China’s digital landscape is governed by strict cybersecurity regulations, and one of the most critical requirements for businesses operating information systems is the MLPS Filing. If you’re planning to operate digital services, process data, or run any type of network in mainland China, understanding the Multi-Level Protection Scheme is essential for legal compliance and successful market entry. This guide outlines everything you need to know about the MLPS Filing including who needs one and how to get one.
The Multi-Level Protection Scheme (MLPS), known in Chinese as the 信息安全等级保护管理办法, is a cybersecurity framework in China that classifies and regulates the security requirements of information systems. The MLPS framework ensures that companies protect their data and systems in line with national requirements.
Each information system receives a security level classification based on two key factors: the role it plays in national security, economic development, and social life, and the potential harm to national security, social order, public interests, and the legitimate rights of citizens and organisations if compromised or destroyed.
Once classified, companies must implement security measures, manage security products, and handle security incidents according to the established procedures for their system’s designated level.
MLPS classifies systems into five levels based on potential damage from security breaches or system failures:
| Level | Type of Networks | Objects in Danger if Compromised | Degree of Harm |
| Level 1 | Basic networks | The legitimate rights and interests of relevant citizens, legal persons and other organisations | General damage |
| Level 2 | Basic networks | The legitimate rights and interests of relevant citizens, legal persons and other organisations | Serious damage |
| Social order and public interest | General damage | ||
| Level 3 | Important networks | The legitimate rights and interests of relevant citizens, legal persons and other organisations | Severe damage |
| Social order and public interest | Serious damage | ||
| National security | General damage | ||
| Level 4 | Particularly important networks | Social order and public interest | Severe damage |
| National security | Serious damage | ||
| Level 5 | Extremely important networks | National security | Severe damage |
The following timeline details how the legal foundation governing MLPS in China formed, showing why compliance is mandatory for all network operators:
Under China’s Cybersecurity Law and the national standard GB/T 22240-2020, all network operators are required to classify and file their MLPS objects (等级保护对象). This obligation applies to any organisation that operates networks, information systems, or data-processing components within Mainland China.
According to the above national standard, MLPS objects fall into three categories:
Examples of information systems that require MLPS Filing include:
Examples of communication networks facilities that require MLPS Filing include:
Examples of data resources that require MLPS Filing include:
This means any company processing or storing data in China, operating servers in China, or offering digital services to Chinese users must complete MLPS classification and filing for each independent information system. This requirement applies to:
In practice, companies must file MLPS for each system that falls under the national standard’s definition of an “object of classification” (定级对象). Therefore, a system needs to be filed if it has:
This means companies do not file their entire IT environment. Instead, they file each system that falls under the above definition. This allows MLPS compliance to match the way systems are actually built and deployed in real-world technical environments.
Understanding how information systems are classified under China’s Multi-Level Protection Scheme (MLPS) is essential for determining filing requirements and the security obligations that follow. The table below summarises the characteristics and typical examples of MLPS Levels 1 through 5.
| MLPS Level | Risk / Classification Characteristics | Typical System Examples |
| Level 1 | Minimal impact; systems do not process personal data or sensitive business data. Security incidents would have negligible effect on users or operations. | Static informational websites, marketing pages, publicly accessible product/documentation sites. |
| Level 2 | Limited business impact; systems that process non-sensitive operational data or support small-scale China workloads. Compromise affects the company but not public interests. | Reverse proxies, edge nodes, API gateways, small microservices in China, internal office tools hosted in China without personal data, basic content distribution endpoints. |
| Level 3 | Clear impact on public interests. Systems that process personal data, provide consumer-facing services, or operate core business functions in China. | User-account/authentication systems, e-commerce platforms, mobile/web apps with large user bases, SaaS platforms for Chinese enterprises, CN-hosted databases containing profiles, transactions, or other regulated data. |
| Level 4 | Severe impact on social order, key industries, or critical public services. Typically applied to Critical Information Infrastructure (CII) operators. | Banking core platforms, telecom operational systems, power grid SCADA, transportation scheduling/dispatch, large hospital HIS/EMR systems, major payment clearing and settlement systems. |
| Level 5 | Significant impact on national security. Systems whose compromise could affect state stability, national defense, or nationwide critical operations. | National-level command and control systems, military information platforms, nationwide financial settlement networks, national emergency response platforms, top-tier government data centers. |
Most international companies operating in China fall under Level 3, because at this level, systems begin processing personal data, providing consumer-facing functions, or performing core business operations for Chinese users. Even when most infrastructure is located overseas, any China-based subsystems that store or process user data (e.g., databases, analytics pipelines, content delivery components) typically trigger Level 3 filing requirements.
