akrup logo.PNG

Gap analysis

Perform a Gap Analysis of your current processes and procedures against TISAX® Information Security controls.

TISAX® controls are based on:

We will identify gaps and propose the project plan to close nonconformities.

akrup logo.PNG

Assist with TISAX® requirements

Assist your organization with all TISAX® requirements, such as registration, choice of the auditor, present your company during an external audit.

akrup logo.PNG

Implement TISAX® controls

Once Gap Analysis is performed, we will work with your organization to implement the TISAX® controls. We will:

1. Draft all required:

  • Policies

  • Procedures,

  • Risk Assessment

  • Business Continuity, and Disaster Recovery Plans

  • Incident Response

  • Supplier Management. etc.

2. Deliver required Information 

    Security training and awareness

3. Perform Internal Audits and

    Management Reviews

akrup logo.PNG

Continual improvement

Assist your organisation with continual improvement by managing your ISMS going forward.

akrup logo.PNG

Retain an automotive client

Many car manufacturers require their suppliers to undergoTISAX®  audit. If you are a service provider or supplier to Audi, BMW, Daimler, Ford, Renault, Volkswagen, they may require your organization to undergo a TISAX® audit and achieve the TISAX® label.

akrup logo.PNG

Broad acceptance

There is a broad acceptance for TISAX® in the automotive industry allowing you to secure more clients. 

akrup logo.PNG

Improve structure and focus

TISAX® helps businesses become more productive by clearly setting out information risk responsibilities.



We are proud to work with these amazing companies

To play, press and hold the enter key. To stop, release the enter key.

We have a 100% success rate

To learn more about the TISAX® process, check out our TISAX ® brochure.

To learn about TISAX® requirements, please review the Information Security Assessment (ISA) of the Verband der Automobilindustrie (Association of the German Automotive Industry, VDA). VDA ISA provides the basis for a self-assessment to determine the state of information security in an organization.

Start your Journey

Contact us now for a free quote or if you have any questions.