Vda Isa 5.0.4 - en
Vda Isa 5.0.4 - en
Vda Isa 5.0.4 - en
The ISA consists of several tabs, the content and function of which are explained below. You will find actual requirements in the
Information Security, Data Protection and Prototype Protection.
With Version 5, the ISA structures requirements no longerin lines, but in columns. Additionally, it has introduced new numbering
combined topics. It retains the numbering of ISA 4 for easier finding of control questions according to the previous structure or t
rearrangement.
Maturity levels:
ISA provides assessment of the implementation by means of a six-level maturity model as defined in this tab. The maturity leve
comprise Incomplete, Performed, Managed, Established, Predictable and Optimizing.
With this ISA version, the target maturity level for all control questions is 3 (Established).
Definitions:
Under Definitions, the key terms of the requirements to be fulfilled are described. The associated requirements can be assigned
categories MUST and SHOULD, Additionally in case of HIGH protection needs and Additionally in case of VERY HIGH protecti
This subdivision is necessary as information of high and very high protection needs requires special protective measures.
Additionally, key terms and abbreviations are listed and explained in this tab.
Cover:
The cover contains boxes for information on the implementing organization, the scope of the assessment, the auditor and the c
person of the assessed organization.
Information Security:
The tab “Information Security” includes all basic controls based on the standard ISO/IEC 27001. The control questions themsel
formulated as questions. The objective of the respective control and the requirements for achieving it are listed in accordingly d
columns.
You must assess each control according to the degree to which the objective is achieved. You can record the assessed maturit
(as described in the tab “Maturity levels”) of each control in column E. The maturity levels will be automatically transferred to the
“Results”.
Additional columns give examples to support potential implementation.
Prototype Protection:
Prototype protection includes vehicles, components and parts which are classified as requiring protection but have not yet been
to the public and/or published in adequate form by the OEM.
The commissioning OEM department is responsible for classifying the protection needs of vehicles, components and parts. The
requirements for prototype protection are to be applied for protection classes High and Very high according to ISA.
Data Protection:
Use this tab only if you are processing personal data within the meaning of Art. 28 of the EU General Data Protection Regulatio
contains controls requiring merely yes/no answers.
INTERNAL #
Results (ISA5):
This tab will summarize and present the results of the individual tabs (assessment catalogue pages) in printing format in the ne
simplified structure of ISA 5.
The spider web diagram provides an overview of all controls. The list of all controls shows the target maturity levels to be achie
When calculating the overall result, the results of controls overachieving their target maturity level are cutback and averaged. T
ensures that the requirements are comprehensively fulfilled and that there is no compensation of overachieved and underachie
controls.
Results (ISA4):
This tab will summarize and present the results of the individual tabs (assessment catalogue pages) in printing format in the cla
structure of ISA 4.
The spider web diagram provides an overview of all controls. The list of all controls shows the target maturity levels to be achie
When calculating the overall result, the results of controls overachieving their target maturity level are cutback and averaged. T
ensures that the requirements are comprehensively fulfilled and that there is no compensation of overachieved and underachie
controls.
Examples KPI:
This tab shows examples of Key Performance Indicators (KPI) for measuring process results both for controls for which the ISA
defined a target maturity level of 4 and for controls where a measurement appears useful. The tab content provides support for
own suitable KPIs. It does not present mandatory requirements for achieving maturity level 4. In many cases, the definition of K
mandatory, but may be helpful for a central management of information security at many locations.
License:
License conditions under which the ISA is published.
Change history:
List of changes during the ISA lifecycle.
We recommend you to start with the tab “Information Security” thereby gaining an overview of the state of your information secu
ENX WG ISA and the VDA Working Group Information Security wish you every success.
INTERNAL#
Company / Organization:*
Address:*
Contact person:*
Telephone number:*
E-mail address:*
Creator:*
Signature:
Definition A process is not implemented or fails to achieve its process purpose. Little or no - The implemented process achieves its (process) purpose. Control of process implementation (PA 2.1):
evidence exists of any systematic achievement of the process purpose. - There is evidence that the intended base practices are implemented. - Objectives for the performance of the process are identified.
- Implementation of the process is planned and monitored.
- Implementation of the process is adjusted to meet plans.
- Responsibilities and authorities for implementing the process are defined,
assigned and communicated.
- Resources and information necessary for implementing the process are
identified, made available, assigned and used.
- Interfaces between the involved parties are managed to ensure effective
communication and clear assignment of responsibilities.
Work Product Management (PA 2.2):
- Requirements for the work products of the process are defined
- Requirements for documentation and control of the work products are defined.
- Work products are appropriately identified, documented and controlled.
- Work products are reviewed in accordance with planned measures and adjusted
as necessary to meet requirements.
Possible evidence + Work products providing evidence of process outcomes. + Process documentation
(GWP) + Process plan
+ Quality plan/records
+ Process implementation records
INTERNAL #
Process Definition (PA 3.1): Process Measurement (PA 4.1): Process Innovation (PA 5.1)
- A standard process, including appropriately adapted requirements, is defined - Process information requirements in support of relevant defined business goals - Process improvement objectives are defined for the respective process that
which describes the essential elements a defined process must comprise. are established. supports the relevant business goals.
- The sequence and interaction of the standard process with other processes are - Process measurement objectives are derived from process information - Appropriate data are analyzed to identify the common causes of variations in
determined. requirements. process performance.
- Competencies and roles required for process implementation are identified as - Quantitative objectives for process performance in support of relevant defined - Appropriate data are analyzed to identify options for best practice and
part of the standard process. business goals are established. innovation.
- The infrastructure and work environment required for process implementation - Characteristic values and frequency of measurements are identified and defined - Improvement options derived from new technologies and new process concepts
are identified as part of the standard process. in line with process measurement objectives and quantitative objectives for are identified.
- Suitable methods for monitoring the effectiveness and suitability of the process process performance. - An implementation strategy is established to achieve the process improvement
are determined. - Results of measurement are collected, analyzed and reported in order to objectives.
monitor the extent to which the quantitative
Process Deployment (PA 3.2): objectives for process performance are met. Continuous Optimization (PA 5.2):
- A defined process based on an appropriately selected and/or tailored standard - Measurement results are used to characterize process performance. - Impact of all proposed changes is assessed against the objectives of the defined
process is deployed. process and the standard process.
- Required roles, responsibilities and authorities for implementing the defined Process Control (PA 4.2): - Implementation of all agreed changes is managed to ensure that any disruption
process are assigned and communicated. - Analysis and control techniques are determined and applied, as applicable. to the process performance is understood and addressed.
