MLPS 2.0 Compliance

Alibaba Cloud helps you build a security compliance system based on the latest Classified Protection of Cybersecurity 2.0 (CCPS 2.0 or MLPS 2.0).

Overview

Alibaba Cloud commits to guide you throughout your digital transformation journey in China. We understand the importance of security compliance and the common challenges faced by MNCs entering and expanding in China. On top of assuring Alibaba Cloud's compliance, this solution provides cloud security compliance capabilities and guidance for you to leverage and stay compliant with the key regulatory requirements, such as MLPS 2.0.

As a pioneer practitioner in MLPS 2.0 implementation, Alibaba Cloud ensures that its cloud platforms meet the MLPS 2.0 baseline. The platform intends to use the technical advantages of its cloud platforms and cloud security services to help implement the classified protection system for cybersecurity quickly, efficiently, and continuously, and improve the overall security protection capabilities of business systems on the cloud.

Download Whitepaper  

Learn more about Alibaba Cloud MLPS 2.0 Compliance

Contact Sales

What Is Classified Protection of Cybersecurity (CCSP) 2.0

CCSP, also known as Multi-Level Protection Scheme (MLPS), is a regulatory scheme designed to protect the cybersecurity of networks and systems in China. Under China Cybersecurity Law, it is required that the network operator in China must protect the network and the system components from interruption, damage, unauthorized access with a tiered concept to avoid any data leakage, manipulation, and eavesdropping. It is compulsory for all companies and individuals that own, operate, or provide services relating to network and corresponding system components in China to follow the national standards under the CCSP scheme. CCSP was first introduced in 2008 and subsequently updated to CCSP 2.0 in 2019.

What's New in MLPS 2.0?

There are several new technical and managerial requirement domains raised in MLPS 2.0. There is an emphasis on the concept of "one center, three layers of defense". The adoption of advanced, secure mechanisms is also required under MLPS 2.0, such as the trusted techniques and security management center. On top of the general requirements, a set of additional security requirements are extended to five types of emerging technologies. A corporation is required to have its security defense, risk management, and contingency management established, implemented, and monitored more comprehensively compared to those under MLPS 1.0.

Learn more about Alibaba Cloud MLPS 2.0 Compliance

Contact Sales

Solution Highlights

A Comprehensive End-to-End Process

This is a one-stop solution that covers every stage of the MLPS 2.0 process from the classification to inspection. This solution provides you with expert consulting services and the capabilities of implementing a robust, fully compliant MLPS 2.0 infrastructure on the cloud.

Local Expertise

Alibaba Cloud is a pioneer practitioner in MLPS 2.0 implementation and has rich experience in putting classified protection mechanisms into practice to help our customers meet the demands of MLPS regulatory requirements.

Recognized Infrastructure-Level Evaluation Results

You can apply the latest evaluation report on the cloud services of Alibaba Cloud through the Alibaba Cloud ticket system. It can be used as the infrastructure part to form your own classified protection evaluation conclusions to speed up your evaluation process with an excellent result cost-efficiently.

How It Works

Secured Physical Environment
Alibaba Cloud services are provided in an MLPS 2.0 compliant physical environment. Our cloud customers can enjoy the secured physical environment with physical access control, anti-theft, anti-sabotage, anti-lighting, fireproof, waterproof, damp-proof, temperature and humidity control, power supply management, and electromagnetic protection.
Secured Communication Network
Alibaba Cloud services are provided based on a secured communication network. Our cloud customers can leverage Alibaba Cloud's network product and security product to build secured network architecture for secured communication and transmission. On top of the measures mentioned above, our cloud customer can also benefit from the trusted authentication mechanisms provided by Alibaba Cloud.
Secured Zone Boundary
Alibaba Cloud provides our customers with the capability to protect the security boundaries with access control, intrusion prevention, malicious code prevention and security audit.
Secured Computing Environment
Alibaba Cloud provides our customers with the capability to secure their computing environment with identity authentication and management, access control, security audit, intrusion prevention, personal and important data protection.
Security Management Center
Alibaba Cloud provides our customers with a unified security management system that identifies, analyzes, and notifies you of security threats in real time.

