½üÈÕ,ËÄάͼÐÂͨ¹ýTISAX (Trusted Information Security Assessment Exchange,¿ÉÐÅÐÅÏ¢°²È«ÆÀ¹À½»»»)×î¸ßµÈ¼¶3¼¶ÆÀ¹À,½øÒ»²½ÌáÉýÁË×ÔÉíÔÚÂú×ãÆû³µÐÅÏ¢°²È«ÓëÊý¾Ý½»»»°²È«±ê×¼ÏÂΪÆû³µ²úÒµÁ´ÉÏÏÂÓÎÆóÒµÌṩ²úÆ··þÎñµÄÄÜÁ¦¡£
TISAXÊǵ¹úÆû³µ¹¤ÒµÁªºÏ»á(VDA)ÁªºÏÅ·ÖÞÆû³µ¹¤Òµ°²È«Êý¾Ý½»»»Ð»á(ENX)ÓÚ2017Äêµ×ÍÆ³öµÄÆû³µÐÐÒµÐÅÏ¢°²È«ÆÀ¹ÀºÍÊý¾Ý½»»»°²È«±ê×¼,¸Ã±ê×¼ÊÇ»ùÓÚISO 27001ÐÅÏ¢°²È«¹ÜÀíÌåϵ±ê×¼ºÍVDA-ISAÐÅÏ¢°²È«ÆÀ¼Û¼ì²é±í½¨Á¢µÄÆû³µÐÐҵרÓÃÐÅÏ¢°²È«±ê×¼,ΪÆû³µÐÐÒµÄÚ²»Í¬·þÎñÉÌÌṩÁËÐÅÏ¢°²È«ÆÀ¹À½á¹û»¥ÈϵÄģʽ,Æû³µ²úÒµÁ´²ÎÓëÕßͨ¹ý¸ÃÆÀ¹À,¼´Òâζ×ÅÕâÒ»½á¹ûµÃµ½ÁËËùÓÐÆû³µÐÐÒµ²ÎÓë·½µÄÈϿɡ£
Èç½ñ,Æû³µÖÇÄÜ»¯¡¢ÍøÁª»¯Ñ¸ËÙ·¢Õ¹,¹á´©³µÁ¾Õû¸öÉúÃüÖÜÆÚµÄÐÅÏ¢°²È«¹ÜÀíºÍ·çÏÕ¿ØÖÆÎÊÌâ,ÒÔ¼°Óû§Òþ˽¡¢¸öÈËÊý¾Ý±£»¤ÓëÊý¾ÝºÏ¹æÎÊÌâÔ½À´Ô½Êܵ½Õû¸öÐÐÒµµÄ¹Ø×¢¡£ÔÚÕâÒ»±³¾°ÏÂ,Ðí¶àÅ·ÖÞ³µÆó,ÈçµÂ¹ú´óÖÚ¡¢±¦ÂíµÈÒѾ½«TISAX×÷ΪÆä¹©Ó¦É̱ØÐëͨ¹ýµÄ×ÊÖÊÒªÇó¡£
ËÄάͼд˷¬Í¨¹ýTISAX×î¸ßµÈ¼¶3¼¶ÈÏÖ¤,±êÖ¾×ÅËÄάͼÐÂÔÚÐÅÏ¢°²È«ºÍÊý¾Ý½»»»°²È«µÈ·½ÃæÒѾ´ïµ½¹ú¼ÊÁìÏÈË®×¼,¿ÉÒÔÂú×ãºÏ×÷³§É̵ÄÖ±½ÓÒªÇó,ʵÏÖÆû³µÐÐÒµÆóÒµÖ®¼ä°²È«»¥ÐÅ,Ϊ¸üºÃ·þÎñ¹ú¼Ê¶¥¼¶³µÆó¿Í»§µì¶¨Á˼áʵ»ù´¡,ҲΪËÄάͼÐÂÔÚδÀ´¼ÌÐøÍÆ¶¯ÐÐÒµÏà¹ØÊý¾Ý°²È«¡¢ÍøÂ簲ȫÖйú±ê×¼µÄ·¢Õ¹ÓëÂäʵ»ýÀÛÁ˱¦¹óµÄ¾Ñé¡£
½üÈÕ,ËÄάͼÐÂͨ¹ýTISAX (Truted Information Security Aement Exchange,¿ÉÐÅÐÅÏ¢°²È«ÆÀ¹À½»»»)×î¸ßµÈ¼¶3¼¶ÆÀ¹À,½øÒ»²½ÌáÉýÁË×ÔÉíÔÚÂú×ãÆû³µÐÅÏ¢°²È«ÓëÊý¾Ý½»»»°²È«±ê×¼ÏÂΪÆû³µ²úÒµÁ´ÉÏÏÂÓÎÆóÒµÌṩ²úÆ··þÎñµÄ
ÆÀÂÛ