Find out why Strike Graph is the right choice for your organization. What can you expect?
Find out why Strike Graph is the right choice for your organization. What can you expect?
For automotive vendors, TISAX compliance is no longer optional — it’s a ticket to doing business in the competitive auto industry. This guide compares the three TISAX assessment levels to help you prepare for compliance. Also, get a free TISAX prep checklist.
TISAX, or Trusted Information Security Assessment Exchange, has three assessment levels. Level 1 is a self-assessment mainly for internal purposes. Level 2 is a remote document audit, and Level 3 advances to an on-site audit. Only levels 2 and 3 result in a TISAX certificate, called a label.
The three levels aim to establish standard security assessments for organizations throughout the automotive supply chain. TISAX is mandatory for any vendor working with a German auto manufacturer and is quickly becoming the gold standard for U.S. automakers like Ford and General Motors.
The TISAX assessment levels match the sensitivity of information an organization handles, as defined by its TISAX assessment objectives and scope ID. Scope ID helps delineate the specific areas covered by the company’s information security management system (ISMS). For example, a supplier handling prototype vehicle data may have a scope ID requiring assessment level 3 (AL 3), whereas an HR service provider handling employee data might only need AL 2.
Also, take note that suppliers already certified for ISO 27001 have a head start. The German Association of the Automotive Industry (VDA) developed TISAX based on ISO 27001 but also included automotive-specific requirements. (For more, see our article on TISAX vs. ISO 27001.)
TISAX controls remain the same across all three assessment levels, though the assessment approach changes significantly by level. Here’s a quick overview of the TISAX security requirements:
TISAX Level 1, also called AL 1 for assessment level 1, is the entry point for organizations to establish information security. Level 1 relies on self-assessment and doesn’t result in a TISAX label. However, it does help prepare an organization for Level 2 or Level 3.
“TISAX Level 1 is not merely a preliminary step but a critical foundation for building an organization's information security framework,” says Michael Kirsch, co-founder, board member and customer success officer at ISEGRIM X, an information security company in Friedrichshafen, Germany. “While it is an internal exercise, it enables organizations to establish baseline controls and prepare for AL2 or AL3 assessments.”
The TISAX self-assessment is available as an Excel download from the ENX Association, which manages TISAX.
With TISAX Level 2, a third-party auditor remotely reviews your organization’s self-assessment and documentation and interviews you on a call. This is called a plausibility check.
“He will check if what you have written and are referencing makes sense or not,” Kirsch says. “It is not that you have to send in documents. You just have to have the catalog filled out and reference your documents by name.”
He adds: “Then the auditor will have some questions. He normally does a 4- or 5-hour online call, and he might ask you to show some of these documents online. And he just checks if this makes sense, or if this doesn't make sense, and then you will get your audit result.”
The required security controls remain the same across all three TISAX levels. However, Level 2 (AL 2) demands stronger enforcement, clearer evidence of compliance, and a more formalized approach to risk management. This level is often required when handling sensitive but not highly classified data.
TISAX Level 2.5 is an alternative approach to Level 2. An auditor does a full remote assessment instead of the usual plausibility check of the organization’s self-assessment.
“The advantage of AL 2.5 is that the approach is methodically compatible with AL 3,” states the TISAX Participant Handbook. “It is therefore possible to upgrade to a full-fledged assessment in AL 3 with a manageable effort at a later point in time.”
Kirsch says AL 2.5 was mainly used during COVID-19 when on-site visits became more difficult.
TISAX Level 3 (AL 3) includes an on-site security audit for organizations managing highly sensitive information. This includes prototypes, advanced development projects, and highly confidential business data.
An accredited TISAX audit provider performs an on-site audit to thoroughly evaluate the organization’s controls and processes. This ensures that the implemented measures meet the highest standards of protection required for critical and classified data.
A Level 3 assessment starts the same way as Level 2, with an auditor reviewing your documentation.
“But he will also be on-site conducting a physical security audit,” Kirsch says, “meaning he will go through your facility and check if the measurements that are required by the catalog are met, and he will also ask you to provide evidence. What have you written in these documents? Did you execute them? Is the process implemented? Do you have evidence on what this process looks like?”
TISAX Level 2 involves a remote audit to verify protections for sensitive information like intellectual property. Level 3 requires an on-site audit and goes into more depth to ensure you can properly handle highly sensitive data, like prototypes.
AL2 and AL3 share the same security control domains, but they differ significantly in their depth of validation and audit rigor. AL2 requires organizations to demonstrate structured implementation of security controls through documentation and remote audits. In contrast, AL3 mandates include an on-site audit and verify that security controls are not only implemented but actively functioning as intended.
Kirsch sums up the difference between Level 2 and 3 assessments: “Level 2 is you will fill out a questionnaire with documents that you will send to the auditor, and he will conduct an audit. Level 3 is you will send him this catalog with the documents, but he will also spend two, three, four days on-site, at your location to conduct physical security.”
