Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
TISAX is an assessment and exchange mechanism for the information security of enterprises and allows recognition of assessment results among the participants.
TISAX (Trusted Information Security Assessment Exchange) is an assessment and exchange mechanism for the information security of enterprises and allows recognition of assessment results among the participants.
This framework includes TISAX's information security requirements, which are mandatory for all TISAX participants. Framework can be further expanded with prototype protection and data protection requirements found as extension frameworks.
Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!
Objective:The organization needs at least one information security policy. This reflects the importance and significance of information security and is adapted to the organization. Additional policies may be appropriate depending on the size and structure of the organization.
Requirements (must): The requirements for information security have been determined and documented:
- The requirements are adapted to the organization’s goals,
- A policy is prepared and is released by the organization.
The policy includes objectives and the significance of information security within the organization."
Requirements (should): The information security requirements based on the strategy of the organization, legislation and contracts are considered in the policy.
The policy indicates consequences in case of non-conformance.
Other relevant security policies are established.
Periodic review and, if required, revision of the policies are established.
The policies are made available to employees in a suitable form (e.g. intranet).
Employees and external business partners are informed of any changes relevant to them.
Objective: Only if information security is part of the strategic goals of an organization, information security can be implemented in an organization in a sustainable manner. The information security management system (ISMS) is a control mechanism used by the organization’s management to ensure that information security is the result of sustainable management rather than that of mere coincidence and individual effort.
Requirements (must): The scope of the ISMS (the organization managed by the ISMS) is defined.
The organization's requirements for the ISMS are determined.
The organizational management has commissioned and approved the ISMS.
The ISMS provides the organizational management with suitable monitoring and control means (e.g. management review).
Applicable controls have been determined (e.g. ISO 27001 Statement of Applicability, completed ISA catalogue).
The effectiveness of the ISMS is regularly reviewed by the management.
Requirements (should): -
Objective: A successful ISMS requires clear responsibilities within the organization.
Requirements (must):"+ Responsibilities for information security within the organization are defined, documented, and assigned.
The responsible employees are defined and qualified for their task.
The required resources are available.
The contact persons are known within the organization and to relevant business partners."
Requirements (should): There is a definition and documentation of an adequate information security structure within the organization. Other relevant security roles are considered.
Objective: For project implementation, it is important to consider the information security requirements. This applies to projects within the organization regardless of their type. By appropriately establishing the information security process in the project management procedures of the organization, any overlooking of requirements is prevented.
Requirements (must): Projects are classified while taking into account the information security requirements.
Requirements (should): The procedure and criteria for the classification of projects are documented.
During an early stage of the project, risk assessment is conducted based on the defined procedure and repeated in case of changes to the project.
For identified information security risks, measures are derived and considered in the project.
Objective: It is important, that a common understanding of the division of responsibilities exists and that the implementation of all security requirements is ensured. Therefore, when using external IT service providers and IT services, the responsibilities regarding the implementation of information security measures are to be defined and verifiably documented.
Requirements (must): The concerned services and IT services used are identified.
The security requirements relevant to the IT service are determined:
The organization responsible for implementing the requirement is defined and aware of its responsibility.
Mechanisms for shared responsibilities are specified and implemented.
The responsible organization fulfils its respective responsibilities.
Requirements (should): "+ In case of IT services, configuration has been conceived, implemented, and documented based on the necessary security requirements.
The responsible staff is adequately trained.
Objective: It is important for each organization to know the information constituting its essential assets (e.g. business secrets, critical business processes, know-how, patents). They are referred to as information assets. An inventory ensures that the organization obtains an overview of its information assets. Moreover, it is important to know the supporting assets (e.g. IT systems, services/IT services, employees) processing these information assets.
Requirements (must): Information assets and other assets where security is relevant to the organization are identified and recorded.
- A person responsible for these information assets is assigned.
The supporting assets processing the information assets are identified and recorded:
- A person responsible for these supporting assets is assigned.
Requirements (should): A catalogue of the relevant information assets exists:
- The corresponding supporting assets are assigned to each relevant information asset,
- The catalogue is subject to regular review.
Objective: The objective of classifying information assets is the consistent determination of their protection needs. For this purpose, the value the information has for the organization is determined based on the protection goals of information security (confidentiality, integrity, and availability) and classified according to a classification scheme. This enables the organization to implement adequate protective measures.
Requirements (must): A consistent scheme for the classification of information assets regarding the protection goal of confidentiality is available.
Evaluation of the identified information assets is carried out according to the defined criteria and assigned to the existing classification scheme.
Specifications for the handling of supporting assets (e.g. identification, correct handling, transport, storage, return, deletion/disposal) depending on the classification of information assets are in place and implemented.
