MLPS 2.0 (Multi-Level Protection Scheme)
China's mandatory graded cybersecurity for networks
ISO 27018
Code of practice for PII protection in public clouds
Quick Verdict
MLPS 2.0 mandates graded cybersecurity for all China networks via police enforcement, while ISO 27018 voluntarily extends ISO 27001 for cloud PII processors. Companies adopt MLPS for legal compliance in China; ISO 27018 for global cloud privacy trust.
MLPS 2.0 (Multi-Level Protection Scheme)
Multi-Level Protection Scheme 2.0 (GB/T 22239-2019)
Key Features
- Five graded levels based on impact severity
- Mandatory for all China network operators
- Technical, management, physical controls baseline
- Third-party audits for Level 2+ systems
- Extensions for cloud, IoT, big data
ISO 27018
ISO/IEC 27018:2025 Code of practice for PII in public clouds
Key Features
- Privacy controls for public cloud PII processors
- Subprocessor and location transparency requirements
- Prohibits PII use for marketing without consent
- Customer breach notification obligations
- Data minimization and secure deletion mandates
Detailed Analysis
A comprehensive look at the specific requirements, scope, and impact of each standard.
MLPS 2.0 (Multi-Level Protection Scheme) Details
What It Is
MLPS 2.0 (Multi-Level Protection Scheme) is China's mandatory cybersecurity regulation operationalizing the 2017 Cybersecurity Law's Article 21. It is a graded protection framework classifying networks into five levels based on breach impact to national security, social order, and public interests. Scope covers all network operators, including modern tech like cloud, IoT.
Key Components
- Domains: physical, network, host, data security, operations, governance.
- Baseline controls plus level-specific extensions.
- Standards: GB/T 22239-2019 (requirements), GB/T 25070-2019 (technical), GB/T 28448-2019 (evaluation).
- Compliance via self-classification, third-party audits (Level 2+), PSB filing.
Why Organizations Use It
Legal mandate enforced by PSBs with fines, inspections. Enhances resilience, supports CII/data laws. Builds trust, enables market access.
Implementation Overview
Phased: inventory/classify, gap analysis, remediate, audit/file, ongoing re-evals. Applies to all China operators; high for critical sectors. Mandatory audits scale by level.
ISO 27018 Details
What It Is
ISO/IEC 27018:2025 is a code of practice extending ISO/IEC 27001 and ISO/IEC 27002 for protecting personally identifiable information (PII) in public clouds where providers act as PII processors. It addresses cloud-specific privacy risks like multi-tenancy and cross-border flows via risk-based controls within an ISMS.
Key Components
- ~25–30 privacy-specific controls on consent, purpose limitation, minimization, transparency, accountability.
- Aligned with ISO 27001 Annex A themes: Organizational, People, Physical, Technological.
- Built on ISO 29100 principles; assessed during ISO 27001 audits, not standalone.
Why Organizations Use It
- Builds trust, speeds procurement, aligns with GDPR/ HIPAA processor duties.
- Mitigates risks, aids insurance, differentiates CSPs in competitive markets.
Implementation Overview
- Gap analysis, ISMS integration, SoA updates, policy/contract/tech enhancements.
- For CSPs globally, all sizes; third-party audits via ISO 27001 with annual surveillance.
Key Differences
| Aspect | MLPS 2.0 (Multi-Level Protection Scheme) | ISO 27018 |
|---|---|---|
| Scope | All networks in China, graded levels | PII protection in public clouds |
| Industry | All sectors in China | Cloud service providers globally |
| Nature | Mandatory regulation, police enforced | Voluntary code of practice |
| Testing | Third-party evaluations, periodic re-assessments | Integrated into ISO 27001 audits |
| Penalties | Fines, inspections, business suspension | No legal penalties, certification loss |
Scope
Industry
Nature
Testing
Penalties
Frequently Asked Questions
Common questions about MLPS 2.0 (Multi-Level Protection Scheme) and ISO 27018
MLPS 2.0 (Multi-Level Protection Scheme) FAQ
ISO 27018 FAQ
You Might also be Interested in These Articles...

You Guide on how to Start Implementing NIST CSF in Your Organization
Master NIST CSF implementation in your organization with this detailed guide. Learn core functions, key steps, best practices, and tips for cybersecurity succes

Real-World ISO 27701 Success: Synthesized Case Studies, Metrics, and Lessons for Privacy Resilience
Real-world ISO 27701 success from Tribeca, Kocho: DSAR efficiency gains, risk score reductions, certification ROI. Synthesized metrics prove privacy resilience

The Panoramic View: How Integrated Compliance Monitoring Creates Unprecedented Organizational Visibility and Adaptability
Gain unprecedented organizational visibility with integrated compliance monitoring. Automate real-time alerts, ensure GDPR & SOC 2 adherence, reduce risks, and
Run Maturity Assessments with GRADUM
Transform your compliance journey with our AI-powered assessment platform
Assess your organization's maturity across multiple standards and regulations including ISO 27001, DORA, NIS2, NIST, GDPR, and hundreds more. Get actionable insights and track your progress with collaborative, AI-powered evaluations.
Check out these other Gradum.io Standards Comparison Pages
BREEAM vs ISO 56002
Discover BREEAM vs ISO 56002: BREEAM certifies sustainable buildings via energy, health, ecology credits; ISO 56002 powers innovation systems. Compare for ESG & growth wins. Read now!
TISAX vs AS9100
Discover TISAX vs AS9100: Automotive infosec standard battles aerospace QMS powerhouse. Key differences, compliance tips & strategies for supply chain wins. Compare now!
ISA 95 vs BRC
ISA 95 vs BRC: Compare ISA-95's enterprise-MES integration models for seamless IT/OT data flow with BRC's HACCP-driven food safety standards. Boost manufacturing efficiency—explore now!