For years, dealership cybersecurity has lived in a familiar place: a checklist.

✔️ MFA?
✔️ Antivirus?
✔️ Security policy?

Boxes checked. Everyone feels better. Back to selling cars and trucks.

But the latest Mercedes-Benz USA Cyber Security Guidelines for Dealers make one thing very clear: that era is over

A Not-So-Subtle Message from the OEMs

In the wake of high-profile attacks like the 2024 CDK Global ransomware incident—which disrupted more than 15,000 dealerships—manufacturers are no longer comfortable taking a dealer’s word for it when it comes to cybersecurity.

Mercedes-Benz USA now requires dealerships to prove that an effective information security program is in place—through ISO/IEC 27001 or TISAX L2 certification by September 30, 2026

That’s not a paperwork exercise. That’s an audit.

And it signals a growing concern across the industry: Too many dealerships say they’re secure—but can’t demonstrate that they actually are.

The Problem with Self-Assessment Security

Many dealerships rely on compliance platforms that function as little more than self-reported questionnaires.

A classic example:

“Do you use multi-factor authentication?”

✔️ Yes

Technically true. MFA exists.

But:

  • Is it enabled everywhere it should be?
  • Is it enforced for remote access, admin accounts, SaaS apps, and vendors?
  • Is it monitored?
  • Is it tested?
  • Is it maintained as systems and users change?

That’s the difference between having MFA and having MFA that actually reduces risk.

Auditors—and now automakers—care deeply about that difference.

What OEMs Are Really Asking For

Mercedes-Benz’s guidance aligns directly with what the FTC Safeguards Rule, NIST, and CIS Critical Security Controls have been saying all along:

Dealerships must develop, implement, and maintain a comprehensive information security program—not just document one.

That means:

  • A designated dealership cyberecurity owner who is accountable
  • A written information security program that reflects how the dealership actually operates
  • Continuous monitoring and logging
  • Regular risk assessments
  • Ongoing access reviews
  • Incident response planning
  • Training that goes beyond “watch this video once a year”

In other words: security as a process, not a product.

Why ISO Audits Change the Conversation

An ISO or TISAX audit doesn’t ask:

“Do you have a policy?”

It asks:

“Show me how this policy is implemented, monitored, tested, and improved.”

That’s a big shift for dealerships that have historically leaned on:

  • Internal IT teams already stretched thin
  • Compliance software with no operational follow-through
  • Vendor assurances instead of validation

Manufacturers aren’t doing this to be difficult. They’re doing it because customer data, brand trust, and operational resilience are now inseparable.

This Isn’t About Fear—It’s About Maturity

The takeaway here isn’t panic. It’s progress.

OEMs are pushing dealerships toward the same security standards already expected in banking, healthcare, and large enterprise environments. And frankly, given how much sensitive financial and personal data flows through a dealership every day, that makes sense.

The days of “we checked the box” are giving way to:

“We can prove it works.”

And that’s ultimately good for dealers, customers, and manufacturers alike.