Welcome to our tutorial on navigating the VDA ISA. At first glance, the document may seem daunting, but with some demystification, it'll become much clearer. We'll cover setup, and key features, and provide background to effectively use this essential standard for automotive industry information security.
🚗 💨 Let's dive in:
Table 7. Mapping between TISAX assessment objectives and ISA criteria catalogues
No. | Assessment objective | ISA criteria catalogue(s) |
1. | Info high | Information Security |
2. | Info very high | Information Security |
3. | Confidential | Information Security |
4. | Strictly confidential | Information Security |
5. | High availability | Information Security |
6. | Very high availability | Information Security |
7. | Proto parts | Prototype Protection |
8. | Proto vehicles | Prototype Protection |
9. | Test vehicles | Prototype Protection |
10. | Proto events | Prototype Protection |
11. | Data | Information Security |
12. | Special data | Information Security |
source: ENX Participation Handbook
Table 8. Applicability of requirements to the assessment objectives
No. | Assessment objective | Applicable requirements |
1. | Info high |
|
2. | Info very high |
|
3. | Confidential |
|
4. | Strictly confidential |
|
5. | High availability |
|
6. | Very high availability |
|
7. | Proto parts |
|
8. | Proto vehicles |
|
9. | Test vehicles |
|
10. | Proto events |
|
11. | Data |
|
12. | Special data |
|
source: ENX Participation Handbook
Return to the main Certification Guide to progress further in your Certification Journey. Each step builds upon the last, deepening your understanding and implementation of the standards required for certification.