Back to Course
VDA/ISA TISAX controls and description of implementation
0% Complete
0/88 Steps
-
1. Information security policies and organization1.1 Information security policies1 Topic
-
1.2 Organization of information security4 Topics
-
1.2.1 To what extent is information security managed within the organization?
-
1.2.2 To what extent are information security responsibilities organized?
-
1.2.3 To what extent are information security requirements taken into account in projects?
-
1.2.4 To what extent are responsibilities between external IT service providers and the own organization defined?
-
1.2.1 To what extent is information security managed within the organization?
-
1.3 Asset management3 Topics
-
1.3.1 To what extent are information assets identified and recorded?
-
1.3.2 To what extent are information assets classified and managed in terms of their protection needs?
-
1.3.3 To what extent is it ensured that only evaluated and approved external IT services are used for processing the organization’s information assets?
-
1.3.1 To what extent are information assets identified and recorded?
-
1.4 Information security risk management1 Topic
-
1.5 Assessments2 Topics
-
1.6 incident management1 Topic
-
2. Human resources2.1 Human resources4 Topics
-
2.1.1 To what extent is the suitability of employees for sensitive work fields ensured?
-
2.1.2 To what extent is all staff contractually bound to comply with information security policies?
-
2.1.3 To what extent is staff made aware of and trained with respect to the risks arising from the handling of information?
-
2.1.4 To what extent is teleworking regulated?
-
2.1.1 To what extent is the suitability of employees for sensitive work fields ensured?
-
3. Physical security and business continuity3.1 Physical security and business continuity4 Topics
-
3.1.1 To what extent are security zones managed to protect information assets?
-
3.1.2 To what extent is information security ensured in exceptional situations?
-
3.1.3 To what extent is the handling of supporting assets managed?
-
3.1.4 To what extent is the handling of mobile IT devices and mobile data storage devices managed?
-
3.1.1 To what extent are security zones managed to protect information assets?
-
4. Identity and access management4.1 Identity management3 Topics
-
4.2 Access management1 Topic
-
5. IT security/ cyber security5.1 Cryptography2 Topics
-
5.2 Operations security7 Topics
-
5.2.1 To what extent are changes managed?
-
5.2.2 To what extent are development and testing environments separated from operational environments?
-
5.2.3 To what extent are IT systems protected against malware?
-
5.2.4 To what extent are event logs recorded and analyzed?
-
5.2.5 To what extent are vulnerabilities identified and addressed?
-
5.2.6 To what extent are IT systems technically checked (system audit)?
-
5.2.7 To what extent is the network of the organization managed?
-
5.2.1 To what extent are changes managed?
-
5.3 System acquisitions, requirement management and development4 Topics
-
5.3.1 To what extent is information security considered in new or further development of IT systems?
-
5.3.2 To what extent are requirements for network services defined?
-
5.3.3 To what extent is the return and secure removal of information assets from external IT services regulated?
-
5.3.4 To what extent is information protected in shared external IT services?
-
5.3.1 To what extent is information security considered in new or further development of IT systems?
-
6. Supplier relationships6.1 Supplier relationships2 Topics
-
7. Compliance7.1 Compliance2 Topics
-
8. Prototype protection8.1 Physical and environmental security8 Topics
-
8.1.1 To what extent is a security concept available describing minimum requirements regarding the physical and environmental security for prototype protection?
-
8.1.2 To what extent is perimeter security existent preventing unauthorized access to protected property objects?
-
8.1.3 To what extent is the outer skin of the protected buildings constructed such as to prevent removal or opening of outer-skin components using standard tools?
-
8.1.4 To what extent is view and sight protection ensured in defined security areas?
-
8.1.5 To what extent is the protection against unauthorized entry regulated in the form of access control?
-
8.1.6 To what extent are the premises to be secured monitored for intrusion?
-
8.1.7 To what extent is a documented visitor management in place?
-
8.1.8 To what extent is on-site client segregation existent?
-
8.1.1 To what extent is a security concept available describing minimum requirements regarding the physical and environmental security for prototype protection?
-
8.2 Organizational requirements7 Topics
-
8.2.1 To what extent are non-disclosure agreements/obligations existent according to the valid contractual law?
-
8.2.2 To what extent are requirements for commissioning subcontractors known and fulfilled?
-
8.2.3 To what extent do employees and project members evidently participate in training and awareness measures regarding the handling of prototypes?
-
8.2.4 To what extent are security classifications of the project and the resulting security measures known?
-
8.2.5 To what extent is a process defined for granting access to security areas?
-
8.2.6 To what extent are regulations for image recording and handling of created image material existent?
-
8.2.7 To what extent is a process for carrying along and using mobile video and photography devices in(to) defined security areas established?
-
8.2.1 To what extent are non-disclosure agreements/obligations existent according to the valid contractual law?
-
8.3 Handling of vehicles, components and parts2 Topics
-
8.3.1 To what extent are transports of vehicles, components or parts classified as requiring protection arranged according to the customer requirements?
-
8.3.2 To what extent is it ensured that vehicles, components and parts classified as requiring protection are parked/stored in accordance with customer requirements?
-
8.3.1 To what extent are transports of vehicles, components or parts classified as requiring protection arranged according to the customer requirements?
-
8.4 Requirements for trial vehicles3 Topics
-
8.4.1 To what extent are the predefined camouflage regulations implemented by the project members?
-
8.4.2 To what extent are measures for protecting approved test and trial grounds observed/implemented?
-
8.4.3 To what extent are protective measures for approved test and trial drives in public observed/implemented?
-
8.4.1 To what extent are the predefined camouflage regulations implemented by the project members?
-
8.5 Requirements for events and shootings2 Topics
-
8.5.1 To what extent are security requirements for presentations and events involving vehicles, components or parts classified as requiring protection known?
-
8.5.2 To what extent are the protective measures for film and photo shootings involving vehicles, components or parts classified as requiring protection known?
-
8.5.1 To what extent are security requirements for presentations and events involving vehicles, components or parts classified as requiring protection known?
-
9. Data protection9.1 Data protection4 Topics
-
9.1.1 To what extent is the implementation of data protection organized?
-
9.1.2 To what extent are organizational measures taken in order to ensure that personally identifiable data is processed in conformance with legislation?
-
9.1.3 To what extent is it ensured that the internal processes or workflows are carried out according to the currently valid data protection regulations and that these are regularly subjected to a quality check?
-
9.1.4 To what extent are the relevant processing procedures documented with regard to their admissibility according to data protection law?
-
9.1.1 To what extent is the implementation of data protection organized?
Lesson 16, Topic 4
In Progress
8.1.4 To what extent is view and sight protection ensured in defined security areas?
Jonas December 18, 2020
Lesson Progress
0% Complete