Secured Physical Environment
Alibaba Cloud services are provided in an MLPS 2.0 compliant physical environment. Our cloud customers can enjoy the secured physical environment with physical access control, anti-theft, anti-sabotage, anti-lighting, fireproof, waterproof, damp-proof, temperature and humidity control, power supply management and electromagnetic protection.
Secured Communication Network
Alibaba Cloud services are provided based on a secured communication network. Our cloud customers can leverage Alibaba Cloud's network product and security product to build secured network architecture for secured communication and transmission. Our customers can flexibly manage the bandwidth on the cloud to deal with peak business needs, encrypt the important data before the transmission, and manage the key with our KMS services. On top of the measures mentioned above, our cloud customers can also benefit from the trusted authentication mechanisms provided by Alibaba Cloud.
Secured Zone Boundary
Alibaba Cloud provides our customers with the capability to protect the security boundaries with access control, intrusion prevention, malicious code prevention and security audit. With the incorporation of the Anti-DDoS Pro, comprehensive DDoS protection to intelligently defend sophisticated DDoS attacks with over 1.6Tbps mitigation capacity and mitigates potential security threats.
Secured Computing Environment
Alibaba Cloud provides our customers with the capability to secure their computing environment with identity authentication and management, access control, security audit, intrusion prevention, encryption, key management, data integrity protection, vulnerability management, and personal and important data protection.
Security Management Center
Alibaba Cloud provides our customers with a unified security management system that identifies, analyzes, and notifies you of security threats in real-time.

Secured Physical Environment
Alibaba Cloud services are provided in an MLPS 2.0 compliant physical environment. Our cloud customers can enjoy the secured physical environment with physical access control, anti-theft, anti-sabotage, anti-lighting, fireproof, waterproof, damp-proof, temperature and humidity control, power supply management, and electromagnetic protection.
Secured Communication Network
Alibaba Cloud services are provided based on a secured communication network. Our cloud customers can leverage Alibaba Cloud's network product and security product to build secured network architecture for secured communication and transmission. Our customers can flexibly manage the bandwidth on the cloud to deal with the peak business needs, encrypt the important data before the transmission, and manage the key with our KMS services. On top of the measures mentioned above, our cloud customer can also benefit from the trusted authentication mechanisms provided by Alibaba Cloud.
Secured Zone Boundary
Alibaba Cloud provides our customers with the capability to protect the security boundaries with access control, intrusion prevention, malicious code prevention and security audit. With the incorporation of the Anti-DDoS Pro, comprehensive DDoS protection to intelligently defend sophisticated DDoS attacks with over 1.6Tbps mitigation capacity and mitigates potential security threats.
Secured Computing Environment
Alibaba Cloud provides our customers with the capability to secure their computing environment with identity authentication and management, access control, security audit, intrusion prevention, encryption, key management, data integrity protection, vulnerability management, and personal and important data protection. Our customers can manage multiple identities across applications on a central platform through our IDaaS offering.
Security Management Center
Alibaba Cloud provides our customers with a unified security management system that identifies, analyzes, and notifies you of security threats in real-time.

Learn more about Alibaba Cloud MLPS 2.0 Compliance

Contact Sales

MLPS Evaluation Process

MLPS is a holistic regulatory requirement system supported by a comprehensive end-to-end process that has five stages: Classification, Filing, Implementation and Rectification, Evaluation, and Authority Inspection. The classified object (i.e., the object to pass MLPS evaluation) is recommended to be assessed regarding the requirements for the corresponding classified level and implemented with the rectification measures to close the gaps before the evaluation process. The evaluation can only be conducted by the qualified evaluation agency in China according to the relevant requirements in "Baseline for classified protection of cybersecurity". The evaluation report issued by the qualified evaluation agency shall be submitted to the corresponding local agency of the Office of Cyber Security of the Ministry of Public Security (local government authority) for inspection and endorsement.