To begin the MLPS Filing process, you must first determine a system’s security level. For level 1, this can be done through self-assessment. For leves 2 through 5, this can only be done by an MLPS-qualified testing agency, which evaluates the potential impact to national security, public interests, and business operations in the event of a security incident. It is imporant to note,At level 1, systems pose no risk to national security or public interests and therefore do not need to file their system with the Public Security Bureau, companies are however required to ensure that the system is compliant and functional.
Most commercial systems fall under Level 2 or Level 3. The Cybersecurity Department of the Public Security Bureau (公安机关网安部门) has an official database of all agencies qualified to carry out MLPS system classifications and testing.

According to Article 15 of the Administrative Measures for the Hierarchical Protection of Information Security, once the system’s level has been determined, you must submit the following materials within 30 days of obtaining the the level classification to the Cybersecurity Department of the local Public Security Bureau (公安机关网安部门) in the city or district where your company is registered:
The core form required for the record filing, stamped with the company’s official seal.
A description of system boundaries, functional modules, data flows, deployment location, cloud usage, and connected third-party services.
A clear architectural diagram showing servers, network segments, firewalls, databases, and external interfaces.
Companies are required to designate personnel across two distinct categories in accordance with the Cybersecurity Law and the Baseline for Classified Protection of Cybersecurity (网络安全等级保护基本要求):
Category 1: Company Leadership (Legal Responsibility)
These individuals bear legal responsibility and must be formal company employees:
When filing, all three roles require submission of ID cards or passports, appointment letters, and social insurance records. These three roles must be held by different individuals.
Category 2: System Administrators (Technical Operations)
These individuals handle day-to-day technical operations:
For non-classified systems, these three positions may be outsourced to third-party companies, and outsourced personnel may be foreign nationals. However, security responsibilities must be clearly defined in contracts, and outsourced personnel must undergo background checks and on-site assessments by the employing entity.
It is worth noting that the Public Security Bureau requires that this personnel be reachable and any communication will be in Chinese. It is therefore necesarry that the personnel mentioned above understand the system and can explain its functions in Chinese. AppInChina can provide this outsourcing for companies that do not have this personnel in China. Each role cannot be held by the same person, and their names, contact information, and outsourcing service agreement summaries must be accurately recorded in the filing materials.
The filing materials require two separate forms: one listing the Company Leadership who bear legal responsibility, and another listing the System Administrators who maintain operational separation of duties.
Personnel Requirements by System Type:
Non-classified systems (非涉密信息系统): These are typically systems classified as MLPS Level 3 or below that handle standard business or user data. The Company Leadership must be formal company employees with proper documentation. The System Administrators may be outsourced to third-party service providers, and professional certifications such as CISP or CISSP are recommended but not required.
Classified systems (涉密信息系统): These are systems typically classified as MLPS Level 4 or above that handle state secrets or sensitive government data. All designated personnel across both categories must be Chinese nationals, internal staff, formally trained, and certified by national authorities. Confidentiality commitments are mandatory, and no duties may be outsourced.
Required for verification of the entity submitting the filing.
For systems hosted on local cloud providers such as Alibaba Cloud, Tencent Cloud, AWS China, and Azure China. a hosting service agreement is often required to confirm the physical location of the system, as MLPS applies only to systems hosted within Mainland China.
