Back to Course
VDA/ISA TISAX controls and description of implementation
0% Complete
0/88 Steps
-
1. Information security policies and organization1.1 Information security policies1 Topic
-
1.2 Organization of information security4 Topics
-
1.2.1 To what extent is information security managed within the organization?
-
1.2.2 To what extent are information security responsibilities organized?
-
1.2.3 To what extent are information security requirements taken into account in projects?
-
1.2.4 To what extent are responsibilities between external IT service providers and the own organization defined?
-
1.2.1 To what extent is information security managed within the organization?
-
1.3 Asset management3 Topics
-
1.3.1 To what extent are information assets identified and recorded?
-
1.3.2 To what extent are information assets classified and managed in terms of their protection needs?
-
1.3.3 To what extent is it ensured that only evaluated and approved external IT services are used for processing the organization’s information assets?
-
1.3.1 To what extent are information assets identified and recorded?
-
1.4 Information security risk management1 Topic
-
1.5 Assessments2 Topics
-
1.6 incident management1 Topic
-
2. Human resources2.1 Human resources4 Topics
-
2.1.1 To what extent is the suitability of employees for sensitive work fields ensured?
-
2.1.2 To what extent is all staff contractually bound to comply with information security policies?
-
2.1.3 To what extent is staff made aware of and trained with respect to the risks arising from the handling of information?
-
2.1.4 To what extent is teleworking regulated?
-
2.1.1 To what extent is the suitability of employees for sensitive work fields ensured?
-
3. Physical security and business continuity3.1 Physical security and business continuity4 Topics
-
3.1.1 To what extent are security zones managed to protect information assets?
-
3.1.2 To what extent is information security ensured in exceptional situations?
-
3.1.3 To what extent is the handling of supporting assets managed?
-
3.1.4 To what extent is the handling of mobile IT devices and mobile data storage devices managed?
-
3.1.1 To what extent are security zones managed to protect information assets?
-
4. Identity and access management4.1 Identity management3 Topics
-
4.2 Access management1 Topic
-
5. IT security/ cyber security5.1 Cryptography2 Topics
-
5.2 Operations security7 Topics
-
5.2.1 To what extent are changes managed?
-
5.2.2 To what extent are development and testing environments separated from operational environments?
-
5.2.3 To what extent are IT systems protected against malware?
-
5.2.4 To what extent are event logs recorded and analyzed?
-
5.2.5 To what extent are vulnerabilities identified and addressed?
-
5.2.6 To what extent are IT systems technically checked (system audit)?
-
5.2.7 To what extent is the network of the organization managed?
-
5.2.1 To what extent are changes managed?
-
5.3 System acquisitions, requirement management and development4 Topics
-
5.3.1 To what extent is information security considered in new or further development of IT systems?
-
5.3.2 To what extent are requirements for network services defined?
-
5.3.3 To what extent is the return and secure removal of information assets from external IT services regulated?
-
5.3.4 To what extent is information protected in shared external IT services?
-
5.3.1 To what extent is information security considered in new or further development of IT systems?
-
6. Supplier relationships6.1 Supplier relationships2 Topics
-
7. Compliance7.1 Compliance2 Topics
-
8. Prototype protection8.1 Physical and environmental security8 Topics
-
8.1.1 To what extent is a security concept available describing minimum requirements regarding the physical and environmental security for prototype protection?
-
8.1.2 To what extent is perimeter security existent preventing unauthorized access to protected property objects?
-
8.1.3 To what extent is the outer skin of the protected buildings constructed such as to prevent removal or opening of outer-skin components using standard tools?
-
8.1.4 To what extent is view and sight protection ensured in defined security areas?
-
8.1.5 To what extent is the protection against unauthorized entry regulated in the form of access control?
-
8.1.6 To what extent are the premises to be secured monitored for intrusion?
-
8.1.7 To what extent is a documented visitor management in place?
-
8.1.8 To what extent is on-site client segregation existent?
-
8.1.1 To what extent is a security concept available describing minimum requirements regarding the physical and environmental security for prototype protection?
-
8.2 Organizational requirements7 Topics
-
8.2.1 To what extent are non-disclosure agreements/obligations existent according to the valid contractual law?
-
8.2.2 To what extent are requirements for commissioning subcontractors known and fulfilled?
-
8.2.3 To what extent do employees and project members evidently participate in training and awareness measures regarding the handling of prototypes?
-
8.2.4 To what extent are security classifications of the project and the resulting security measures known?
-
8.2.5 To what extent is a process defined for granting access to security areas?
-
8.2.6 To what extent are regulations for image recording and handling of created image material existent?
-
8.2.7 To what extent is a process for carrying along and using mobile video and photography devices in(to) defined security areas established?