- Staff performing the defined process are competent on the basis of appropriate - Variable control limits are established for normal process implementation. - Based on actual performance, effectiveness of process change is evaluated
education, training and experience. - Measurement data is analyzed for special variations. against the defined process requirements and process objectives to determine
- The necessary resources and information required for implementing the defined - Corrective actions are taken to address special variations. whether results are corresponding to common or special cases.
process are made available, allocated and used. - Control limits are re-established (as necessary) following corrective action.
- The necessary infrastructure and work environment required for implementing
the defined process are available, managed and maintained.
- Suitable data is collected and analyzed as a basis for understanding the
behaviour of the process, to demonstrate its suitability and effectiveness, and to
evaluate where continual process improvement (CPI) can be made.
Requirements (must) The requirements indicated in this column are strict requirements without any exemptions.
Requirements (should) The requirements indicated in this column are principally to be implemented by the organization. In certain
circumstances, however, there may be a valid justification for non-compliance with these requirements. In case of
any deviation, its effects must be understood by the organization and it must be plausibly justified.
Additional requirements in case of high The requirements indicated in this column must be additionally fulfilled where the assesed object requires high
protection needs protection needs.
Additional requirements in case of very high The requirements indicated in this column must be additionally fulfilled where the assessed object requires very
protection needs high protection needs.
Result (Maturity level) The result tabs ISA5 and ISA4 show all results as originally selected. The ltarget maturity level line does not include
controls that are set to not applicable (n/a). However, the calculation of the averege maturity level does calculate
the maturtiy level only up to the maximum of the target maturity level of each control.
INTERNAL #
Glossary
Term Abbreviation Explanation Examples
Information Asset Information representing an essential asset for the organization and therefore requiring a protection need.
Business secrets, critical business processes, know-how,
patents
Supporting Asset Supporting assets (electronic and physical) are used for storing, processing and transporting information assets.
Mobile data storage devices, IT systems, IT services/IT
service providers, paper documents
Classification of information The value of the information for the organization is determined based on the relevant protection objectives of
information security (confidentiality, integrity and availability). This enables the organization to take adequate
protective measures.
Information security risk management ISRM Information security risk management is intended for the timely detection, evaluation and addressing of risks in
order to achieve the protection objectives of information security. This enables the organization to establish
adequate measures for the protection of its information assets under consideration of prospects and risks.
Information security risks Risks existing in the preparation and processing of information. These are based on potential events having negative
impact on achieving the protection objectives of information security.
Non-disclosure agreements NDA Non-disclosure agreements provide legal protection of an organization’s information particularly where information
is exchanged beyond the boundaries of the organization.
IT system Any type of system used for electronic information processing.
Computer, server, cloud, communication systems, video
conference systems, smartphones, tablets
An application or service run on an IT-system used by other IT-systems for communication via a data network.
Network service
IT services Services in the field of information technology.
Business Continuity Management BCM The Business Continuity Management should ensure that critical business processes can be provided during and
after crises situations
IT Service Continuity Management ITSCM The IT Service Continuitiy Management should ensure that business critical IT Services can be provided during and
after crises situations.
Prototype Prototypes are vehicles, components and parts which are classified as requiring protection but have not yet been
presented to the public and/or published in adequate form by the OEM.
Information security management system ISMS The information security management system is a control mechanism used by the organization’s management to
ensure that information security is the result of sustainable management rather than merely coincidence and
individual effort.
Security zones Security zones provide physical protection of information assets. The more sensitive the information assets to be Storage spaces, garages, workshops, test tracks, data
processed are, the more protective measures are required. processing centers, development areas
‘personal data’ means any information relating to an identified or identifiable natural person; an identifiable natural
person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name,
an identification number, location data, an online identifier or to one or more factors specific to the physical,
physiological, genetic, mental, economic, cultural or social identity of that natural person.
Personal data
Measurement for the “maturity” of the overall ISMS or parts thereof. This is the degree of structuring and
systematic management of the overall process or parts thereof. For the maturity levels used in this document, the
requirements listed under the tab “Maturity levels” apply.
Maturity level
OEM Car/automobile manufacturer
Original Equipment Manufacturer
INTERNAL #
05.1 1.1.1
01.1 1.2.1
06.1 1.2.2
06.4 1.2.4
08.1 1.3.1
08.2 1.3.2
01.2 1.4.1
1.5 Assessments
To what extent is compliance with
information security ensured in
procedures and processes?
18.4 1.5.1
16.1 1.6.1
2 Human Resources
To what extent is the suitability of
employees for sensitive work fields
ensured?
07.1.a
(new) 2.1.1
07.2 2.1.3
06.3.a
(new) 2.1.4
11.1 3.1.1
17.1 3.1.2
09.1 4.1.2
09.2 4.1.3
09.5 4.2.1
5 IT Security/Cyber Security
5.1 Cryptography
To what extent is the use of
cryptographic procedures
managed?
10.1 5.1.1
13.4 5.1.2
12.1 5.2.1
12.2 5.2.2
INTERNAL #
12.3 5.2.3
12.5 5.2.4
12.7 5.2.5
12.8 5.2.6
INTERNAL #
13.1 5.2.7
14.1 5.3.1
09.6 5.3.4
6 Supplier Relationships
INTERNAL #
15.1 6.1.1
13.5 6.1.2
7 Compliance
INTERNAL #
18.1 7.1.1
18.2 7.1.2
01 ISMS
01.1 Release of an Information Security Management System (ISMS)
01.2 IS Risk Management
01.3 Effectiveness of the ISMS
Included in Question 01.1
01.3
05 Information Security Policies
05.1 Information Security Policy
06 Organization of Information Security
06.1 Assigning responsibility for information security
06.2 Information Security in projects
06.3 Mobile devices
06.4 Roles and responsibilities for external IT service providers
07 Human Resources Security
07.1 Contractual information security obligation of employees
07.2 Awareness and training of employees
08 Asset Management
08.1 Inventory of assets
08.2 Classification of information
08.3 Storage of information on mobile storage devices
Included in Question 06.3
08.3
08.4 Removal of externally stored information assets
09 Access Control
09.1 Access to networks and network services
09.2 User registration
09.3 Privileged user accounts
Included in Question 09.5
09.3
09.4 Confidentiality of authentication data
Included in Question 09.2
09.4
09.5 Access to information and applications
09.6 Separation of information in shared environments
10 Cryptography
10.1 Encryption
11 Physical and Environmental Security
INTERNAL #
Assessment
Measures/recommendations
tion Security
.
