ISO 27017
International code for cloud-specific security controls
MLPS 2.0 (Multi-Level Protection Scheme)
China's mandatory graded cybersecurity protection scheme
Quick Verdict
ISO 27017 provides voluntary cloud security guidance integrated into global ISMS for CSPs worldwide, while MLPS 2.0 mandates graded protections for all Chinese networks with PSB enforcement. Companies adopt ISO for trust, MLPS for legal compliance.
ISO 27017
ISO/IEC 27017:2015 Code of practice for cloud security
Key Features
- Clarifies shared responsibilities between CSPs and CSCs
- Introduces seven cloud-specific security controls
- Ensures multi-tenant segregation and VM hardening
- Mandates secure asset removal and data lifecycle management
- Enables customer monitoring of cloud service activities
MLPS 2.0 (Multi-Level Protection Scheme)
Multi-Level Protection Scheme 2.0
Key Features
- Five impact-based protection levels for systems
- Mandatory classification and PSB registration Level 2+
- Technical controls for cloud, IoT, big data
- Governance, personnel, third-party management requirements
- Third-party audits scoring 75/100 minimum
Detailed Analysis
A comprehensive look at the specific requirements, scope, and impact of each standard.
ISO 27017 Details
What It Is
ISO/IEC 27017:2015 is a code of practice providing cloud-specific guidance for information security controls based on ISO/IEC 27002. It extends ISO 27001 ISMS for cloud environments, addressing shared responsibilities in IaaS, PaaS, SaaS across public, private, hybrid deployments. Its risk-based approach adapts controls to unique cloud risks like multi-tenancy and virtualization.
Key Components
- Additional implementation guidance for 37 ISO 27002 controls in cloud contexts.
- Seven new CLD controls: shared roles, VM segregation/hardening, admin operations, customer monitoring, asset removal.
- Built on ISO 27001; integrated into ISMS audits, no standalone certification.
- Dual perspectives for CSPs and CSCs.
Why Organizations Use It
- Resolves shared responsibility ambiguities, preventing security gaps.
- Supports regulatory compliance (GDPR, CCPA) and procurement demands.
- Enhances risk management for cloud incidents.
- Provides competitive differentiation and customer trust.
- Boosts reputation via auditable cloud security posture.
Implementation Overview
- Integrate via ISO 27001 risk assessment, control mapping, SoA updates.
- Implement configurations, policies, training; audit as 27001 extension.
- Applies to CSPs/CSCs of all sizes globally.
- Joint audits (9-12 months) with 27001 reduce costs.
MLPS 2.0 (Multi-Level Protection Scheme) Details
What It Is
MLPS 2.0 (Multi-Level Protection Scheme 2.0) is China's legally mandated regulatory framework for cybersecurity, operationalizing Article 21 of the 2016 Cybersecurity Law. It requires network operators to classify systems into five protection levels based on potential harm to national security, social order, and public interests, applying graded technical, governance, and physical controls.
Key Components
- Domains: physical security, network protection, access control, data security, monitoring, governance.
- Standards: GB/T 22239-2019 (baseline), GB/T 25070-2019 (technical), GB/T 28448-2019 (evaluation).
- Compliance: self-classification, third-party audits (Level 2+), PSB approval, periodic re-evaluations.
Why Organizations Use It
- Avoids fines, license suspensions, inspections.
- Strengthens resilience against cyber threats.
- Essential for China market access, operations.
- Builds regulator trust, competitive edge.
Implementation Overview
- Phased: inventory, classify, gap analysis, remediate, audit, monitor.
- Targets all China-based network operators; intensive for multinationals.
- Mandatory audits, filings for Level 2+ systems.
Key Differences
| Aspect | ISO 27017 | MLPS 2.0 (Multi-Level Protection Scheme) |
|---|---|---|
| Scope | Cloud-specific security controls for ISMS | Graded protection for all networks/systems |
| Industry | All industries, global CSPs/customers | All sectors in China, mandatory for operators |
| Nature | Voluntary guidance, ISO 27001 extension | Mandatory regulation, enforced by PSBs |
| Testing | ISO 27001 audits include 27017 controls | Third-party evaluations, PSB approval Level 2+ |
| Penalties | Loss of certification, no legal fines | Fines, suspensions, operational shutdowns |
Scope
Industry
Nature
Testing
Penalties
Frequently Asked Questions
Common questions about ISO 27017 and MLPS 2.0 (Multi-Level Protection Scheme)
ISO 27017 FAQ
MLPS 2.0 (Multi-Level Protection Scheme) FAQ
You Might also be Interested in These Articles...

The Panoramic View: How Integrated Compliance Monitoring Creates Unprecedented Organizational Visibility and Adaptability
Gain unprecedented organizational visibility with integrated compliance monitoring. Automate real-time alerts, ensure GDPR & SOC 2 adherence, reduce risks, and

Unpacking the True Cost: A Guide to Calculating TCO for Modern Compliance Monitoring Software
Unpack the true Total Cost of Ownership (TCO) for compliance monitoring software. Factor in licenses, implementation, training, maintenance, and ROI savings for

Top 10 Reasons CMMC Level 3 Certification Unlocks Competitive Edge for Primes Handling Critical DoD Programs
Discover top 10 reasons CMMC Level 3 certification unlocks competitive edge for DoD primes. Reduced APT risks, procurement prefs, NIST 800-172 compliance via v2
Run Maturity Assessments with GRADUM
Transform your compliance journey with our AI-powered assessment platform
Assess your organization's maturity across multiple standards and regulations including ISO 27001, DORA, NIS2, NIST, GDPR, and hundreds more. Get actionable insights and track your progress with collaborative, AI-powered evaluations.
Check out these other Gradum.io Standards Comparison Pages
APPI vs ISO/IEC 42001:2023
Compare APPI vs ISO/IEC 42001:2023—Japan's data privacy law meets global AI governance. Uncover key differences, compliance strategies & synergies for secure innovation. (152 characters)
CCPA vs POPIA
CCPA vs POPIA: California's threshold-based rights (know, delete, opt-out) meet South Africa's universal 8 conditions—no exemptions. Master key differences & compliance strategies now.
NIST CSF vs CSA
Discover NIST CSF vs CSA: Flexible NIST framework (6 functions, Govern focus) excels in cyber risk mgmt; CSA stresses hazard ID/control. Pick the right fit—optimize now!