After approval, the Public Security Bureau will issue an MLPS Filing certificate with a filing number.

After the MLPS filing is accepted, your company must implement the technical, procedural, and organisational security measures required for the designated MLPS level. This typically includes enhancements such as access control, network boundary protection, encryption, monitoring, logging, vulnerability management, and improvements to internal security policies. Many companies consult with testing institutions to complete this stage.
Once the required controls are in place, you must arrange for a certified MLPS testing institution to conduct the official technical assessment. This assessment verifies whether your information system meets the security requirements stipulated in the MLPS 2.0 technical standards for its designated level.
According to Article 25 of the Regulations on Levels of Cyber Security Protection, all systems regardless of their level must conduct an internal annual review to ensure the compliance and functionality of the system. In addition to the annual internal review, external assessments are compulsory only for Level 2 and above:
After each external assessment, any security risks identified must be rectified and both the assessment report and evidence of remediation submitted to the PSB for the record.

The timeline for obtaining MLPS Filing varies significantly based on your system’s classification level:
| Level | Typical Timeline | Key Activities and Notes |
| Level 1 | 15–30 days | Self-assessment and internal remediation. No Public Security Bureau filing required; timeline is fully controllable. |
| Level 2 | 2–4 months | Classification, filing, remediation, assessment, and certificate issuance. Can be compressed to 6 weeks if all materials are submitted correctly on first attempt. |
| Level 3 | 4–6 months | Comprehensive technical testing by third-party agencies, extensive remediation, and detailed PSB review. More thorough Public Security Bureau review process. |
| Level 4+ | 6–12+ months | Multiple rounds of expert review and industry regulatory authority approvals. Timeline depends on system complexity and regulatory scheduling. |
If your system architecture is complex, requires extensive remediation, or faces queues at regulatory review windows, the overall project timeline may extend to 6–12 months regardless of the initial classification level.
MLPS 2.0 requires all companies that operate any type of network in China undergo an assessment of each network that they operate in China. Network operators are required to implement security features according to the level of harm that would be caused if the network. Failure to file Levels 2 to 5 is a direct breach of Articles 21 and 59 of the Cybersecurity Law and Article 63 of the Regulations on Levels of Cyber Security Protection
Consequences for non-compliance include:
MLPS establishes the technical security baseline for protecting corporate data and employee/client personal information. While MLPS focuses on system security classification and technical controls, companies processing personal information in China must also comply with separate data protection obligations under the Personal Information Protection Law (PIPL) or 个人信息保护法 in Chinese.
Systems that lack proper MLPS classification may face compounded regulatory risk. For example, if a system processes personal information and fails to implement proper security measures, resulting in a data leak, aside from MLPS non-compliance consequences above, the company would also be subject to penalties under Article 66 of the Personal Information Protection Law (个人信息保护法):
While MLPS and PIPL are separate legal requirements, both are important to stay compliant in China when processing data.
Any platforms that wish to operate and succeed in China need to ensure they are compliant with China’s local laws and regulations, including MLPS, so that clients feel confident using their system in the country. Without MLPS compliance, companies may worry about the legal liability they take on when using the platform. As a result, the absence of an MLPS filing can steer clients away from adopting your system. This is especially true for B2B SaaS platforms that want to operate and succeed in China.
There is no fixed cost for obtaining the MLPS Filing. Costs vary depending on the testing agency you choose and the level of the system you are filing for. Typically, costs consist of:
The total estimated cost for MLPS Level 3 compliance is approximately USD 33,000 per year, though actual costs may differ based on your system’s infrastructure and evolving requirements.
Whether you have an established Chinese entity or are entering the market for the first time, AppInChina provides two pathways to help you achieve MLPS compliance efficiently.
At AppInChina, we can help with:
Contact us today to discuss which pathway is right for your business and ensure your system meets China’s cybersecurity standards.
