ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
2
3
TISAX Compliance Preparation Checklist
4
StepTaskDetailsResponsible PartyCompletion StatusNotes
5
1. Understand TISAX RequirementsReview VDA ISA catalogDetermine applicable TISAX level (AL 1, 2, or 3) based on contract needs. Seek consultant assistance if needed.☐ In Progress ☐ Completed
6
Assess data sensitivityClassify data (e.g., internal data, personal data, prototypes).☐ In Progress ☐ Completed
7
2. Establish an ISMSDevelop ISMS frameworkAlign with ISO 27001 standards.☐ In Progress ☐ Completed
8
Define ISMS scopeIdentify processes, assets, and security objectives.☐ In Progress ☐ Completed
9
Conduct risk assessmentEvaluate potential threats and vulnerabilities.☐ In Progress ☐ Completed
10
Register your company on the ENX portalComplete registration to begin the TISAX process and eventually obtain a Scope ID once the ISMS scope and assessment objectives are finalized.☐ In Progress ☐ Completed
11
3. Implement Security ControlsApply required controlsImplement all VDA ISA security controls.☐ In Progress ☐ Completed
12
Develop security policiesDocument policies for access control, encryption, incident response, and vendor security.☐ In Progress ☐ Completed
13
Prepare audit documentationEnsure all controls and policies are well-documented.☐ In Progress ☐ Completed
14
4. Train Your TeamConduct security trainingEducate employees on TISAX requirements and ISMS responsibilities.☐ In Progress ☐ Completed
15
Simulate phishing & security exercisesTest employee awareness through drills and workshops.☐ In Progress ☐ Completed
16
5. Conduct Internal AuditsPerform self-assessmentIdentify gaps in compliance before the formal audit.☐ In Progress ☐ Completed
17
Review findingsAddress security weaknesses and update policies.☐ In Progress ☐ Completed
18
6. Address Compliance GapsImplement corrective actionsStrengthen controls based on audit findings.☐ In Progress ☐ Completed
19
Document updatesKeep records of security improvements.☐ In Progress ☐ Completed
20
7. Schedule a TISAX AssessmentAL 1: Self-assessmentComplete documentation (no external audit required).☐ In Progress ☐ Completed
21
AL 2: Remote auditHire a TISAX-approved auditor for document verification.☐ In Progress ☐ Completed
22
AL 3: On-site auditSchedule an audit with an accredited provider, including physical security inspection and team interviews.☐ In Progress ☐ Completed
23
8. Maintain & Improve ISMSMonitor security processesContinuously evaluate security controls.☐ In Progress ☐ Completed
24
Update policies regularlyAdapt to security threats, industry changes, and compliance updates.☐ In Progress ☐ Completed
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100