  • Compliance Process

  • Corporate Customer

  • Alibaba Cloud

  • Advisory Agency

  • Evaluation Agency

  • Government Authority

  • Classification

  • Determine the classified level of the object, prepare classification endorsement report.

  • Assist corporate customers in classification process.

  • Advise customers in preparing the classification report and organize the review with expert personnel.

  • Filing

  • Endorse the classification report and filing documents to the local government agency for filing.

  • Provide guidance for filing.

  • Advise customers in preparing the filing documents and complete the filing process.

  • Verify the filing documents.

  • Implementation and Rectification

  • Assess regarding the MLPS baseline requirements to identify and rectify the gaps.

  • Advise the security products to fulfill the relevant requirements of MLPS 2.0.

  • Advise customers in security hardening and assist customers in implementing the security management system.

  • Evaluation

  • Appoint external qualified evaluation agency to have the object evaluated and obtain the evaluation report.

  • On top of providing the certificate and compliance reports of Alibaba Cloud, Alibaba Cloud provides a one-stop evaluation service to corporate customer.

  • Advise customers in assessment and rectification.

  • Evaluate the object and issue the evaluation report.

  • Authority Inspection

  • Submit the evaluation report to the local government authority and cooperate with government officers for authority inspection.

  • Assist customers in completing the inspection and rectification.

  • Inspect the security mechanisms and measures to protect the object.

Compliance Process
    Classification
  • Corporate Customer

    Determine the classified level of the object, prepare classification endorsement report.

  • Alibaba Cloud

    Assist corporate customers in classification process.

  • Advisory Agency

    Advise customers in preparing the classification report and organize the review with expert personnel.

  • Evaluation Agency

  • Government Authority

    Filing
  • Corporate Customer

    Endorse the classification report and filing documents to the local government agency for filing.

  • Alibaba Cloud

    Provide guidance for filing.

  • Advisory Agency

    Advise customers in preparing the filing documents and complete the filing process.

  • Evaluation Agency

  • Government Authority

    Verify the filing documents.

    Implementation and Rectification
  • Corporate Customer

    Assess regarding the MLPS baseline requirements to identify and rectify the gaps.

  • Alibaba Cloud

    Advise the security products to fulfill the relevant requirements of MLPS 2.0.

  • Advisory Agency

    Advise customers in security hardening and assist customers in implementing the security management system.

  • Evaluation Agency

  • Government Authority

    Evaluation
  • Corporate Customer

    Appoint external qualified evaluation agency to have the object evaluated and obtain the evaluation report.

  • Alibaba Cloud

    On top of providing the certificate and compliance reports of Alibaba Cloud, Alibaba Cloud provides a one-stop evaluation service to corporate customer.

  • Advisory Agency

    Advise customers in assessment and rectification.

  • Evaluation Agency

    Evaluate the object and issue the evaluation report.

  • Government Authority

    Authority Inspection
  • Corporate Customer

    Submit the evaluation report to the local government authority and cooperate with government officers for authority inspection.

  • Alibaba Cloud

  • Advisory Agency

    Assist customers in completing the inspection and rectification.

  • Evaluation Agency

  • Government Authority

    Inspect the security mechanisms and measures to protect the object.

Related Resources

Webinar

MLPS 2.0 Insight and Alibaba Cloud's Solutions

Watch this webinar to learn about MLPS 2.0 and how Alibaba Cloud can help your business comply with MLPS 2.0.

Whitepaper

Alibaba Cloud Security Compliance Whitepaper for MLPS 2.0 Baseline

It's designed to help our cloud customers establish a security system on the cloud that is compliant with MLPS 2.0 in an easier way.

Whitepaper

2020 Alibaba Cloud Security Whitepaper - The China Gateway Version

Introduces the public cloud security system of Alibaba Cloud, specifically for security capabilities and offerings in Mainland China.

View All

Start with Alibaba Cloud Solutions

Learn and experience the power of Alibaba Cloud

Contact Sales