Requirements (should): The protection goals of integrity and availability are taken into consideration.
Objective: Particularly in the case of external IT services that can be used at relatively low cost or free of charge, there is an increased risk that procurement and commissioning will be carried out without appropriate consideration of the information security requirements and that security therefore is not ensured.
Requirements (must): External IT services are not used without explicit assessment and implementation of the information security requirements:
- A risk assessment of the external IT services is available,
- Legal, regulatory, and contractual requirements are considered.
The external IT services have been harmonized with the protection need of the processed information assets.
Requirements (should): Requirements regarding the procurement, commissioning and release associated with the use of external IT services are determined and fulfilled.
A procedure for release in consideration of the protection need is established.
External IT services and their approval are documented.
It is verified at regular intervals that only approved external IT services are used.
Objective: Information processing is mostly done using of specific software. Security issues in software will easily become a risk for the information processed. Accordingly, software must be appropriately managed.
Requirements (must): Software is approved before installation or use. The following aspects are considered:
- Limited approval for specific use-cases or roles
- Conformance to the information security requirements
- Software use rights and licensing
- Source / reputation of the software
Software approval also applies to special purpose software such as maintenance tools
Requirements (should): The types of software such as firmware, operating systems, applications, libraries, device drivers to be managed are determined.
Repositories of managed software exist
The software repositories are protected against unauthorized manipulation
Approval of software is regularly reviewed
Software versions and patch levels are known
Objective: Information security risk management aims at the timely detection, assessment and addressing of risks in order to achieve the protection goals of information security. It thus enables the organization to establish adequate measures for protecting its information assets under consideration of the associated prospects and risks. It is recommended to keep the information security risk management of an organization as simple as possible such as to enable its effective and efficient operation.
Requirements (must): Risk assessments are carried out both at regular intervals and in response to events.
Information security risks are appropriately assessed (e.g. for probability of occurrence and potential damage).
Information security risks are documented.
A responsible person (risk owner) is assigned to each information security risk. This person is responsible for the assessment and handling of the information security risks.
Requirements (should): A procedure is in place defining how to identify, assess and address security risks within the organization.
Criteria for the assessment and handling of security risks exist.
Measures for handling security risks and the persons responsible for these are specified and documented:
- A plan of measures or an overview of their state of implementation is followed.
In case of changes to the environment (e.g. organizational structure, location, changes to regulations), reassessment is carried out in a timely manner.
Objective: It is not sufficient to define information security requirements and to prepare and publish policies. It is important to regularly review their effectiveness.
Requirements (must): Observation of policies is verified throughout the organization.
Information security policies and procedures are reviewed at regular intervals.
Measures for correcting potential non-conformities (deviations) are initiated and pursued.
Compliance with information security requirements (e.g. technical specifications) is verified at regular intervals.
The results of the conducted reviews are recorded and retained.
Requirements (should): A plan for content and framework conditions (time schedule, scope, controls) of the reviews to be conducted is provided.
Objective: As an essential control mechanism, assessing the effectiveness of the ISMS from merely an internal point of view is insufficient. Additionally, an independent and therefore objective assessment shall be obtained at regular intervals and in case of fundamental changes.
Requirements (must): Information security reviews are carried out by an independent and competent body at regular intervals and in case of fundamental changes.
Measures for correcting potential deviations are initiated and pursued.
Requirements (should): The results of conducted reviews are documented and reported to the management of the organization.
Objective: Potential security events or observations are detected by anyone. It is vital that anyone can and knows when and how to report anything that one has observed and that has potential security implications (observations) or events so that the experts can decide if and how it needs to be handled.
Requirements (must): "+ A definition for a reportable security event or observation exists and is known by employees and relevant stakeholders. The following aspects are considered:
- Events and observations related to personnel (e.g., misconduct / misbehaviour)
- Events and observations related to physical security (e.g., intrusion, theft, unauthorized access to security zones, vulnerabilities in the security zones)
- Events and observations related to IT and cyber security (e.g., vulnerable IT-systems, detected successful or unsuccessful attacks)
- Events and observations related to suppliers and other business partners (e.g., any incidents that can have negative effect on the security of own organization)
Adequate mechanisms based on perceived risks to report security events are defined, implemented, and known to all relevant potential reporters
Adequate channels for communication with event reporters exist.
Requirements (should): A common point of contact for event reporting exists.
Different reporting channels according to perceived severity exist (i.e., real time communication for significant events / emergencies in addition to asynchronous mechanisms such as tickets or email) are available.
Employees are obliged and trained to report relevant events.
Security event reports from external parties are considered.
