TISAX · Automotive Security · VDA ISA · Supplier Compliance · 9 Min Read

TISAX Compliance for Automotive Suppliers: A Practical Guide to Certification

BMW, Mercedes-Benz, Volkswagen Group, and Stellantis require TISAX before awarding contracts to any supplier that handles sensitive information. This guide explains what TISAX actually demands, where most suppliers fail, and how to close the gap before the auditor finds it.

The Mandate

TISAX is not a voluntary certification — it is a contractual prerequisite imposed by OEMs on any supplier that handles sensitive information: prototype data, production specifications, personal data, or confidential engineering documentation. Missing it disqualifies you from contracts regardless of product quality.

Three Assessment Levels

TISAX operates at three levels (AL1, AL2, AL3) based on the sensitivity of data you handle. Most Tier 1 and Tier 2 suppliers require AL2 or AL3 — meaning external auditors, not self-assessment. Your OEM determines the required level, not you.

Common Failure Areas

Prototype protection controls, supplier relationship documentation, and access control evidence are where automotive suppliers most consistently fail assessments. Each failure adds months to your certification timeline — and can delay or lose a contract.

Realistic Timeline

Initial TISAX certification takes 3 to 6 months from engagement to label issuance for most suppliers. The actual timeline depends on your security maturity, assessment level, and how quickly gaps are remediated — which is almost always slower than planned internally.

What Is TISAX and Why Automotive OEMs Mandate It

TISAX — Trusted Information Security Assessment Exchange — was created by the VDA (Verband der Automobilindustrie, the German automotive industry association) to solve a specific problem: every major OEM was running its own supplier security assessment programme, and every supplier was completing dozens of overlapping questionnaires in slightly different formats.

TISAX solved this by creating a standardised framework built on the VDA Information Security Assessment (VDA ISA) and a shared exchange platform managed by the ENX Association. A supplier completes one TISAX assessment and shares the result with every OEM that requires it — once, on the ENX platform, under controlled access. No more answering the same questions twelve times for twelve customers.

What began as a German automotive standard has become the de facto security certification requirement for automotive supply chains across Europe. In the Netherlands, this directly affects Dutch suppliers to OEMs and to Tier 1 integrators including VDL, DAF, and ASML subcontractors working on automotive-adjacent programmes.

The TISAX result is not a public certificate — it is a controlled exchange.

Unlike ISO 27001, TISAX assessment results are not public. They are shared confidentially on the ENX platform, accessible only to OEMs you explicitly authorise. Missing a TISAX requirement can delay or disqualify a contract award — even when your product quality and pricing are ideal.

The Three TISAX Assessment Levels

Your required assessment level is set by your OEM customer based on the sensitivity of information you handle and your access to their environments. Understanding this upfront determines whether your budget and timeline estimates are realistic.

AL1

Self-Assessment

4–8 weeks

Target

Suppliers handling standard business information with limited sensitivity

Process

Complete the VDA ISA questionnaire internally and publish results to the ENX platform — no external auditor required

Rarely mandated by major OEMs for direct suppliers — BMW, VW Group and Mercedes typically require AL2 or AL3.

AL2

Plausibility Check

2–4 months

Target

Suppliers handling sensitive information: prototype data, personal data, confidential technical specifications

Process

Detailed self-assessment plus remote verification sessions with an accredited ENX auditor who tests your answers

The most common requirement for Tier 2 and most Tier 1 suppliers with access to OEM data.

AL3

On-Site Audit

3–6 months

Target

Suppliers handling highly sensitive data: prototype components, secret production systems, direct access to OEM engineering environments

Process

Full on-site inspection by accredited auditors with comprehensive documentation review and physical control testing

Required for prototype handling, R&D partners, and suppliers with direct system access to OEM production or engineering platforms.

The Six Steps of a TISAX Assessment

TISAX follows a defined process managed through the ENX Association. Understanding each step before you begin prevents the most common cause of timeline overruns: discovering major remediation requirements mid-assessment that should have been addressed upfront.

01

Scope Definition

Determine which organisational units, physical locations, and data types are in scope. Your OEM contract specifies the required scope — incorrect scoping leads to assessment failure or partial results that do not satisfy your customer's requirements.

02

ENX Registration

Register with the ENX Association and specify your assessment scope, required level, and applicable modules. Registration fees apply. Your registration locks in the scope that will be formally assessed.

03

Gap Assessment

Evaluate your current controls against VDA ISA requirements for your level and applicable modules: Information Security (always required), Prototype Protection (if applicable), and Data Protection (if personal data is involved). Complete this before engaging your auditor — gaps found mid-audit extend your timeline significantly.

04

Auditor Engagement

Select an accredited ENX audit provider and schedule your assessment. For AL2, this involves remote verification sessions. For AL3, plan for on-site visits over one to three days. The auditor reviews your VDA ISA self-assessment and tests your documented controls against actual practice.

05

Gap Remediation

Address findings identified during or before the assessment. Minor deviations can often be remediated within the assessment window. Major gaps require a separate re-assessment cycle. This is where most timelines slip — internal remediation is consistently slower than planned.

