Blog
Read more current information on the topic: IT security concept for public institutions.
Discover TISAX® and find out why it is so important for the automotive industry.
With networking and globalization in the automotive industry, internal and external risks for companies are growing. The TISAX® (Trusted Information Security Assessment Exchange) standard defined by the German Association of the Automotive Industry (VDA) is the VDA's response to the growing need of manufacturing and supplying companies for greater security, including in the handling of confidential information.
TISAX stands for Trusted Information Security Assessment Exchange. It is a standardized assessment and exchange mechanism for evaluating information security in the automotive industry. TISAX was initiated by the German Association of the Automotive Industry (VDA) and is based on the VDA-ISA (Information Security Assessment), a questionnaire for assessing information security that is based on ISO/IEC 27001, a globally recognized standard for information security management systems.
TISAX certification is a standardized process that helps companies meet information security requirements within the automotive industry. It involves going through clearly defined steps to ensure that sensitive data is protected and the security requirements of partners and customers are met.
The individual phases of the certification process are explained in more detail below, from preparation to successfully obtaining the TISAX label.
The first step is to define the scope of the certification, which includes the following.
This includes preparing your organization for the TISAX audit by:
TISAX assessments are carried out by certified audit providers approved by the ENX Association. Choose a provider that meets your requirements:
Before the audit can begin, you must register on the ENX TISAX platform:
Conduct a self-assessment to evaluate your readiness:
The selected audit provider carries out an independent assessment in two stages:
If the auditors find non-conformities:
After successfully passing the audit:
Threats | DriveLock Solutions |
---|---|
Industrial espionage / data theft |
|
Social Engineering |
|
Malware, ransomware (e.g. via removable media/USB), advanced persistent threat (APT) |
|
Phishing |
|
Handling of data carriers / exchange of data carriers |
In hispresentation "Trusted.Automotive.Industries - Digital Transformation along the Automotive Value Chain " at the IAA Mobility,DriveLock CEO Anton Kreuzer showed how an implemented DriveLockHypersecure Platform enables the company to achieve a higher level of maturity and how DriveLock supports the automotive industry in implementing the required measures of the VDA ISA catalog.
If you have already focused on the topic of information security along the digitized value chain in AUTOMOTIVE.INDUSTRIES and would like a (technical) companion, please contact us or watch the streaming of our presentation:
The DriveLock modules Vulnerability Management, Asset Management, Security Awareness and Device Control support automotive manufacturers in complying with the ISO standard ISO/IEC 27001.
DriveLock reduces risks in the supply chain, e.g. by encrypting data ( at rest & in motion), identity & access management andpreventive measures that prevent malware from running on end devices, for example.
The DriveLock Device Controland Application Control solutions are certifiedaccording to Common Criteria EAL3+: This means that DriveLock fulfills an important security standard for critical infrastructures.
The DriveLock Zero Trust Platform can be tested free of charge for 30 days without obligation.
Prevent the execution of unknown and unwanted programs with application whitelisting.
Learn moreRaise your employees' security awareness and reduce your security risk.
DriveLock Application Control and DriveLock Device Control reliably protect systems and devices against malware.
Read more current information on the topic: IT security concept for public institutions.
How to effectively protect your production environments from cyber attacks: Find out more about Cyber Security in Operational Technology (IIot) in our whitepaper.
With the HYPERSECURE Platform, we ensure that cyber attacks never make it into your IT in the first place. They stay where they belong: outside!
Do you have or have you had a cybersecurity incident?
No problem, we support you in rebuilding your DriveLock environment including all security modules, even those you have not purchased.
Book an appointment with our experts: