CSL (Cyber Security Law of China)
China's regulation for network security and data localization
ISO 28000
International standard for supply chain security management systems
Quick Verdict
CSL mandates cybersecurity and data localization for China operations, enforcing compliance via fines. ISO 28000 provides voluntary supply chain security framework globally. Companies adopt CSL for legal survival in China; ISO 28000 for resilience and certification advantages.
CSL (Cyber Security Law of China)
Cybersecurity Law of the People's Republic of China
Key Features
- Mandates data localization for CII and important data
- Requires technical safeguards and real-time network monitoring
- Assigns senior executive cybersecurity responsibilities
- Binds all network operators serving Chinese users
- Imposes fines up to 5% of annual revenue
ISO 28000
ISO 28000:2022 Security management systems — Requirements
Key Features
- Risk-based supply chain security assessment and treatment
- PDCA cycle for continual improvement and resilience
- Leadership commitment and cross-functional governance
- Supplier interdependencies and third-party controls
- Integration with ISO 27001, 22301 via High Level Structure
Detailed Analysis
A comprehensive look at the specific requirements, scope, and impact of each standard.
CSL (Cyber Security Law of China) Details
What It Is
The Cybersecurity Law of the People’s Republic of China (CSL), enacted June 1, 2017, is a nationwide statutory framework. It governs network operators, service providers, and data processors in Chinese jurisdiction to secure information systems. Comprising 69 articles, its primary purpose is protecting national security via three pillars: network security, data localization, and cybersecurity governance. It employs mandatory, risk-based requirements with technical and organizational controls.
Key Components
- **Network SecurityMandatory safeguards, periodic testing, real-time monitoring.
- **Data Localization & PIPLocal storage for Critical Information Infrastructure (CII) and important data; assessments for cross-border transfers.
- **Cybersecurity GovernanceExecutive responsibilities, incident reporting within 24 hours, authority cooperation. Applies baseline to all network operators, heightened for CII. Compliance via government assessments, no central certification but evaluations like SPCT.
Why Organizations Use It
Mandatory for entities serving Chinese users to avoid fines up to 5% annual revenue, shutdowns, reputational harm. Drives trust, operational efficiency via modern architectures, innovation through local R&D, and competitive market advantages in China.
Implementation Overview
Phased approach: pre-engagement, gap analysis, architectural redesign (localization, ZTA, SIEM), organizational governance, testing/certification. Targets MNCs, CII operators, all with Chinese footprint; requires ongoing monitoring, audits.
ISO 28000 Details
What It Is
ISO 28000:2022 is an international management system standard specifying requirements for establishing, implementing, maintaining, and improving a security management system (SMS) focused on supply chain security and resilience. It uses a risk-based, PDCA (Plan-Do-Check-Act) approach to protect people, assets, goods, infrastructure, and information.
Key Components
- Clauses 4-10 cover context, leadership, planning, support, operation, performance evaluation, and improvement.
- Emphasizes risk assessment, security strategies, incident response, supplier controls, and continual improvement.
- Built on ISO High Level Structure (HLS) for integration with ISO 9001, 22301, 27001.
- Optional third-party certification via accredited bodies per ISO 28003.
Why Organizations Use It
- Reduces supply chain disruptions, theft, sabotage; lowers insurance costs.
- Meets contractual, regulatory drivers like C-TPAT equivalents.
- Enhances market access, trade facilitation, stakeholder trust.
- Provides competitive edge in logistics, manufacturing, pharmaceuticals.
Implementation Overview
- Phased: gap analysis, risk assessment, controls deployment, audits (6-36 months scalable by size).
- Applies to all sizes/industries with supply chains; involves mapping, training, supplier engagement.
Key Differences
| Aspect | CSL (Cyber Security Law of China) | ISO 28000 |
|---|---|---|
| Scope | Supply chain security management systems | |
| Industry | Logistics, manufacturing, any supply chain | |
| Nature | Voluntary international standard | |
| Testing | Internal audits, certification audits | |
| Penalties | Loss of certification |
Scope
Industry
Nature
Testing
Penalties
Frequently Asked Questions
Common questions about CSL (Cyber Security Law of China) and ISO 28000
CSL (Cyber Security Law of China) FAQ
ISO 28000 FAQ
You Might also be Interested in These Articles...

CMMC Level 3 Implementation Guide: Integrating NIST SP 800-172 Enhanced Controls for APT Defense
Step-by-step CMMC Level 3 guide for DIB contractors. Implement 24 NIST SP 800-172 controls on Level 2. Prep for DIBCAC, C3PAO scoping & 180-day POA&Ms. Boost cy

You Guide on how to Start Implementing NIS2 in Your Organization
Master NIS2 implementation with our detailed guide. Learn requirements, risk assessment, supply chain security, and compliance steps for your organization. Star

ISO 27701 2025 Update: Navigating Standalone Certification Myths, Audit Realities, and a 90-Day PIMS Launch Plan
Debunk ISO 27701 2025 standalone certification myths vs ISO 27001. Get a 90-day PIMS launch roadmap, checklists & audit prep to certify faster amid global priva
Run Maturity Assessments with GRADUM
Transform your compliance journey with our AI-powered assessment platform
Assess your organization's maturity across multiple standards and regulations including ISO 27001, DORA, NIS2, NIST, GDPR, and hundreds more. Get actionable insights and track your progress with collaborative, AI-powered evaluations.
Check out these other Gradum.io Standards Comparison Pages
FSSC 22000 vs APRA CPS 234
Compare FSSC 22000 food safety scheme vs APRA CPS 234 info security standard. Key differences in governance, controls, audits & compliance for resilient ops. Explore now!
PDPA vs POPIA
Compare PDPA vs POPIA: Decode Singapore/Thailand/Taiwan PDPA & South Africa's POPIA. Scope, rights, breaches, transfers & enforcement differences. Master compliance now!
COBIT vs ISO 20000
COBIT vs ISO 20000: Compare IT governance framework COBIT 2019 with service management std ISO 20000-1. Tailor for compliance, risk & optimization. Choose wisely now!