Network Security
To meet the TISAX / VDA ISA 6.4.1 network security requirement, you must secure your network infrastructure through enforceable segmentation, disciplined firewall management with documented rule sets, and continuous monitoring of network traffic (including intrusion detection) for the environments that process or transport automotive data (VDA ISA Catalog v6.0). Operationalize this by defining trust zones, controlling every inter-zone flow, and proving you monitor and respond.
Key takeaways:
- Build segmentation around data flows and trust boundaries, then restrict inter-zone traffic to approved, documented paths (VDA ISA Catalog v6.0).
- Treat firewall rules as governed configuration items: ownership, review, change control, logging, and evidence of enforcement (VDA ISA Catalog v6.0).
- Monitoring must be real: collect network telemetry, detect intrusion, and show triage and response artifacts tied to alerts (VDA ISA Catalog v6.0).
“Network security requirement” under TISAX is not a vague expectation to “have firewalls.” VDA ISA 6.4.1 asks you to secure the network infrastructure in a way an assessor can validate: segmentation exists and is meaningful, firewall rules are managed and documented, and you monitor network traffic to detect and respond to malicious activity (VDA ISA Catalog v6.0). For a CCO or GRC lead, the fastest path to readiness is to translate this into three auditable outcomes: (1) a network zoning model mapped to automotive data flows, (2) controlled connectivity where every allowed path has a business justification and an owner, and (3) monitoring with intrusion detection that produces tickets, investigations, and improvements.
This page is written for operators who need to execute quickly across IT, OT (if relevant), and cloud. It focuses on the minimum set of decisions, workflows, and artifacts that routinely make or break assessments: where you draw boundaries, how you prevent “any-any” exceptions from becoming permanent, how you prove rule governance, and what monitoring evidence actually convinces an assessor. Where helpful, it also calls out third-party implications, because managed network services, SOC providers, and cloud platforms often sit directly in the control path.
Regulatory text
Requirement (excerpt): “Secure network infrastructure including segmentation, firewall management, and monitoring of network traffic.” (VDA ISA Catalog v6.0)
Operator interpretation: You must (1) implement network segmentation appropriate to your environment and data flows, (2) manage firewalls through controlled, documented rule sets and changes, and (3) monitor network traffic with detection capability (for example intrusion detection) and demonstrate response to what you detect (VDA ISA Catalog v6.0).
What an assessor is looking for is straightforward: you can explain your network trust boundaries, show that controls enforce those boundaries, and produce evidence that monitoring is active and acted upon.
Plain-English interpretation (what “good” looks like)
You meet VDA ISA 6.4.1 when:
- Segmentation is real: production, corporate IT, sensitive engineering, and external-facing services are separated into zones; access between zones is explicitly allowed, not implicitly open (VDA ISA Catalog v6.0).
- Firewalls are governed: rules have owners, business justifications, approvals, and review; logs exist; changes are controlled; “temporary” exceptions expire or are re-approved (VDA ISA Catalog v6.0).
- Monitoring produces outcomes: you can show network telemetry collection, intrusion detection, alert handling, and follow-up (tuning, blocking, lessons learned) (VDA ISA Catalog v6.0).
Who it applies to
Entity types: Automotive suppliers and OEMs (VDA ISA Catalog v6.0).
Operational context (practical scope):
- Corporate networks that access or transmit automotive information (engineering files, customer data, program documentation).
- Data centers and cloud environments hosting apps, file services, CI/CD, ticketing, or collaboration used for automotive programs.
- Remote access paths (VPN, ZTNA, bastions) into sensitive environments.
- OT or lab networks if they connect to automotive engineering, manufacturing, test benches, or telemetry pipelines (scope depends on your assessed environment).
- Third parties that operate or materially administer your network controls (managed firewall, SOC, MDR, NOC, cloud managed services). You still need evidence of governance and monitoring results, even if the work is outsourced.
What you actually need to do (step-by-step)
Step 1: Define your “zones” and trust boundaries
- Inventory environments in scope for the assessment: on-prem, cloud VPC/VNets, remote sites, and shared services.
- Classify zones by trust and data sensitivity, not by org chart. Typical zones: user/workstation, server, engineering, DMZ, management, backup, third-party connectivity, cloud landing zone.
- Document the segmentation model in a diagram and a short narrative: what each zone contains, why it exists, and what controls enforce separation (VDA ISA Catalog v6.0).
Deliverable: a zone model that a network engineer can implement and an assessor can understand in one pass.
Step 2: Map and minimize data flows between zones
- List required inter-zone flows based on applications and operational needs (e.g., “Engineering workstations → Git server over TLS,” “Jump host → production admin ports”).
- For each flow, define source zone, destination zone, protocol/port, authentication expectations, and owning system/service.
- Remove legacy or unknown flows: if no owner can justify it, it should not exist.
Practical tip: treat “we might need it later” as a denial reason. If the business later proves need, they can request it with justification.
Step 3: Implement and enforce segmentation controls
Choose controls based on your architecture, but make enforcement explicit:
- Perimeter and internal firewalls between zones.