TISAX Assessment Level 2 vs. Level 3 |
||
AL2 |
AL3 |
|
Assessment Type |
Self-assessment with external plausibility check |
Comprehensive external audit by a TISAX-approved auditor |
Evidence Requirement |
Limited documentation review |
Extensive documentation review, including evidence collection |
Site Visits |
Not required (remote plausibility check is sufficient). |
Mandatory on-site audits for in-depth verification. |
Depth of Review |
Evaluates existence of security measures. |
Evaluates effectiveness, implementation, and sustainability of security measures |
Audit Frequency |
Usually every 3 years |
Usually every 3 years but may include additional follow-ups |
Certification Validity |
Valid for up to 3 years |
Valid for up to 3 years |
TISAX assessment levels (AL1, AL2, and AL3) define the audit type and depth, while maturity levels (0-5) measure an organization's information security management system (ISMS). TISAX requires aligning assessment levels with a strong ISMS maturity framework.
Here are the ISMS maturity levels from the TISAX Participant Handbook:
“The ISA (Information Security Assessment) uses the concept of ‘maturity levels’ to rate the quality of all aspects of your information security management system,” states the TISAX Participant handbook. “The more sophisticated your information security management system is, the higher your maturity level will be.”
Using the right tools – such as a Governance, Risk and Compliance (GRC) system, can make a big difference, says Micah Spieler, Chief Product Officer at Strike Graph.
“Implementing any ISMS from scratch can feel daunting,” Spieler says, “and so I think it’s important to consider what additional tools might help organize your growing security program. Consider GRC systems, central document repositories, and mobile device management software. If you go with a consultant, they can help you select the right tools for your needs.”
TISAX has four main elements. Assessment objectives define the security areas to be evaluated. Assessment levels determine the audit's depth. Maturity levels reflect how well you manage security processes. TISAX labels are the result.
Here’s a more detailed look at how the TISAX levels connect with the other elements in the TISAX framework:
Kirsch of ISEGRIM X provides this practical example of how the TISAX elements interconnect:
“Imagine a car manufacturer is developing a new vehicle prototype. The TISAX assessment objective is prototype protection. Due to the sensitive nature, the audit is conducted at Assessment Level 3 (on-site audit). The organization demonstrates a high maturity level, showing its security processes are well-implemented, monitored, and improved. After passing the audit, the company is awarded a prototype protection label, which it can share with partners to prove compliance.”
Kirsch provides the following table to further explain how the TISAX elements interconnect.
TISAX Element |
What It Is |
Purpose |
Examples and Details |
TISAX Assessment Objectives |
Defines the key security areas being evaluated during the assessment. |
Focuses the assessment on key areas relevant to the organization’s operations and risk profile. |
Examples of objectives: - Prototype Protection: Safeguarding physical or digital product designs. - Data Protection: Ensuring compliance with GDPR and other privacy regulations. - Availability: Guaranteeing that critical systems remain operational. |
Assessment Levels (AL) |
Determines the depth and rigor of the audit based on the organization's risk level. |
Matches the intensity of the audit with the sensitivity of the information being protected. |
The assessment levels are: - AL 2: An external auditor validates compliance remotely, for medium-risk situations. - AL 3: A detailed on-site audit for high-risk or highly sensitive environments. |
Maturity Levels |
On a 0-5 scale, this measures how advanced a company is in implementing and managing security processes. |
Ensures that security controls are not only in place but also consistently applied, monitored, and improved. |
Key aspects of maturity include: - Implementation: Are measures properly installed and functional? - Documentation: Are policies and processes well-documented? - Measurement: Is security performance monitored? - Continuous Improvement: Does the organization refine and enhance processes over time? |
TISAX Labels |
The result of the assessment process, showing compliance with specific security requirements. |
Standardized labels help organizations communicate security capabilities to clients and partners in a clear, trusted way. |
Examples of TISAX labels: - Prototype Protection: For securing physical or digital prototypes. - Data Protection: For demonstrating compliance with GDPR. - High Availability / Very High Availability: For systems requiring uninterrupted uptime. |
TISAX applies to companies in the auto supply chain. This includes parts suppliers and software, engineering, and logistics firms. Also, TISAX labels are location-specific. A company with more than one physical location must earn the necessary TISAX label for each location involved in the work.
TISAX Level 1 is for automotive-related companies seeking a self-assessment for baseline security. These could be logistics providers, administrative service firms, or small suppliers. It doesn’t lead to a TISAX label.
Auto parts suppliers and vendors typically need TISAX Level 2 (AL2) if they handle sensitive business information. This could include confidential manufacturing processes or customer data.
R&D firms, prototype manufacturers, and design consultants handling highly confidential information will likely need TISAX Level 3 (AL3). This level includes on-site physical audits.
Automotive contractors must implement particular information security measures based on their assessment level. For Levels 2 and 3, contractors must undergo a formal assessment by an accredited audit provider. Contracts will typically specify whether you need AL 2 or AL 3 to do work for an auto company.
Here are the overall steps to prepare for TISAX compliance:
Click here to download the checklist today
ISO 27001 provides an ISMS framework to meet TISAX requirements. Having ISO 27001 certification provides a head-start on TISAX, which is based on its principles and many of its controls.
“Having an ISO 27001 program already in place is like starting a race from the halfway mark,” says Strike Graph’s Spieler. “There’s significant overlap. You’ll be very well prepared for continuing to refine your program to meet the specific requirements defined for TISAX without having to start from scratch."
For more, see our full article on TISAX vs. ISO 27001.
The biggest benefits come with TISAX levels 2 and 3. Passing the audit results in a TISAX label, making you eligible to win more contracts. However, even Level 1 has the benefit of establishing your information security foundation.
Here’s a more detailed overview of TISAX benefits for assessment levels 2 and 3:
How long TISAX takes depends on your starting point. It will often take 12-15 months or more, but it depends on the maturity of your ISMS, the size of your organization, and how prepared you are for your audit.
A business without an ISMS will need to implement one. That takes at least 12 months, as you need to complete a Plan-Do-Check-Act (PDCA) cycle. That means preparing documentation, implementing and reviewing processes, and doing an internal audit.
Organizations that already follow ISO 27001 may complete the process more quickly, as many of the required security controls are already in place. Internal readiness also plays a major role—companies with well-documented policies, risk assessments, and security procedures will require less preparation time.
If auditors find non-conformities during the assessment, organizations will need additional time to implement corrective actions before certification is granted. Scheduling availability for TISAX auditors, particularly for AL3 on-site assessments, can also affect the timeline.
To speed up the TISAX certification process, organizations should begin with a gap assessment to identify missing security measures early. Companies that are already ISO 27001 certified can leverage existing security frameworks to streamline compliance. Using compliance management tools can also help organizations document security measures efficiently and prepare for audits more effectively.
It’s also important to note that you can’t upgrade from Level 2 to Level 3 without starting over with a new auditor. For this reason, it may benefit companies to do a Level 3 assessment even if current opportunities require only Level 2
TISAX costs vary widely depending on existing security practices, company size, and resources. Organizations with a well-established ISMS or ISO 27001 certification generally face lower costs. Level 3 (AL 3) will typically cost 20 percent more than Level 2 (AL 2).
Expenses include the ENX registration fee (around $500 per site), audit provider fees, implementation costs for security upgrades, and consulting fees. Many companies hire consultants to help with preparation, which can streamline the process and reduce the risk of non-conformities.
For all levels, audit findings and non-conformities can increase costs if corrective actions are required before certification is granted. To keep expenses under control, organizations should conduct internal audits, address security gaps early, and leverage existing security frameworks where possible.
As with any security framework, there’s a lot of information to process and work to do. It may be daunting if you’re approaching TISAX for the first time, but it doesn’t have to be.
Strike Graph’s comprehensive compliance platform helps automotive companies and their vendors prepare for and achieve TISAX labels in simple, manageable steps. You design, operate, and measure your security program all in one place — making TISAX compliance far quicker and cheaper than it has ever been with traditional approaches.
Strike Graph makes it simple to design, operate, and measure your ISMS on one comprehensive platform, speeding your TISAX process.
Your TISAX level depends on audit requirements set by your business partners and the sensitivity of the information you handle. AL1 is for self-assessment, AL2 requires a remote audit, and AL3 involves an on-site audit for stricter verification. Contracts and risk factors typically determine the required level.
The highest maturity level in TISAX is level 5. It's called "Optimized." At this stage, security processes are fully integrated, continuously improved, and aligned with business goals. You proactively manage risks and automate security steps.
No, only AL2 and AL3 require an external audit. AL1 is a self-assessment with no auditor validation. AL2 includes a remote audit by a TISAX-approved auditor. AL3 requires a comprehensive on-site audit for higher security verification.
There are no regulatory fines for failing TISAX. However, you may lose opportunities. Automakers may require TISAX certification for partnerships.
Can I downgrade my TISAX level if my data sensitivity decreases?
TISAX certification does not downgrade; it simply expires after three years. When seeking a new certification, you can choose a lower assessment level if your data sensitivity has changed. However, partners may still require a higher level, so review contract obligations.
How do partner or vendor assessments impact my TISAX level compliance?
Your TISAX compliance depends not just on your own security but also on how well your vendors and partners protect shared information. Business partners may require you to assess third-party security or enforce stricter controls. Weak vendor security can lead to audit findings or higher assessment level requirements.
Encryption is essential for AL2 and AL3. Protecting confidential and highly sensitive data is required. It ensures data remains secure during storage and transmission.
The security landscape is ever changing. Sign up for our newsletter to make sure you stay abreast of the latest regulations and requirements.
Strike Graph offers an easy, flexible security compliance solution that scales efficiently with your business needs — from SOC 2 to ISO 27001 to GDPR and beyond.
© 2025 Strike Graph, Inc. All Rights Reserved • Privacy Policy • Terms of Service • EU AI Act
Fill out a simple form and our team will be in touch.
Experience a live customized demo, get answers to your specific questions , and find out why Strike Graph is the right choice for your organization.
What to expect:
We look forward to helping you with your compliance needs!
Fill out a simple form and our team will be in touch.
Experience a live customized demo, get answers to your specific questions , and find out why Strike Graph is the right choice for your organization.
What to expect:
We look forward to helping you with your compliance needs!