INTERNAL #
or information security
network services
tication data
d applications
n in shared environments
INTERNAL #
(patch management)
r networks/network services
network segmentation)
ependent bodies
INTERNAL #
Further information
INTERNAL #
+ Security zone 3 (red): Area with principally very high security requirements, protection of
information assets with very high protection needs, usually also strictly confidential scopes (e.g.
design)
Area 1 (yellow): Area with additional protective measures, protection of information assets
with high protection needs, usually also confidential scopes (e.g. development know-how)
Area 3 (red): Area with principally very high security requirements, protection of information
assets with very high protection needs, usually also strictly confidential scopes (e.g. design)
INTERNAL #
For the purposes of ISA, the term supplier includes classic suppliers and contractors as well as
classic service providers, freelancers or other partner organizations. The control also includes
cooperation partners (e.g. academic institutions).
The explanations below describe a possible procedure for fulfilling the requirements:
Support:
Examples “Normal protection need”
It is not necessary to list all information, it is also possible to form categories instead (e.g. core
data of employees – responsible department: Human Resources)
INTERNAL #
Possible measures:
- Use of security technologies such as firewall systems, intrusion detection and prevention
systems (IDS/IPS), network management tools, security software for networks for preventing
unintended data exchange.
INTERNAL #
Support:
Examples “High protection need”
INTERNAL #
Support:
Examples “Very high protection need”
INTERNAL #
Obviously, suppliers with very high protection needs are subject to the minimum information
security requirements regarding the respective protection needs. These requirements should
be individually supplemented with necessary general requirements (e.g. see ISA, very high
protection needs) and order-specific requirements. The difference to high protection needs is
essentially the number and quality of the necessary additional requirements.
Ensuring implementation by the contractor:
Here, the procedure described for high protection needs can be used as a starting point.
Besides the obligation regarding implementation of an adequate information security level and
the non-disclosure obligation, a right to audit and/or appropriate controls (regular auditing of
the contractor) should be contractually agreed on . This should also include an obligation to
participate in TISAX.
In order to ensure compliance with the requirements in a suitable manner, simple mechanisms
should be established. This may include, for example:
- supplier requires TISAX label for very high protection needs
- right to and execution of regular and event-related thorough inspections (if applicable,
supplemented with supporting certificates).
INTERNAL #
Prototype Protection
25 8
25.1.6 8.1.6
25.1.8 8.1.8
Organizational Requirements
25.2 8.2
25.2.2 8.2.2
To what extent do employees and
project members evidently participate
in training and awareness measures
regarding the handling of prototypes?
25.2.3 8.2.3
To what extent are security
classifications of the project and the
resulting security measures known?
25.2.4 8.2.4
To what extent is a process defined for
granting access to security areas?
25.2.5 8.2.5
INTERNAL #
25.2.6 8.2.6
To what extent is a process for carrying
along and using mobile video and
photography devices in(to) defined
security areas established?
25.2.7 8.2.7
Handling of vehicles, components and
25.3 8.3 parts
To what extent are transports of
vehicles, components or parts classified
as requiring protection arranged
according to the customer
requirements?
25.3.1 8.3.1
To what extent is it ensured that
vehicles, components and parts
classified as requiring protection are
parked/stored in accordance with
customer requirements?
25.3.2 8.3.2
Requirements for trial vehicles
25.4 8.4
25.4.1 8.4.1
To what extent are measures for
protecting approved test and trial
grounds observed/implemented?
25.4.2 8.4.2
To what extent are protective measures
for approved test and trial drives in
public observed/implemented?
25.4.3 8.4.3
INTERNAL #
25.5 8.5
To what extent are security
requirements for presentations and
events involving vehicles, components
or parts classified as requiring
25.5.1 8.5.1 protection known?
ment
irements
Objective
The requirements described in this clause apply to all companies which, on their
own properties, manufacture, store or are provided for use vehicles,
components or parts classified as requiring protection.
The necessary measures for prototype protection must be applied to and
implemented on properties and facilities of suppliers, development partners and
service providers. A security concept must be established by the respective
operator. Implementation and observation of the physical and environmental
security measures defined in the security concept must be ensured by the
responsible operator.
It must be ensured that all points of access to security areas where vehicles,
components or parts classified as requiring protection are manufactured,
processed or stored are protected against unauthorized entry by adequate
measures.
A process is defined for carrying along and using mobile video and photography
devices in(to) security areas where vehicles, components or parts classified as
requiring protection are manufactured, processed or stored. Unauthorized
creation or transmission of image material must be prevented.
It must be ensured, that the camouflage regulations are known to each project
member and observed in order to guarantee adequate view protection of trial
vehicles.
In order to maintain an undisturbed and secured trial operation on test and trial
grounds, the respective protective measures defined by the customer must be
observed.
It must be ensured that the respective customer requirements for the operation
of trial vehicles classified as requiring protection on public roads are known and
observed.
INTERNAL #
Requirements
(must)
+ A non-disclosure agreement:
- between contractor and customer (on a company level)
- by all employees and project members (personal obligation)
+ National legislation regarding data protection must be observed.
+ The requirements for using the respective camouflage are known to the
project members.
+ Any changes to the camouflage are made upon documented agreement
with the customer.
+ A process for the immediate reporting of any damages to the camouflage
is described and implemented.
+ Sight protection through relevant glass surfaces is ensured. + The spatial situation is also suitable for
+ View into defined security areas through open protecting vehicles classified as requiring
doors/gates/windows is prevented. protection against unauthorized view.
None + The spatial situation is also suitable for
protecting vehicles classified as requiring
protection against unauthorized access.
None None
None None
INTERNAL #
None None
None None
None None
None None
None None
INTERNAL #
None None
None None
None None
None None
None None
None None
None None
INTERNAL #
None None
None None
INTERNAL #
Confidentiality, Integrity, IT
Availability
Operating Mgr.
Confidentiality
Confidentiality, Integrity,
Availability
Confidentiality, Integrity,
Availability
INTERNAL #
Confidentiality, Integrity,
Availability
Operating Mgr.
Confidentiality, Integrity,
Availability
Operating Mgr.
Confidentiality, Integrity,
Availability
.
INTERNAL #
Responsible
department Contact
INTERNAL #
Further information
INTERNAL #
Support:
Examples “Normal protection need”
INTERNAL #
Support:
Examples “High protection need”
INTERNAL #
Support:
Examples “Very high protection need”
INTERNAL #
Column4
INTERNAL #
24.1 9.1
24.2 9.2
ction for determining a service provider’s basic suitability to act as a processor within
Requirements
+ Appointment of a data protection officer where legally required, otherwise appointment of a person responsible for data protection
+ Organizational implementation of data protection
- Integration of the data protection officer into the corporate structure
- Voluntary or obligatory appointment of a data protection officer
- Full-time or part-time data protection officer
- Internal or external data protection officer
- Support of the data protection officer by directly assigned employees (department “Data Protection”) depending on the company
- Support of the data protection officer by data protection coordinators in the company departments depending on the size of the c
(e.g. Marketing, Sales, Human Resources, Logistics, Development, etc.)
+ Specification of data protection principles (processing of personally identifiable data) in a documented company-internal data protec
strategy (e.g. company-internal policy).
+ Implementation of company-internal steering committees or responsibilities - in collaboration with the data protection officer - addr
topics relevant to data protection.
+ Implementation of a process which ensures the involvement of the data protection officer in any topics relevant to data protection (
context of a data protection impact assessment).
+ Documentation of work processes when processing personally identifiable data.
+ Documentation of statements and comments of the data protection officer regarding data protection law assessments.
+ Implementation of a process by means of which - in case a subcontracting processor is commissioned - the processor is contractually
otherwise legally obliged to comply with the same data protection requirements as specified by contract between the controller and t
processor.
+ Company-internal work instructions or manuals in specific task fields concerning the processing of personally identifiable data.
+ Employees’ (and, if applicable, subcontractors’) confidentiality obligation.
+ Implementation of technical and organizational measures for supporting the controller in handling data subject rights as far as feasib
appropriate for processing.
+ Implementation of reporting processes for immediately informing the customer, under consideration of any subcontractors, so the l
reporting deadlines for data protection incidents can be observed.
+ Documentation of subcontracting relationships including contractual regulations with relevant subcontractors, where any right to in
contractual regulation is in any case limited to the subcontractor’s obligations concerning data protection.
+ Implementation of a process for documenting data protection provisions.
+ Capability of implementing data clearing concepts.
+ Implementation of a procedure for regular checking, assessment and evaluation of TOMs.
+ Demonstration of regular checks and optimizations of the data protection management system (e.g. certification).
+ Measures for maintaining confidentiality and integrity when transferring personally identifiable data.
+ Adequate protection mechanisms for reducing unauthorized access to personally identifiable data.
+ Obligatory training of employees entrusted with the processing of personally identifiable data of the customer (e.g. classroom trainin
+ Ensuring implementation of contracts and provisions of the customer.
+ Documentation of essential tasks regarding the processing of personally identifiable data in compliance with legal requirements.
+ Supporting customers in conducting data protection impact assessments and documenting the results thereof.
+ Informing the customer when detecting unlawful data processing, where applicable, under consideration of different national legisla
INTERNAL #
Operating Mgr.
Operating Mgr.
Operating Mgr.
Operating Mgr.
INTERNAL #
ection Regulation
Further information
INTERNAL #
Support:
Examples “Normal protection need”
INTERNAL #
Support:
Examples “High protection need”
INTERNAL #
Support:
Examples “Very high protection need”
INTERNAL #
Company: 0
Location: 0
Date: 1/1/2020
Result with cutback to target
maturity level:
Maximum score: 3.00
4
8.3 Prototype Protection - Handling of vehicles, components and parts (na) 1.4. IS Risk Management
3
2
8.2 Prototype Protection - Organizational Requirements (na) 1.5 Assessments
8.1 Prototype Protection - Physical and Environmental Security (na) 0 1.6 Incident Management
5.3 System acquisitions, requirement management and development 4.1 Identity Management
Details:
Target
No. Subject maturity Result
level
1.1.1 To what extent are information security policies available? 3
1.2.3 To what extent are information security requirements taken into account in projects? 3
1.2.4 To what extent are responsibilities between external IT service providers and the own organization 3
defined?
1.3.2 To what extent are information assets classified and managed in terms of their protection needs? 3
1.3.3 To what extent is it ensured that only evaluated and approved external IT services are used for 3
processing the organization’s information assets?
1.5.1 To what extent is compliance with information security ensured in procedures and processes? 3
2.1.1 To what extent is the suitability of employees for sensitive work fields ensured? 3
2.1.2 To what extent is all staff contractually bound to comply with information security policies? 3
2.1.3 To what extent is staff made aware of and trained with respect to the risks arising from the handling of 3
information?
3.1.1 To what extent are security zones managed to protect information assets? 3
3.1.4 To what extent is the handling of mobile IT devices and mobile data storage devices managed? 3
4.1.2 To what extent is the user access to network services, IT systems and IT applications secured? 3
4.1.3 To what extent are user accounts and login information securely managed and applied? 3
5.2.2 To what extent are development and testing environments separated from operational environments? 3
5.3.1 To what extent is information security considered in new or further development of IT systems? 3
5.3.3 To what extent is the return and secure removal of information assets from external IT services 3
regulated?
6.1.1 To what extent is information security ensured among suppliers and cooperation partners? 3
6.1.2 To what extent is non-disclosure regarding the exchange of information contractually agreed? 3
7.1.1 To what extent is compliance with regulatory and contractual provisions ensured? 3
7.1.2 To what extent is the protection of personal data taken into account when implementing information 3
security?
Details:
Target
No. Subject maturity Result
level
8.1 Physical and Environmental Security
8.1.1 Security concept 3
8.1.2 Perimeter security 3
8.1.3 Stability of outer skin 3
8.1.4 View and sight protection 3
8.1.5 Protection against unauthorized entry and access control 3
8.1.6 Intrusion monitoring 3
8.1.7 Visitor management 3
8.1.8 Client segregation 3
8.2 Organizational Requirements
8.2.1 Non-disclosure obligations 3
8.2.2 Subcontractors 3
8.2.3 Awareness 3
8.2.4 Security classification 3
8.2.5 Access control 3
8.2.6 Film and photo regulations 3
8.2.7 Mobile video and photography devices 3
8.3 Handling of vehicles, components and parts
8.3.1 Transport 3
8.3.2 Parking and storage 3
8.4 Requirements for trial vehicles
8.4.1 Camouflage 3
8.4.2 Test and trial ground 3
8.4.3 Test and trial drives on public roads 3
8.5 Requirements for events and shootings
8.5.1 Presentations and events 3
8.5.2 Film and photo shootings 3
INTERNAL #
Company: 0
Location: 0
Date: 1/1/2020
Result with cutback to target
maturity level: 3.00 Maximum score: 3.00
3
17 Information Security Aspects of Business Continuity Management
2 7 Human Resources Security
Details:
