TISAX® Assessment Level
TISAX uses Assessment Levels (ALs) to differentiate between various intensities and methodologies
according to different needs of the auditee. In general, a higher AL increases the accuracy of the
assessment as well as the efforts needed to complete the assessment.
The ALs are designed to provide sufficient accuracy depending on the requirements. There are three
possible assessment levels:
AL 1 Assessment of existence of a self-declaration (self-assessment) of the auditee
AL 2 Plausibility check of the auditee’s self-assessment conducted by an audit provider (i.e.,
evaluation of evidence and an expert interview)
AL 3 Detailed evaluation of evidence on the basis of the auditee’s self-assessment in form of on-
site inspection and expert interviews
An assessment performed with a higher AL always fulfills the requirement of an assessment with
lower AL (i.e., an assessment performed in AL 2 is always sufficient if the requirement is AL 1,
and an assessment performed in AL 3 is always sufficient if the requirement is AL 1 or AL 2).
4
TISAX® Assessment Level
AL 1:
self-assessment.
low trust level and are thus not used in TISAX®. But it is of course
possible that your partner may request such a self-assessment outside of
TISAX®.
If you have evidence you don’t want to send to the audit provider, you
can request an on-site inspection. In this way, the audit provider can still
check your “for your eyes only” evidence.
10
5
TISAX® Assessment Level
AL 3:
11
TISAX® process
12
6
TISAX® assessment objectives
and TISAX® labels
13
Objective: As an essential control mechanism, assessing the effectiveness of the ISMS from merely an
internal point of view is insufficient. Additionally, an independent and therefore objective assessment shall be
obtained at regular intervals and in case of significant changes.
Requirement (must):
+ Information security reviews are carried out by an independent and competent body at regular intervals
and in case of significant changes.
+ Measures for correcting potential deviations are initiated and pursued.
14
Based on VDA ISA 5.1 as of 27/04/2022 – intentionally to highlight at the requirement at “must” only.
7
TISAX® Sample controls – Information Security
1.6 Incident Management
Objective: To check the authorization for both physical access and electronic access, means of identification
such as keys, visual IDs or cryptographic tokens are often used. The security features are only reliable if the
use of such identification means is handled adequately.
Requirement (must):
+ The requirements for the handling of identification means over the entire lifecycle are determined and
fulfilled. The following aspects are considered:
- Creation, handover, return and destruction,
- Validity periods,
- Traceability,
- Handling of loss.
8
TISAX® Sample controls – Prototype Protection
8.1 Physical and Environmental Security
Objective: Protection against unauthorized access to security areas where vehicles, components or parts
classified as requiring protection are manufactured, processed or stored, including traceable documentation.
Requirement (must):
+ Registration obligation for all visitors.
+ Documented non-disclosure obligation prior to access.
+ Publication of security and visitor regulations.
+ Country-specific legal provisions regarding data protection are to be observed.
17
Based on VDA ISA 5.1 as of 27/04/2022 – intentionally to highlight at the requirement at “must” only.
Question: 8.2.5 To what extent is a process defined for granting access to security areas?
Objective: A process is defined for the protection against unauthorized access to security areas where
vehicles, components or parts classified as requiring protection are manufactured, processed or stored.
Requirement (must):
+ Responsibilities for access authorization are clearly specified and documented.
+ A process for new assignments, changes and revocations of access rights is in place.
+ Code of conduct in case of the loss/theft of access control means.
18
Based on VDA ISA 5.1 as of 27/04/2022 – intentionally to highlight at the requirement at “must” only.
9
TISAX® Sample controls – Data Protection
9 Data Protection
Objective: A process is defined for the protection against unauthorized access to security areas where
vehicles, components or parts classified as requiring protection are manufactured, processed or stored.
Requirement (must):
+ Appointment of a data protection officer where legally required, otherwise appointment of a person responsible for data
protection
+ Organizational implementation of data protection
- Integration of the data protection officer into the corporate structure
- Voluntary or obligatory appointment of a data protection officer
- Full-time or part-time data protection officer
- Internal or external data protection officer
- Support of the data protection officer by directly assigned employees (department “Data Protection”) depending on the company size
- Support of the data protection officer by data protection coordinators in the company departments depending on the size of the
company (e.g. Marketing, Sales, Human Resources, Logistics, Development, etc.)
19
Based on VDA ISA 5.1 as of 27/04/2022 – intentionally to highlight at the requirement at “must” only.
ISO 21434 provides a guideline for ensuring the cybersecurity process of road
vehicle electronic systems that organizations need in order to:
• Define cybersecurity policies and processes
• Analyze, identify, and manage cybersecurity risks
• Champion a “security by design” or cybersecurity culture within the
organization
ISO 21434 applies to all the software included in vehicles as well as electronic
systems and components, and last but not least, the hardware as well.
20
10
ISO/SAE 21434 Cybersecurity Process Structure
Thank you!
Do you have any questions?
cbe.thailand@sgs.com
(02) 678 1813 ext. 6
LINE: @sgsthailand
Facebook: SGS
www.sgs.co.th
22
11