- An externally accessible way to report security events exists and is communicated,
- Reaction to security event reports from external parties are defined
Mechanism to - and information how to - report incidents is accessible by all relevant reporters.
A feedback procedure to reporters is established.
Objective: Once security events are reported, it is vital that the handling of the events is managed. This means to ensure that the type and criticality of the reported event as well as the persons responsible are quickly identified to ensure that time-critical aspects can be handled in time. Once identification is done, ensuring that the responsible persons become aware and deal with the event within a reasonable time frame is necessary. Furthermore, if the event affects multiple different persons, or management also include coordinating communication is a important part of event management. Finally, if there are external (contractual or regulatory) reporting requirements, its important to ensure that these are also fulfilled in a professional way.
Requirements (must): Reported events are processed without undue delay.
An adequate reaction to reported security events is ensured.
Lessons learned are incorporated into continuous improvement.
Requirements (should): During processing, reported events are categorized (e.g. by responsibility into personnel, physical and cyber), qualified (e.g. not security relevant, observation, suggested security improvement, security vulnerability, security incident) and prioritized (e.g. low, moderate, severe, critical).
Responsibilities for handling of events based on their category are defined and assigned. The following aspects are considered:
- Coordination of incidents and vulnerabilities across multiple categories
- Qualification and resources
- Contact mechanisms based on type and priority (e.g., non-time-critical communication, time-critical communication, emergency communication)
- Absence-management
A strategy for filing official reports and searching prosecution of potentially criminally relevant aspects of security incidents exists. (C, I, A)
Objective: A crisis situation occurs If exceptional situations (e.g. natural disasters, physical attacks, pandemics, exceptional social situations, cyber-attacks causing major infrastructure failures) are severely disrupting key business operations. In such cases, the main priority of the organization is to handle the situation as gracefully as possible and recover as quickly as possible. To achieve that and since time is of the essence, switching to a crisis management mode executing pre-planned procedures having specific distribution of responsibilities and structures enables an organization to deal with such a situation is the usual approach.
Requirements (must): An appropriate planning to react to and recover from crisis situations exists.
- The required resources are available.
Responsibilities and authority for crisis management within the organization are defined, documented, and assigned.
The responsible employees are defined and qualified for their task.
Requirements (should): Methods to detect crisis situations are established.
- General indications for the existence or imminence of a crisis situation and specific predictable crisis are identified
A procedure to invoke and/or escalate crisis management is in place.
Strategic goals and their priority in crisis situations are defined and known to relevant personnel. The following aspects are considered:
- Ethical priorities (e.g., protection of life and health)
- Core business processes (e.g., processes that ensure the survival of the organization)
- Appropriate information security
A crisis management team is defined and approved. The following aspects are considered:
- Management commitment
- Composition (e.g., participation of all major functions of the organization including organization leadership (management board), business operations (production), HR, information security, corporate security, corporate emergency services, IT/cyber security, communication, finance)
- Structure and roles
- Competences of members
- Expectation and authority
- Decision making procedures
Crisis policies and procedures are defined and approved. The following aspects are considered:
- Exceptional authorities and decision-making processes beyond the crisis management team
- Primary and backup means of communication
- Emergency operating procedures
- Exceptional organizational structures (e.g., reporting, information gathering, decision making)
- Exceptional functions, responsibilities, and authority (including reporting)
- Exceptional tools
Crisis planning is reviewed and updated regularly.
Objective: Competent, reliable and trustworthy employees are a key to information security within the organization Therefore, it is important to check the qualifications of potential employees (e.g. applicants) to an appropriate extent.
Requirements (must): Sensitive work fields and jobs are determined.
The requirements for employees with respect to their job profiles are determined and fulfilled.
The identity of potential employees is verified (e.g. checking identity documents).
Requirements (should): The personal suitability of potential employees is verified by means of simple methods (e.g. job interview).
An extended suitability verification depending on the respective work field and job is conducted. (e.g. assessment centre, psychological analysis, checking of references, certificates and diploma, checking of certificates of conduct, checking of professional and private background).
Explore our comprehensive resources and improve your security with the themes of this framework.
Discover specific ways our platform streamlines your ISO 27001 compliance process, from automated controls to audit preparation.
Explore use caseTake our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.
Start assessmentDive deeper with our articles, case studies, and expert insights on framework implementation.
Read articleGet a concise overview of all requirements, controls, and implementation steps in our quick guide.
Get the guideSee how the overlap and differences with any other framework to optimize your compliance strategy.
Compare frameworkParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarUnderstand the basics of cyber security frameworks with our comprehensive guide.
Read the articleWhen building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.