ISO 27001 vs TISAX Level 2 for Dealerships

A lot of dealerships run into ISO 27001 or TISAX because someone upstream wants reassurance: “Can you protect our data, your systems, and your access to ours?” The names sound similar. The work is not.

This guide explains the differences in plain language, shows what each one typically requires, and calls out the parts that tend to trip up dealerships. It also explains how Safer Dealer helps you run a gap analysis so you know exactly where you stand.


Start here: what kind of requirement is this?

Before comparing frameworks, it helps to understand what these requests usually mean in practice.

  • ISO 27001 is about proving you run security as a managed program, with defined responsibilities, risk decisions, and a repeatable operating rhythm.
  • TISAX Level 2 (AL2) is about proving you meet an automotive security requirement set using a structured questionnaire, supporting evidence, and an interview. It also supports sharing results with approved partners.

For most dealerships, that difference matters because one path is “build a full system and certify it,” and the other is “document and validate what you do against an automotive checklist.”


The short version: which one tends to be easier?

In dealership environments, TISAX Level 2 (AL2) is usually the lighter lift.

ISO 27001 is not impossible, but it typically requires more operational overhead and more disciplined documentation over time. If you already have a mature compliance culture, strong documentation, and clear ownership, ISO can be manageable. Most dealerships are busy running a business and do not have spare compliance bandwidth.


Side-by-side comparison (what’s required and how it’s evaluated)

TopicISO/IEC 27001:2022 (Certification)TISAX Level 2 (AL2)
End goalEarn and maintain a security certification for an ISMSComplete an automotive security assessment with a shareable result
How you’re judgedFormal certification audits that test both documentation and real-world operationEvidence review and expert interview validating your self-assessment
What “good” looks likeYou can show security is governed, measured, reviewed, and improvedYou can show your answers are accurate and supported by proof
Documentation burdenHigher (management system artifacts plus control evidence)Medium (self-assessment plus evidence set)
Ongoing effortHigher (ongoing audit cycle and ISMS routines)Medium (controls still must run, reassessment expectations vary)
Best fitWhen you need a widely recognized credential across many partner typesWhen the requirement is automotive-specific and results-sharing matters
Typical lift for dealersHeavierLighter at AL2 when scope is contained

Where dealerships get stuck (even with good tools)

Most dealer groups already have security tooling. The choke points are usually people, process, and proof. These issues show up under either ISO or TISAX:

Shared logins and weak account control

What reviewers want to see:

  • MFA on key systems
  • User-level accounts for sensitive access
  • Admin rights controlled and limited
  • Offboarding done fast and consistently

Why it’s tricky in dealerships:

  • Shared accounts in service lanes, parts counters, and sales teams
  • Temporary users that become permanent
  • Vendor “helper accounts” that never get removed

Vendor access sprawl

What reviewers want to see:

  • A current vendor list
  • Who has access to what
  • How remote access is approved
  • Regular reviews of vendor access

Why it’s tricky:

  • Too many vendors touching too many systems
  • Multiple remote access paths that nobody owns
  • No routine for quarterly access review

Customer data living in too many places

What reviewers want to see:

  • Clear rules for handling customer data
  • Secure storage and controlled sharing
  • Consistent scanning and retention practices

Why it’s tricky:

  • PDFs and exports on desktops and shared drives
  • Email attachments with personal data
  • Scan-to-email and scan-to-folder workflows with little control

Backups that exist but cannot be proven reliable

What reviewers want to see:

  • Backup coverage for critical systems
  • Restore testing results
  • Defined responsibilities and timelines

Why it’s tricky:

  • “We back up” but no proof of a successful restore test
  • Cloud apps assumed to be “covered”
  • Split responsibility across vendors with gaps

Monitoring without proof of follow-through

What reviewers want to see:

  • Alerts, logs, and response steps
  • Proof someone reviews alerts
  • A simple incident process and records

Why it’s tricky:

  • Alerts scattered across tools
  • No central tracking of response actions
  • Unclear escalation and decision-making

What ISO 27001 adds that often raises the lift

Dealers usually feel ISO 27001 weight in three areas:

1) The management system requirements

You need to show security is run as a program:

  • Defined scope and responsibilities
  • Documented risk process
  • Internal audits and management reviews
  • Continuous improvement actions

2) The Statement of Applicability (SoA)

This is where you document which controls apply, which do not, and why. It sounds simple. It becomes time-consuming fast without a mature documentation process.

3) The “keep it going” requirement

Passing once is not the finish line. ISO expects ongoing operation and recurring audits. That means your documentation and evidence need to stay current.


What TISAX AL2 emphasizes (and what can still surprise dealers)

TISAX AL2 is often more approachable, but it is still an assessment. Dealers get surprised by:

1) Evidence quality

If your self-assessment says “yes,” you need proof. If your evidence does not match your answers, the conversation gets uncomfortable quickly.

2) Scope and objectives

TISAX can include different objectives depending on what’s required. If the scope expands or objectives add higher-friction areas, the lift rises.

3) Consistency across rooftops

Single store is simpler. Multi-rooftop groups often struggle because controls are implemented differently at different locations.


What “preparing for either one” tends to look like

If a dealership wants a practical way to think about readiness, it usually comes down to six workstreams:

  1. Access and identity cleanup (MFA, shared accounts, admin control, offboarding)
  2. Vendor access control (inventory, approvals, access reviews, removal)
  3. Data handling rules (exports, scanning, storage, retention)
  4. Backups and recovery proof (restore tests, roles, realistic recovery expectations)
  5. Monitoring and incident readiness (logging, alert handling, response plan)
  6. Documentation and evidence (policies that match reality, records that prove it)

How Safer Dealer helps (gap analysis and readiness plan)

Safer Dealer’s gap analysis is built for dealerships that want clarity and traction, not a 60-page PDF that sits in a folder.

What the gap analysis answers

  • What the requirement really expects for your situation
  • What is already in place that counts
  • What gaps will block approval
  • What your “pass path” looks like, step-by-step

What you get

  • A readiness summary by category (Ready, Needs Work, High Risk)
  • A prioritized fix list (first, next, later)
  • An evidence checklist so you can prove what you do
  • Clear ownership, so actions do not stall

Many dealers use the gap analysis as the starting point, then decide whether they want help closing gaps and staying on a routine afterwards. <CTA Here>


FAQs (Safer Dealer)

Is this mostly an IT project?

No. It is an operations and accountability project with IT work inside it. The biggest problems are usually shared access, vendor control, and lack of proof.

What tends to take the longest?

Cleaning up access and vendor sprawl, then building an evidence trail that matches reality across departments and rooftops.

Do we need to buy a bunch of new tools?

Sometimes, but not always. Many dealerships already own tools that can support the requirements. The bigger lift is getting consistent configuration, process, and proof.

What is the easiest way to get in trouble?

Overstating maturity. Both ISO and TISAX reward honesty and evidence. If the evidence does not match the answers, confidence drops fast.

Share