Target
No. Subject maturity Result
level
01.1 Release of an Information Security Management System (ISMS) 3
01.2 IS Risk Management 3
01.3 Effectiveness of the ISMS 3
05.1 Information Security Policy 3
06.1 Assigning responsibility for information security 3
06.2 Information Security in projects 3
06.3 Mobile devices 3
06.3.a (new) Teleworking 3
06.4 Roles and responsibilities for external IT service providers 3
Contractual information security obligation
07.1 of employees 3
07.1.a (new) Qualification of employee(s) 3
07.2 Awareness and training of employees 3
08.1 Inventory of assets 3
08.2 Classification of information 3
08.3 Storage of information on mobile data storage devices 3
08.4 Removal of externally stored information assets 3
09.1 Access to networks and network services 3
09.2 User registration 3
09.2.a (new) Handling of identification means 3
09.3 Privileged user accounts 3
09.4 Confidentiality of authentication data 3
09.5 Access to information and applications 3
09.6 Separation of information in shared environments 3
10.1 Encryption 3
11.1 Security zones 3
11.2 Protection against external influences and external threats 3
11.3 Protective measures in the delivery and shipping area 3
11.4 Use of equipment 3
12.1 Change Management 3
12.2 Separation of development, testing and operational environments 3
12.3 Protection against malware 3
12.4 Backup procedures 3
12.5 Event logging 3
12.6 Logging administration activities 3
12.7 Tracing of vulnerabilities (patch management) 3
12.8 Review of information systems 3
12.9 Consideration of critical administrative functions of cloud services 3
13.1 Management of networks 3
13.2 Security requirements for networks/services 3
13.3 Separation of networks (network segmentation) 3
13.4 Electronic exchange of information 3
13.5 Non-disclosure agreements for information exchange with third parties 3
14.1 Requirements for the acquisition of information systems 3
14.2 Security in the software development process 3
14.3 Management of test data 3 n.a.
14.4 Approval of external IT services 3
15.1 Risk management in collaboration with suppliers 3
15.2 Review of service provision by suppliers 3 n.a.
16.1 Reporting system for information security incidents (incident management) 3
16.2 Processing of information security incidents 3 n.a.
17.1 Information Security Aspects of Business Continuity Management (BCM) 3
18.1 Legal and contractual provisions 3
18.2 Confidentiality and protection of personally identifiable data 3
18.3 Audit of the ISMS by independent bodies 3
18.4 Effectiveness check 3
Method: - comparison of the top 41 security topics 3.00
INTERNAL #
Details:
Target
No. Topic maturity Result
level
25.1 Physical and Environmental Security
25.1.1 Security concept 3
25.1.2 Perimeter security 3
25.1.3 Stability of outer skin 3
25.1.4 View and sight protection 3
25.1.5 Protection against unauthorized entry and access control 3
25.1.6 Intrusion monitoring 3
25.1.7 Visitor management 3
25.1.8 Client segregation 3
25.2 Organizational Requirements
25.2.1 Non-disclosure obligations 3
25.2.2 Subcontractors 3
25.2.3 Awareness 3
25.2.4 Security classification 3
25.2.5 Access control 3
25.2.6 Film and photo regulations 3
25.2.7 Mobile video and photography devices 3
25.3 Handling of vehicles, components and parts
25.3.1 Transport 3
25.3.2 Parking and storage 3
25.4 Requirements for trial vehicles
25.4.1 Camouflage 3
25.4.2 Test and trial ground 3
25.4.3 Test and trial drives on public roads 3
25.5 Requirements for events and shootings
25.5.1 Presentations and events 3
25.5.2 Film and photo shootings 3
INTERNAL #
Control ISA 5.0 2.1.2 To what extent is staff made aware of and trained with respect 4.1.1 To what extent are user accounts and login information securely managed and applied? 5.2.1 To what extent are changes controlled? 5.2.3 To what extent are IT systems protected against ma
to the risks arising from the handling of information? (Change Management)
Control-ISA-4.1 7.2 Awareness and training of employees 9.2 User registration 12.1 Change management 12.3 Protection against malware
Employees with raised awareness The contents of awareness Regular reviews of user accounts
represent an important pillar for measures should consider Regular reviewing of systems for for unnecessary authorizations Collective accounts should A high quality of the change A comprehensive Endpoint
unnecessary accounts is a principally not be used or used A comprehensive and consistently Security provides a company with
the information security in a outcomes of information security prerequisite for a consistent and are the prerequisite for a only in exceptional cases since an observed change management management process leads to
company. Awareness measures incidents. The KPI measures the an essential protection against
Description should reach all employees, as far effectiveness of awareness current user base according to the consistent and current
authorization base according to explicit allocation of user activities process is the basis for secure lower error rates among the
performed changes and malware. The KPI measures the
as possible. The KPI measures the measures by collection (based on need-to-know principle. The KPI the need-to-know principle. The is impeded. The KPI measures the operation. The KPI measures the contributes to secure operation. ratio of protected systems
coverage degree of trainings such number or cost) of security measures the coverage degree of KPI measures the coverage degree number of used collective coverage degree of changes The KPI measures the error rate of taking into account approved
the measure “regular user accounts in consideration of complying with the policies.
as e-learnings, classroom incidents with human errors as a review”. of the measure “regular approved exceptions. changes. exceptions.
trainings. cause. authorization review”.
All employees are trained with No information security incidents All systems have valid user All authorizations comply with All collective accounts are All changes are made in Error-free performance of Comprehensive protection of all
Objective (Vision) respect to information security with human error as a cause accounts only current needs reviewed for their necessity conformance to policies changes systems threatened by malware
Recipients Information Security; supervisors Information Security Information Security Information Security Information Security Information Security Information Security Local IT, Information Security
to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g.
Frequency (reporting) annually) annually) annually) annually) annually) annually) annually) annually)
Frequency (measurement) to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g.
annually) annually) annually) annually) annually) annually) annually) monthly)
Interfaces HR - Training Department - IKS - Incident Management Data Owner, User Management, Data Owner, User Management, User Management IT Operations, Change IT Operations, Change AV Management, IT Operations
Internal Audit Department supervisors supervisors Management Management
E-learnings, classroom training, Incident Mgt. Tool, Ticket System, User registry, authorization User registry, authorization User registry, authorization Project Management, Change Project Management, Change
Components training plan, training register ISMS Tool management tool, IAM platform, management tool, IAM platform management tool, IAM platform Management Management AV console, CMDB
CMDB
INTERNAL #
Data archiving 5 years 5 years 10 years 10 years 5 years 10 years 5 years 5 years
INTERNAL #
IT systems protected against malware? 7.1.1 To what extent is information security ensured in exceptional situations? 5.2.5 To what extent are vulnerabilities identified and addressed? 1.6.1 To what extent are information security events processed? 1.1.1 To what extent are information se
(Patch Management)
tection against malware 12.4 Backup 12.7 Detection of vulnerabilities 16.2 Processing of information security incidents 5.1 Information securit
(Patch management)
Effectiveness of updating Coverage degree of restoration Coverage degree Patch Detection rate of information Timely processing of information Creation degree of required
Endpoint Security Coverage degree of backup tests Backup effectiveness Management Effectiveness of patch installation security incidents security incidents policies/documentations
A regular and complete backup A comprehensive patch The contemporary installation of Information security incidents
Current virus signatures are the Regular restoration tests (e.g. by Backup quality must be ensured patches ensures the security of Information security incidents
prerequisite for an effective provides protection against the restoring data or systems) is by correlating controls. Measures management protects the systems and applications and have to be detected and timely have to be adequately prioritized Under an ISMS,
Endpoint Security. The KPI loss of data, e.g. in case of a essential to the availability of are e.g. data restore, system company against malware and therefore reduces the exploit handled in order to protect the and handled according to their mandatory/voluntary
system failure or malware exploits. The KPI measures the company from damages. The KPI policies/documentations must be
measures the target state and the infection. business information. restorations. inclusion of systems and windows for the company. The measures the compliance of the criticality. The KPI measures the prepared.
actual state of virus definitions on The KPI measures the degree of The KPI measures the coverage The KPI measures the number of applications in the Patch KPI measures the recording of the incident reporting process appropriate timely handling of
reporting deadline. degree of restoration tests. incorrect data restores. target state and the actual state information security incidents.
backup coverage. Management process. of patches. between the involved interfaces.