06

Label Issuance & Sharing

Once the assessment is accepted, your TISAX label is published on the ENX platform. You control which OEMs can access it. Labels are valid for three years, after which a full re-assessment is required — not a surveillance audit.

TISAX vs. ISO 27001: Key Differences

Many automotive suppliers already hold or are pursuing ISO 27001. The two frameworks overlap significantly in controls — but they are not equivalent, and no major OEM will accept ISO 27001 as a substitute for TISAX.

FeatureTISAXISO 27001
Industry scopeAutomotive-specific (VDA ISA framework)Cross-industry generic control framework
MandateContractual OEM requirement — non-negotiable for in-scope suppliersVoluntary — OEMs do not accept it as a TISAX substitute
Result exchangeENX platform — one result shared with multiple OEMs under access controlManual certificate sharing per customer relationship
Assessment modelMaturity-based scoring (1–5 per control area)Binary: conformant or non-conformant per clause
Prototype protectionDedicated VDA ISA module — physical and logical prototype controlsNot addressed — physical prototype security is outside ISO scope
Validity3-year label — full re-assessment at renewalAnnual surveillance audits, recertification every 3 years

Is Your TISAX Timeline Realistic?

We offer a free TISAX readiness call: 30 minutes to assess your current security posture against VDA ISA requirements for your target assessment level, and tell you honestly whether your planned timeline is achievable.

Book a Free TISAX Readiness Call

The Three Areas Where Automotive Suppliers Most Often Fail

These three control areas account for the majority of findings in TISAX assessments at AL2 and AL3. Addressing them before your formal assessment — not during — is the most reliable way to avoid remediation loops that extend certification by three to six months.

Prototype Protection Controls

The VDA ISA Prototype Protection module requires documented physical and logical controls for handling pre-series components, CAD files, and development data. Most suppliers handle prototypes under informal arrangements — no documented access control process, no clean-desk procedures, no formal visitor management for prototype areas. Auditors consistently flag the absence of documented protocols rather than the absence of physical controls.

Supplier Relationship Documentation

TISAX requires evidence that you assess and manage the security posture of your own sub-suppliers that have access to OEM data. Most SME suppliers have no formal supplier security assessment process. They sign contracts but do not assess their suppliers' security practices. Auditors consistently flag missing sub-supplier registers and absent due diligence processes for vendors with access to sensitive data.

Access Control Evidence

TISAX assesses whether access rights are formally managed: user provisioning and de-provisioning, privileged access management, and periodic access reviews with documented outcomes. Most suppliers have functioning technical access controls — but lack the documented processes and audit evidence trails that TISAX requires. Functioning controls without documentation do not satisfy a TISAX auditor at AL2 or AL3.

How New Paradigm Security Accelerates Your TISAX Certification

Automotive suppliers are not typically information security specialists. Their core expertise is manufacturing, engineering, or logistics — and TISAX asks them to demonstrate sophisticated security governance against a detailed automotive-specific framework. Most suppliers underestimate remediation effort and overestimate the speed of internal execution by a factor of two to three.

Our GRC practice has guided suppliers through TISAX assessments at all three levels. We know where the gaps are before the auditor arrives — because we have seen those gaps across assessments consistently.

01

VDA ISA Gap Assessment

Full assessment of your controls against VDA ISA requirements for your specific level and applicable modules. We deliver a prioritised remediation plan with realistic timelines — not a generic maturity report that leaves your team guessing where to start.

02

Remediation Programme Management

End-to-end management of gap remediation: policy development, process design, control implementation, and audit evidence collection. We build the documentation architecture that satisfies TISAX auditors and remains maintainable after your label is issued.

03

Prototype Protection Module

Dedicated support for the VDA ISA Prototype Protection module — physical security assessment, access control design for prototype areas, visitor management procedures, and CAD/engineering data handling controls. Built for Tier 1 and Tier 2 suppliers handling pre-series components.

04

Sub-Supplier Assessment Programme

Design and implementation of your supplier security management process: questionnaire development, criticality classification, and sub-supplier register satisfying both VDA ISA and GDPR Art. 28 requirements simultaneously.

05

Re-Assessment Preparation

TISAX labels expire after three years. We provide continuous compliance monitoring, annual control testing, and re-assessment preparation so your renewal does not become a twelve-month crisis. Clients who engage us post-certification maintain consistently higher maturity scores.

TISAX Is a Supply Chain Access Decision, Not an IT Project

The automotive supply chain is tightening. OEMs are reducing supplier bases and concentrating contracts with vendors that can demonstrate systematic security governance. TISAX certification has become a threshold requirement — not a differentiator, but a prerequisite for appearing on the short list.

The suppliers that complete TISAX efficiently are not the ones with the largest IT teams. They are the ones that engaged external expertise early, addressed prototype protection and supplier management proactively, and avoided the remediation loops that stretch timelines from four months to twelve.

If you have received a TISAX requirement from an OEM or Tier 1 partner, the assessment clock has started. The question is whether you close the gaps before the auditor finds them.

TISAX Certification Does Not Have to Take 12 Months

Most suppliers underestimate remediation effort and overestimate internal speed. Our GRC team has delivered TISAX at all three levels — we know exactly where the gaps are.