Back to Course

VDA/ISA TISAX controls and description of implementation

0% Complete
0/88 Steps
  1. 1. Information security policies and organization
    1.1 Information security policies
    1 Topic
  2. 1.2 Organization of information security
    4 Topics
  3. 1.3 Asset management
    3 Topics
  4. 1.4 Information security risk management
    1 Topic
  5. 1.5 Assessments
    2 Topics
  6. 1.6 incident management
    1 Topic
  7. 2. Human resources
    2.1 Human resources
    4 Topics
  8. 3. Physical security and business continuity
    3.1 Physical security and business continuity
    4 Topics
  9. 4. Identity and access management
    4.1 Identity management
    3 Topics
  10. 4.2 Access management
    1 Topic
  11. 5. IT security/ cyber security
    5.1 Cryptography
    2 Topics
  12. 5.2 Operations security
    7 Topics
  13. 5.3 System acquisitions, requirement management and development
    4 Topics
  14. 6. Supplier relationships
    6.1 Supplier relationships
    2 Topics
  15. 7. Compliance
    7.1 Compliance
    2 Topics
  16. 8. Prototype protection
    8.1 Physical and environmental security
    8 Topics
  17. 8.2 Organizational requirements
    7 Topics
  18. 8.3 Handling of vehicles, components and parts
    2 Topics
  19. 8.4 Requirements for trial vehicles
    3 Topics
  20. 8.5 Requirements for events and shootings
    2 Topics
  21. 9. Data protection
    9.1 Data protection
    4 Topics
Lesson 10 of 21
In Progress

4.2 Access management

Jonas December 18, 2020