All information security incidents All information security incidents All necessary
All systems have up-to-date All relevant data is adequately Regular restoration tests for all All systems are involved in the All systems are at up-to-date will be detected, reported and
protection secured backed-up systems Correct backups patch process patch level handled within the scope of the will be handled within an policies/documentations are
appropriate time frame present
incident management process
Local IT, Information Security, Local IT, Information Security, Local IT, Information Security, Local IT, Information Security, Local IT, Information Security, Information Security, Corporate
Local IT, Information Security service owner service owner service owner Local IT, Information Security Local IT, Information Security Compliance Compliance Security, IT Security, HR, Business
to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g.
annually) annually) annually) annually) annually) annually) annually) annually) Initial version
Quotient: number of systems Quotient: number of systems with Quotient: number of currently Quotient: number of information
time comparison covered by backups/total number tested restoration from Quotient: number of restorations patched systems/total number of time comparison security incidents reported in the For each individual criticality level: Quotient: number of existing
average actual rollout state vs. of systems (adjusted for backup/total number of all with errors/total number of all systems (adjusted for authorized average actual rollout state vs. incident management/total All incidents unsolved within policies/population of necessary
target state restoration tests target state number of incidents (known to defined time frame/ all incidents policies
authorized exceptions) systems with backup exceptions) the surveying unit)
to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g.
annually) annually) monthly) annually) monthly) monthly) annually) annually) annually)
AV Management, IT Operations Backup process, IT Operations Backup process, IT Operations Backup process, IT Operations Patch/Change Management, IT Patch/Change Management, IT IT, CERT, Incident Management, IT, CERT, Incident Management, Information Security, Corporate
Operations Operations Helpdesk, Service Management Helpdesk, Service Management Security, IT Security, HR, Business
Change Management console, Change Management console, Contents derived from the
Incident Management Incident Management Statement of Applicability (SoA)
AV console, CMDB Backup software, CMDB Backup software, CMDB Backup software, CMDB software distribution platform, software distribution platform, System/Workflow System/Workflow and documented in accordance
CMDB, WSUS CMDB, WSUS with ISO 27001
INTERNAL #
information security policies available? 1.2.3 To what extent are information security requirements taken 3.1.4 To what extent is the handling of mobile IT devices and mobile 3.1.1 To what extent are security zones managed to protect information assets? 5.2.4 To what ex
into account in projects? data storage devices managed?
rmation security policy 6.2 Information security in projects 6.3 Mobile devices 11.1 Security zones 11.3 Protective measures in the 12.5 Event logging
delivery and shipping area
Actuality of required Coverage degree of information Protective measures - Coverage degree of mobile device Effectiveness of implementation Implementation degree of zone Implementation of protective Coverage degree review “Access Coverage degree of event logs on
policies/documentations security in projects implementation in projects security of mobile device security concept measures for zone concept authorizations” security-critical systems
measures
All necessary Security zones are protected All employees working in the All relevant systems and
Information security requirements Information security requirements All relevant mobile devices are All relevant mobile devices are Zones are defined for all according to internal delivery and shipping area are
policies/documentations are are considered in all projects are implemented in all projects subject to protective measures subject to up-to-date protection properties specifications (see e.g. References subject to regular review of access applications are integrated into
reviewed for actuality/content event logging
“Security zones”) rights
Information Security, Corporate Information Security, Corporate Information Security, Corporate IT Security, Information Security, Information Security, Corporate Information Security, Corporate Corporate Security, Logistics, Local IT, Information Security,
Security, IT Security, HR, Business Security, IT Security Security, IT Security IT Security, Information Security Corporate Security Security Security authorities Compliance
to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g.
annually) annually) annually) annually) annually) annually) annually) annually) annually)
to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g.
annually) annually) annually) monthly) monthly) annually) quarterly) annually) annually)
Plant security, local security Plant security, local security
Information Security, Corporate Project customer, Project Project customer, Project IT Operations, IT Security IT Operations, IT Security functions, specialized functions, specialized Logistics, Access Management Local IT, System Owner, Data
Security, IT Security, HR, Business Management Office (PMO) Management Office (PMO) departments departments Owner, Risk Owner
5 years 5 years 5 years 5 years 5 years 5 years 5 years 10 years to be defined individually (if
relevant to billing: 10 years)
INTERNAL #
2.5 Event logging 12.6 Logging administrative activities 12.8 System audits 13.2 Network services 13.5 Non-disclosure agreements 14.1 Requirements for the
acquisition of information systems
Coverage degree of admin logs on Effectiveness of system audit Coverage degree review service Coverage degree non-disclosure Effectiveness of risk handling in
Functioning log activity security-critical systems Functioning log activity Coverage degree system audits implementation level agreements (SLA) Effectiveness of observing SLAs agreements information system acquisition
processes
Completeness and correctness of All relevant systems and Completeness and integrity of All relevant systems are subject to All measures are implemented in All SLAs include the current All requirements resulting from Non-disclosure agreements have Security risks identified in
logs applications are integrated into admin logs audits at regular intervals time security requirements the SLAs are implemented been entered with all external acquisition are handled in an
admin logging partners effective manner
Local IT, Information Security, Local IT, Information Security, Local IT, Information Security, Acquisition, Information Security, Information Security, Local IT,
Compliance Compliance Compliance Local IT, Information Security Local IT, Information Security Local IT, Information Security Local IT, Information Security specialized department Procurement
to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g.
annually) annually) annually) annually) annually) annually) annually) annually) annually)
Quotient: number of logged Quotient: number of measures Quotient: number of measures Quotient: number of orders with
security-critical systems/total number of incorrectly written Quotient: number of audited implemented in time/number of Quotient: number of verified implemented/number of concluded non-disclosure Quotient: number of treated
number of incorrectly written logs number of security-critical admin logs systems/total number of security- measures still to be implemented SLAs/total number of SLAs measures agreed agreement/total number of risks/population of risks identified
critical systems in the acquisition process
systems relevant orders
to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g.