- Cloud security groups / NACLs aligned to the same zone model.
- Network access control for site and device admission where needed.
- Separate management plane (admin interfaces and tooling) from user traffic.
Assessor-friendly evidence comes from showing that segmentation is enforced at control points, not just drawn on diagrams (VDA ISA Catalog v6.0).
Step 4: Establish firewall management as a governed process
Create a firewall rule lifecycle that produces consistent artifacts:
- Rule request intake: ticket with business purpose, data classification, source/destination, ports, duration, and owner.
- Security review and approval: confirm least privilege, validate zones, confirm logging.
- Implementation: by network team or managed service; record device(s), rule IDs, and effective date.
- Post-change validation: confirm connectivity works, confirm logging is enabled, confirm no broader access was introduced.
- Periodic review: identify stale rules, temporary exceptions, “any-any,” shadowed rules, and undocumented NAT/forwarding.
- Emergency changes: allow a faster path, but require retrospective approval and documentation.
Your goal is simple: no rule exists without an owner and rationale, and you can prove it (VDA ISA Catalog v6.0).
Step 5: Monitor network traffic and detect intrusion
VDA ISA 6.4.1 explicitly calls out monitoring and intrusion detection as part of protecting data flows (VDA ISA Catalog v6.0). Translate that into:
- Log sources defined: firewalls, IDS/IPS, VPN/remote access, DNS (if available), key routers/switches (as applicable), cloud flow logs.
- Central collection: SIEM/SOC platform or a managed service that aggregates and retains logs.
- Detection content: alerts for policy violations (blocked inter-zone attempts), anomalous egress, repeated denies, suspicious inbound patterns, admin access to management planes, and traffic to/from sensitive zones.
- Triage workflow: every meaningful alert creates an investigation record (ticket/case), with evidence, decision, and closure reason.
- Feedback loop: tuning detections, adjusting firewall rules, blocking indicators, or segmenting further based on findings.
If you use a third-party SOC/MDR, require them to provide case records, alert summaries, and proof of coverage for your in-scope networks.
Step 6: Test and validate control effectiveness
You need more than configuration:
- Segmentation testing: attempt access between zones that should be blocked; capture deny logs and test records.
- Firewall rule review outcomes: show removal/cleanup actions.
- Monitoring validation: run a controlled test (for example, generate a known port scan from a test host) and prove the alert fired and was handled through the incident workflow.
Step 7: Assign ownership and integrate with governance
Network security fails in audits when it has no accountable owner.
- Assign control owners: segmentation model owner, firewall rule governance owner, monitoring owner.
- Tie changes to your change management process.
- Ensure exceptions flow through risk acceptance with explicit expiry and compensating controls.
If you run Daydream for third-party risk and control evidence collection, use it to standardize evidence requests from managed firewall and SOC providers (rule review reports, logging coverage, sample cases) and track expirations for network access exceptions across third parties.
Required evidence and artifacts to retain
Assessors typically want “show me” artifacts. Maintain:
- Network segmentation diagram(s) with zones, boundaries, and control points (VDA ISA Catalog v6.0).
- Data flow / inter-zone connectivity matrix (allowed flows only) with owners and justifications.
- Firewall inventory (devices/services in scope) and administrative ownership.
- Firewall rule base export (sanitized if needed), plus:
- rule request/approval tickets,
- change records,
- periodic rule review records and remediation actions,
- exception/risk acceptance records with expiry.
- Logging and monitoring evidence:
- list of log sources and confirmation they are forwarding,
- sample firewall/IDS logs,
- SIEM/SOC alert samples,
- investigation tickets/case notes and closure documentation.
- Testing records for segmentation and detection validation.
Common exam/audit questions and hangups
Expect these, and prepare answers with artifacts:
- “Show your segmentation model. Where is automotive data processed or accessed?” (VDA ISA Catalog v6.0)
- “How do you prevent lateral movement from user endpoints into sensitive engineering or production systems?”
- “Who approves firewall rule changes, and how do you review rules for least privilege?” (VDA ISA Catalog v6.0)
- “Do you log allowed and denied connections? Where are logs stored and who reviews alerts?” (VDA ISA Catalog v6.0)
- “Prove monitoring is active. Show recent IDS/SIEM cases and what you did about them.” (VDA ISA Catalog v6.0)
- “How do third parties connect, and how do you restrict and monitor that connectivity?”
Hangup to anticipate: teams produce a network diagram and a firewall screenshot but cannot produce a governed workflow (tickets, approvals, reviews, and monitoring outcomes). That gap is where assessments stall.
Frequent implementation mistakes (and how to avoid them)
- Flat networks with “soft” segmentation. VLANs without enforced controls still allow unwanted paths. Put enforceable controls between zones and test them.
- Any/any rules with “temporary” intent. Require expiry dates; re-approval should be explicit.
- Rules without owners. Make rule ownership mandatory. If ownership is unknown, decommission or restrict.
- Monitoring without response. A SIEM dashboard is not evidence of security. Keep case records that show triage and closure.
- Cloud segmentation drift. Cloud security groups often diverge from the on-prem model. Map cloud constructs to the same zone model and review them.
- Third-party blind spots. If a managed provider runs your firewall/SOC, you still need evidence. Contract for logs, reviews, and case artifacts.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so this page avoids claiming regulator-specific outcomes. Operationally, weak segmentation and uncontrolled firewall rules increase the blast radius of credential theft, malware, and remote access compromise. Poor network monitoring extends attacker dwell time because suspicious traffic and policy violations go unseen or uninvestigated. Those are exactly the failure modes assessors probe under VDA ISA 6.4.1 (VDA ISA Catalog v6.0).
Practical 30/60/90-day execution plan
First 30 days (stabilize and make it auditable)
- Confirm assessment scope: sites, networks, cloud accounts, third-party connections.
- Produce the zone model and a first-pass segmentation diagram.
- Inventory firewalls and boundary controls, identify rule owners, and start capturing rule change tickets.
- Turn on/confirm logging from firewalls and remote access into a central system; document log sources.
- Pick a minimal set of “must-monitor” alerts tied to sensitive zones and remote access.
Next 60 days (reduce exposure and prove governance)
- Build the inter-zone connectivity matrix; eliminate unknown flows.
- Implement rule lifecycle workflow (request, approval, change, validation).
- Run the first formal rule review; retire or tighten risky/stale rules.
- Deploy or validate IDS/IPS coverage at critical choke points; confirm alerts create cases.
- Execute segmentation and detection tests; retain evidence.
Next 90 days (operational maturity and repeatability)
- Expand monitoring coverage and tuning based on initial cases.
- Formalize exception/risk acceptance with expirations for firewall and segmentation deviations.
- Integrate network controls into periodic governance: scheduled rule reviews, monitoring reporting, and third-party evidence collection.
- If you rely on managed services, align contracts and SLAs to evidence needs (rule review reports, log forwarding attestations, sample case packs).
Frequently Asked Questions
Do we need “micro-segmentation” to meet VDA ISA 6.4.1?
The requirement calls for segmentation, firewall management, and monitoring; it does not mandate a specific technology (VDA ISA Catalog v6.0). Use the segmentation depth that matches your data flows and risk, then prove it is enforced and monitored.
What’s the minimum evidence an assessor will accept for firewall management?
Expect to show documented rule sets plus the governance trail: request/approval records, change control, and periodic reviews with remediation actions (VDA ISA Catalog v6.0). A rule export alone rarely demonstrates management.
If our SOC is outsourced, can we rely on their tooling and processes?
Yes, but you still need your own evidence package: log source coverage, sample alerts, and case records showing investigation and closure for your environments (VDA ISA Catalog v6.0). Build these deliverables into the third party’s contract and reporting cadence.
How do we scope network security for cloud environments under this requirement?
Treat cloud networks as part of the same segmentation model, mapped into zones with explicit allowed flows (VDA ISA Catalog v6.0). Keep evidence of security group/NACL governance and cloud flow logging as monitoring artifacts.
What should we do about legacy “temporary” firewall rules that never expired?
Convert them into a governed exception with an owner, justification, and expiry, or remove them after validating they are not required. Track outcomes in your rule review records so you can show cleanup activity during assessment.
How can a GRC team operationalize this without becoming the network engineering bottleneck?
Own the governance: define required artifacts, enforce rule ownership, require reviews, and set the monitoring evidence standard. Use a system like Daydream to collect and track evidence across network teams and third parties without chasing it in email.
Frequently Asked Questions
Do we need “micro-segmentation” to meet VDA ISA 6.4.1?
The requirement calls for segmentation, firewall management, and monitoring; it does not mandate a specific technology (VDA ISA Catalog v6.0). Use the segmentation depth that matches your data flows and risk, then prove it is enforced and monitored.
What’s the minimum evidence an assessor will accept for firewall management?
Expect to show documented rule sets plus the governance trail: request/approval records, change control, and periodic reviews with remediation actions (VDA ISA Catalog v6.0). A rule export alone rarely demonstrates management.
If our SOC is outsourced, can we rely on their tooling and processes?
Yes, but you still need your own evidence package: log source coverage, sample alerts, and case records showing investigation and closure for your environments (VDA ISA Catalog v6.0). Build these deliverables into the third party’s contract and reporting cadence.
How do we scope network security for cloud environments under this requirement?
Treat cloud networks as part of the same segmentation model, mapped into zones with explicit allowed flows (VDA ISA Catalog v6.0). Keep evidence of security group/NACL governance and cloud flow logging as monitoring artifacts.
What should we do about legacy “temporary” firewall rules that never expired?
Convert them into a governed exception with an owner, justification, and expiry, or remove them after validating they are not required. Track outcomes in your rule review records so you can show cleanup activity during assessment.
How can a GRC team operationalize this without becoming the network engineering bottleneck?
Own the governance: define required artifacts, enforce rule ownership, require reviews, and set the monitoring evidence standard. Use a system like Daydream to collect and track evidence across network teams and third parties without chasing it in email.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream