TISAX
Automotive framework for standardized security assessments exchange
ISO 28000
International standard for supply chain security management systems
Quick Verdict
TISAX ensures information security for automotive supply chains via tiered assessments, while ISO 28000 builds resilient security management systems for any sector. Automotive firms adopt TISAX for OEM contracts; others use ISO 28000 for broad supply chain risk mitigation and certification.
TISAX
Trusted Information Security Assessment Exchange (TISAX)
Key Features
- Centralized ENX portal shares assessments across partners
- Automotive-specific prototype protection controls
- Tiered levels (AL1-AL3) match protection needs
- VDA ISA catalog extends ISO 27001 controls
- Three-year labels eliminate duplicate OEM audits
ISO 28000
ISO 28000:2022 Security management systems Requirements
Key Features
- Risk-based assessment for supply chain threats
- PDCA cycle for continual security improvement
- Top management leadership and commitment
- Controls for external providers and processes
- Integration with ISO 31000 and 22301
Detailed Analysis
A comprehensive look at the specific requirements, scope, and impact of each standard.
TISAX Details
What It Is
TISAX (Trusted Information Security Assessment Exchange) is an industry framework developed by the ENX Association and VDA for the automotive sector. It standardizes assessments of information security, focusing on protecting sensitive data like IP, prototypes, and personal information in global supply chains. Rooted in ISO 27001, it uses a risk-based approach with the VDA ISA catalog (70+ controls) across policy, access, operations, and prototypes.
Key Components
- Core pillars: CIA triad extended to prototype protection, supplier risks, incident response.
- **Three assessment levelsAL1 (self), AL2 (remote), AL3 (on-site).
- Modular objectives: information security, data protection, prototypes.
- Certification via ENX-accredited providers; 3-year labels shared on ENX portal.
Why Organizations Use It
OEMs mandate it contractually for suppliers; non-compliance risks contract loss. Benefits include audit reduction (70-90%), market access, resilience. Builds trust, mitigates breaches costing millions.
Implementation Overview
Phased: scope/gap analysis (1-3 months), remediate/controls (3-9 months), audit (2-4 months), sustainment. Applies to suppliers/OEMs/services; scalable for SMEs to enterprises via self-assessments or audits. Costs €15k-€150k+; 6-18 months typical.
ISO 28000 Details
What It Is
ISO 28000:2022 — Security management systems — Requirements is an international certification standard specifying requirements for a security management system (SMS) addressing supply chain security risks. It employs a risk-based PDCA (Plan-Do-Check-Act) methodology, aligned with ISO high-level structure.
Key Components
- Clauses 4–10: context, leadership, planning, support, operation, evaluation, improvement
- Risk assessment/treatment per ISO 31000; security plans per ISO 22301
- No fixed controls; tailored operational processes
- Third-party certification via accredited bodies (ISO 28003)
Why Organizations Use It
- Mitigates theft, sabotage, disruptions; enhances resilience
- Meets contractual, regulatory, insurance demands
- Enables market access, partner requirements
- Boosts credibility through audits/certification
Implementation Overview
- Phased: gap analysis, risk planning, controls, training, audits
- Scalable for all sizes/industries with supply chains
- 6–18 months typical; internal/external audits required (181 words)
Key Differences
| Aspect | TISAX | ISO 28000 |
|---|---|---|
| Scope | Information security, prototypes, CIA triad | Supply chain security, risks, resilience |
| Industry | Automotive supply chain, global OEMs | All sectors, logistics, manufacturing |
| Nature | Voluntary industry assessment, ENX portal | Voluntary management system standard |
| Testing | AL1-AL3 audits, 3-year labels, on-site | Internal audits, certification, surveillance |
| Penalties | Contract loss, no legal fines | No penalties, business/reputational risk |
Scope
Industry
Nature
Testing
Penalties
Frequently Asked Questions
Common questions about TISAX and ISO 28000
TISAX FAQ
ISO 28000 FAQ
You Might also be Interested in These Articles...

Top 5 Reasons NIST SP 800-53 Rev 5 Overlays Unlock AI Risk Management for Private Sector Enterprises in 2025
Top 5 reasons NIST SP 800-53 Rev 5 AI overlays unlock risk management for private enterprises. Tailorable controls combat model poisoning & data leakage. CISO i

CMMC Level 2 Implementation Guide for Small DIB Contractors: First 5 Steps to C3PAO Certification with Infographic
Actionable CMMC Level 2 guide for small DIB contractors: 5-step roadmap to C3PAO certification with infographic on timelines, costs & POA&Ms. Achieve DoD compli

Why the SEC Stepped In: The Investor-Driven Push for Cybersecurity Transparency
Discover why the SEC's 2023 cybersecurity rules treat cyber risks as material financial threats. Explore the 'stick and carrot' approach for standardized disclo
Run Maturity Assessments with GRADUM
Transform your compliance journey with our AI-powered assessment platform
Assess your organization's maturity across multiple standards and regulations including ISO 27001, DORA, NIS2, NIST, GDPR, and hundreds more. Get actionable insights and track your progress with collaborative, AI-powered evaluations.
Check out these other Gradum.io Standards Comparison Pages
NIST CSF vs SOC 2
Decode NIST CSF vs SOC 2: NIST's flexible Govern-led risk framework vs SOC 2's audited Security TSC. Pick the right path for robust cyber compliance today.
CSL (Cyber Security Law of China) vs ISO 27701
Compare CSL (Cyber Security Law of China) vs ISO 27701: Unpack data localization, CII rules & PIMS controls for compliance mastery. Turn mandates into China market edge—explore now!
TISAX vs ISO 21001
Compare TISAX vs ISO 21001: Automotive cybersecurity vs educational management systems. Key differences, compliance tips & strategies. Choose the right standard now!