quarterly) annually) quarterly) monthly) monthly) monthly) monthly) monthly) quarterly)
Local IT, System Owner, Data Procurement, specialized
Local IT, System Owner, Data Owner, Risk Owner, User IT, System Owner, Data Owner, Audit Management, IT Audit Management, IT IT Operations, Information IT Operations, Information Acquisition, Information Security, departments (requisitioner), Local
Owner, Risk Owner Management Risk Owner, User Management Operations, System Owner Operations, System Owner Security Security specialized department IT
to be defined individually (if to be defined individually (if to be defined individually (if 5 years 5 years 5 years 5 years 5 years 5 years
relevant to billing: 10 years) relevant to billing: 10 years) relevant to billing: 10 years)
INTERNAL #
information security considered in new or further developed IT systems? 1.5.1 To what extent is compliance with information security ensured
in procedures and processes?
14.2 Security during the software development process 18.4 Effectiveness check
Security risks are taken into Security risks are addressed in the All vulnerabilities identified in the Vulnerabilities identified in the
course of audits are eliminated
account in the software development process in an course of audits are traced and within the defined time and in an
development process effective manner assigned to activities
effective manner
Information Security, Local IT, Risk Information Security, Local IT, Risk Information Security, Corporate Information Security, Corporate
Management Management Security, Local IT, Internal Audit Security, Local IT, Internal Audit
to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g.
annually) annually) annually) annually)
to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%, Green: > 90%, Yellow: 70-90%, Green: > 90%, Yellow: 70-90%, Green: > 90%, Yellow: 70-90%,
Red: < 70%) Red: < 70%) Red: < 70%) Red: < 70%)
Quotient: number of software Quotient: number of findings Quotient: number of activities for
development projects that Quotient: number of treated subject to subsequent eliminating vulnerabilities within
underwent risk risks/population of risks identified activities/population of identified the defined period for
assessment/population of in the development process implementation/population of all
relevant development projects findings specified activities
to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g. to be determined individually (e.g.
quarterly) quarterly) quarterly) quarterly)
Procurement, specialized Procurement, specialized Internal Auditors, Information Internal Auditors, Information
departments (requisitioner), Local departments (requisitioner), Local Security, Local IT, specialized Security, Local IT, specialized
IT IT departments (Auditees) departments (Auditees)
Development system, Development system, Audit data base, follow-up data Audit data base, follow-up data
development project data base development project data base base base
INTERNAL #
This work has been licensed under the Creative Commons Attribution - NoDerivs 4.0 International
Public License. In addition, You are granted the right to distribute derivatives under certain terms. The
complete and valid text of the license is to be found in line 17ff.
· The licensor cannot revoke these freedoms as long as you follow the license
terms.
· Attribution — You must give appropriate credit, provide a link to the license,
and indicate if changes were made. You may do so in any reasonable manner,
but not in any way that suggests the licensor endorses you or your use.
· Restricted derivatives — If you change or otherwise build directly upon the
material, You may only distribute the modified material if it is clearly marked as
a derivative not approved by the licensor and if all logos and/or trademarks of
the licensor have been removed.
· No additional restrictions — You may not apply any additional legal terms or
technological measures that legally restrict others from doing anything the
license permits.
INTERNAL #
By exercising the Licensed Rights (defined below), You accept and agree to be bound
by the terms and conditions of this Creative Commons Attribution-NoDerivatives 4.0
International Public License ("Public License"). To the extent this Public License may be
interpreted as a contract, You are granted the Licensed Rights in consideration of Your
acceptance of these terms and conditions, and the Licensor grants You such rights in
consideration of benefits the Licensor receives from making the Licensed Material
available under these terms and conditions.
Section 1 – Definitions.
a. Adapted Material means material subject to Copyright and Similar Rights that is derived from or
based upon the Licensed Material and in which the Licensed Material is translated, altered, arranged,
transformed, or otherwise modified in a manner requiring permission under the Copyright and Similar
Rights held by the Licensor. For purposes of this Public License, where the Licensed Material is a
musical work, performance, or sound recording, Adapted Material is always produced where the
Licensed Material is synched in timed relation with a moving image.
b. Copyright and Similar Rights means copyright and/or similar rights closely related to copyright
including, without limitation, performance, broadcast, sound recording, and Sui Generis Database
Rights, without regard to how the rights are labeled or categorized. For purposes of this Public License,
the rights specified in Section 2(b)(1)-(2) are not Copyright and Similar Rights.
c. Effective Technological Measures means those measures that, in the absence of proper authority,
may not be circumvented under laws fulfilling obligations within the meaning of Article 11 of the
WIPO Copyright Treaty adopted on December 20, 1996, and/or similar international agreements.
d. Exceptions and Limitations means fair use, fair dealing, and/or any other exception or limitation
to Copyright and Similar Rights that applies to Your use of the Licensed Material.
e. Licensed Material means the artistic or literary work, database, or other material to which the
Licensor applied this Public License.
f. Licensed Rights means the rights granted to You subject to the terms and conditions of this
Public License, which are limited to all Copyright and Similar Rights that apply to Your use of the
Licensed Material and that the Licensor has authority to license.
g. Licensor means the individual(s) or entity(ies) granting rights under this Public License.
h. Share means to provide material to the public by any means or process that requires permission
under the Licensed Rights, such as reproduction, public display, public performance, distribution,
dissemination, communication, or importation, and to make material available to the public including
in ways that members of the public may access the material from a place and at a time individually
chosen by them.
INTERNAL #
i. Sui Generis Database Rights means rights other than copyright resulting from Directive 96/9/EC
of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases,
as amended and/or succeeded, as well as other essentially equivalent rights anywhere in the world.
j. You means the individual or entity exercising the Licensed Rights under this Public License. Your
has a corresponding meaning.
Section 2 – Scope.
a. License grant.
1. Subject to the terms and conditions of this Public License, the Licensor hereby grants You a
worldwide, royalty-free, non-sublicensable, non-exclusive, irrevocable license to exercise the Licensed
Rights in the Licensed Material to:
A. reproduce and Share the Licensed Material, in whole or in part; and
B. produce and reproduce, but not Share, Adapted Material.
2. Exceptions and Limitations. For the avoidance of doubt, where Exceptions and Limitations apply
to Your use, this Public License does not apply, and You do not need to comply with its terms and
conditions.
3. Term. The term of this Public License is specified in Section 6(a).
4. Media and formats; technical modifications allowed. The Licensor authorizes You to exercise the
Licensed Rights in all media and formats whether now known or hereafter created, and to make
technical modifications necessary to do so. The Licensor waives and/or agrees not to assert any right
or authority to forbid You from making technical modifications necessary to exercise the Licensed
Rights, including technical modifications necessary to circumvent Effective Technological Measures.