-
8.2.1 To what extent are non-disclosure agreements/obligations existent according to the valid contractual law?
-
8.3 Handling of vehicles, components and parts2 Topics
-
8.3.1 To what extent are transports of vehicles, components or parts classified as requiring protection arranged according to the customer requirements?
-
8.3.2 To what extent is it ensured that vehicles, components and parts classified as requiring protection are parked/stored in accordance with customer requirements?
-
8.3.1 To what extent are transports of vehicles, components or parts classified as requiring protection arranged according to the customer requirements?
-
8.4 Requirements for trial vehicles3 Topics
-
8.4.1 To what extent are the predefined camouflage regulations implemented by the project members?
-
8.4.2 To what extent are measures for protecting approved test and trial grounds observed/implemented?
-
8.4.3 To what extent are protective measures for approved test and trial drives in public observed/implemented?
-
8.4.1 To what extent are the predefined camouflage regulations implemented by the project members?
-
8.5 Requirements for events and shootings2 Topics
-
8.5.1 To what extent are security requirements for presentations and events involving vehicles, components or parts classified as requiring protection known?
-
8.5.2 To what extent are the protective measures for film and photo shootings involving vehicles, components or parts classified as requiring protection known?
-
8.5.1 To what extent are security requirements for presentations and events involving vehicles, components or parts classified as requiring protection known?
-
9. Data protection9.1 Data protection4 Topics
-
9.1.1 To what extent is the implementation of data protection organized?
-
9.1.2 To what extent are organizational measures taken in order to ensure that personally identifiable data is processed in conformance with legislation?
-
9.1.3 To what extent is it ensured that the internal processes or workflows are carried out according to the currently valid data protection regulations and that these are regularly subjected to a quality check?
-
9.1.4 To what extent are the relevant processing procedures documented with regard to their admissibility according to data protection law?
-
9.1.1 To what extent is the implementation of data protection organized?
Lesson 2, Topic 1
In Progress
1.2.1 To what extent is information security managed within the organization?
Jonas December 18, 2020
Lesson Progress
0% Complete
Objective: Only if information security is part of the strategic goals of an organization, information security can be implemented in an organization in a sustainable manner. The information security management system (ISMS) is a control mechanism used by the organization’s management to ensure that information security is the result of sustainable management rather than that of mere coincidence and individual effort. | |
Explanation: Here it should be clearly defined which locations, departments, networks, resources or processes are included and which are not. Additional the management should be informed about the ISMS. | |
Requirements: Must: + The scope of the ISMS (the organization managed by the ISMS) is defined. + The organization’s requirements for the ISMS are determined. + The organizational management has commissioned and approved the ISMS. + The ISMS provides the organizational management with suitable monitoring and control means (e.g. management review). + Applicable controls have been identified (e.g. ISO 27001 Statement of Applicability, completed ISA Questionary). + The effectiveness of the ISMS is regularly reviewed by the management. | |
Can be fulfilled as follows: The scope of the ISMS is defined. Often this simply applies to the whole company, but there are also outsourced processes that do not work with information worth protecting and can therefore also be excluded. By the standard point 1.1.1 the requirements of the company should already be defined. You should carry out a management review at least once a year and on an ad hoc basis in order to provide management with appropriate information about the ISMS. During the ISMS implementation you should fill in the VDA ISA catalogue (description of the implementation, assessment of the maturity level and the reference documents). | |
Should: The norm chapter does not define should requirements for this chapter. | |
This means no additional steps for you. | |
High protection: The norm chapter does not define should requirements for this chapter. | |
This means no additional steps for you. | |
Very high protection: The norm chapter does not define additional measures if you are targeting a security level very high. | |
This means no additional steps for you. |
Description of implementation:
- The scope of the ISMS is defined and described. The ISMS meets the requirements of the VDA ISA catalogue (V5.0.3). (see scope)
- The organisation’s requirements for the ISMS are also established and defined. (see information security policy; chapters 1.1 & 1.2).
- Through the release of the two guiding documents, the ISMS is mandated and defined by the organisation’s top management.
- Reporting to top management takes place at least once a year through the management review. However, the top management is also informed of event-related situations. This also includes a review of the effectiveness of the ISMS.
- The system documentation is on the intranet, has been released and is managed.
- Applicable controls were determined using VDA ISA 5.0 and are documented. (see completed VDA ISA catalogue).
Reference documents:
- Definition of Scope
- Information security policy
- Management review