For purposes of this Public License, simply making modifications authorized by this Section 2(a)(4)
never produces Adapted Material.
B. No downstream restrictions. You may not offer or impose any additional or different terms or
conditions on, or apply any Effective Technological Measures to, the Licensed Material if doing so
restricts exercise of the Licensed Rights by any recipient of the Licensed Material.
6. No endorsement. Nothing in this Public License constitutes or may be construed as permission to
assert or imply that You are, or that Your use of the Licensed Material is, connected with, or
sponsored, endorsed, or granted official status by, the Licensor or others designated to receive
attribution as provided in Section 3(a)(1)(A)(i).
b. Other rights.
1. Moral rights, such as the right of integrity, are not licensed under this Public License, nor are
publicity, privacy, and/or other similar personality rights; however, to the extent possible, the Licensor
waives and/or agrees not to assert any such rights held by the Licensor to the limited extent necessary
to allow You to exercise the Licensed Rights, but not otherwise.
2. Patent and trademark rights are not licensed under this Public License.
3. To the extent possible, the Licensor waives any right to collect royalties from You for the exercise
of the Licensed Rights, whether directly or through a collecting society under any voluntary or
waivable statutory or compulsory licensing scheme. In all other cases the Licensor expressly reserves
any right to collect such royalties.
INTERNAL #
2. You may satisfy the conditions in Section 3(a)(1) in any reasonable manner based on the medium,
means, and context in which You Share the Licensed Material. For example, it may be reasonable to
satisfy the conditions by providing a URI or hyperlink to a resource that includes the required
information.
3. If requested by the Licensor, You must remove any of the information required by Section 3(a)(1)
(A) to the extent reasonably practicable.
Section 4 – Sui Generis Database Rights.
Where the Licensed Rights include Sui Generis Database Rights that apply to Your use of the Licensed
Material:
a. for the avoidance of doubt, Section 2(a)(1) grants You the right to extract, reuse, reproduce, and
Share all or a substantial portion of the contents of the database and provided You do not Share
Adapted Material;
b. if You include all or a substantial portion of the database contents in a database in which You have
Sui Generis Database Rights, then the database in which You have Sui Generis Database Rights (but
not its individual contents) is Adapted Material; and
c. You must comply with the conditions in Section 3(a) if You Share all or a substantial portion of the
contents of the database.
For the avoidance of doubt, this Section 4 supplements and does not replace Your obligations under
this Public License where the Licensed Rights include other Copyright and Similar Rights.
a. Unless otherwise separately undertaken by the Licensor, to the extent possible, the Licensor
offers the Licensed Material as-is and as-available, and makes no representations or warranties of
any kind concerning the Licensed Material, whether express, implied, statutory, or other. This
includes, without limitation, warranties of title, merchantability, fitness for a particular purpose,
non-infringement, absence of latent or other defects, accuracy, or the presence or absence of errors,
whether or not known or discoverable. Where disclaimers of warranties are not allowed in full or in
part, this disclaimer may not apply to You.
INTERNAL #
b. To the extent possible, in no event will the Licensor be liable to You on any legal theory
(including, without limitation, negligence) or otherwise for any direct, special, indirect, incidental,
consequential, punitive, exemplary, or other losses, costs, expenses, or damages arising out of this
Public License or use of the Licensed Material, even if the Licensor has been advised of the
possibility of such losses, costs, expenses, or damages. Where a limitation of liability is not
allowed in full or in part, this limitation may not apply to You.
c. The disclaimer of warranties and limitation of liability provided above must be interpreted in a
manner that, to the extent possible, most closely approximates an absolute disclaimer and waiver of
all liability.
Section 6 – Term and Termination.
a. This Public License applies for the term of the Copyright and Similar Rights licensed here.
However, if You fail to comply with this Public License, then Your rights under this Public License
terminate automatically.
b. Where Your right to use the Licensed Material has terminated under Section 6(a), it reinstates:
1. automatically as of the date the violation is cured, provided it is cured within 30 days of Your
discovery of the violation; or
2. upon express reinstatement by the Licensor.
For the avoidance of doubt, this Section 6(b) does not affect any right the Licensor may have to seek
remedies for Your violations of this Public License.
c. For the avoidance of doubt, the Licensor may also offer the Licensed Material under separate
terms or conditions or stop distributing the Licensed Material at any time; however, doing so will not
terminate this Public License.
d. Sections 1, 5, 6, 7, and 8 survive termination of this Public License.
Section 7 – Other Terms and Conditions.
a. The Licensor shall not be bound by any additional or different terms or conditions communicated
by You unless expressly agreed.
b. Any arrangements, understandings, or agreements regarding the Licensed Material not stated
herein are separate from and independent of the terms and conditions of this Public License.
Section 8 – Interpretation.
a. For the avoidance of doubt, this Public License does not, and shall not be interpreted to, reduce,
limit, restrict, or impose conditions on any use of the Licensed Material that could lawfully be made
without permission under this Public License.
b. To the extent possible, if any provision of this Public License is deemed unenforceable, it shall be
automatically reformed to the minimum extent necessary to make it enforceable. If the provision cannot
be reformed, it shall be severed from this Public License without affecting the enforceability of the
remaining terms and conditions.
c. No term or condition of this Public License will be waived and no failure to comply consented to
unless expressly agreed to by the Licensor.
d. Nothing in this Public License constitutes or may be interpreted as a limitation upon, or waiver of,
any privileges and immunities that apply to the Licensor or You, including from the legal processes of
any jurisdiction or authority.
1. this material is clearly marked as a modified version not approved by the Licensor; and
2. any logos and/or trademarks of the Licensor have been removed.
INTERNAL #
INTERNAL #
1.0
1.1
1.2
1.3
2.0
2.0.1
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
3.0.2
INTERNAL #
4.0.0
4.0.1
4.0.2
4.0.3
4.1.0
5.0.0
5.0.2
5.0.3
5.0.4
INTERNAL #
Correction of the link of Control 14.4 on the results page, Level 3 adaptation: Established in tab “Maturity levels”
Tab Results: The results will only be indicated for controls that have been subject to processing.
Adaptation of Chapter 24 to DSGVO and minor modifications to those controls designated with 4.1.0
8.4, 13.3 correction in description of objective
9.1 addition of control and objective description
10.1, 11.1, 12.5, 12.6, 12.9 adaptation of requirements
18.2 and Data Protection (24) adaptation to DSGVO
References: 'secret' changed to 'strictly confidential' and classification levels supplemented to protection classes
Prototype Protection (25) revised