INTRODUCTION
Since the emergence of China’s broad cybersecurity framework, which began evolving in earnest after the Cybersecurity Law took effect in June 2017, there has been a core tension in the country’s regime around IT and data security.
At the time of the promulgation of the Cybersecurity Law, a decade-old regime called the Multi-Level Protection System (MLPS), a compliance regime run by the Ministry of Public Security (MPS), was already in place. MLPS works by ranking communications networks according to their level of sensitivity and potential harm to national security if penetrated or damaged, and requiring tougher cybersecurity standards on more sensitive networks, particularly those run by the government and military (Level 4 and 5).
With the Cybersecurity Law, China introduced a number of rules around so-called “critical information infrastructure” (CII)— networks supporting key industrial sectors in the national economy, such as finance, transportation, and energy that would be subject to new requirements around data and cybersecurity practices. Rather than being dominated by one ministry, the CII protection authorities were designed to be overseen by the Cyberspace Administration of China (CAC), a new entity created in 2014 to coordinate China’s cyber interagency, working with sectoral regulators.
But the MPS never fully transferred its cybersecurity elements to CAC, nor did it end up playing a subordinate role in China’s cyber interagency. This led to extended bureaucratic wrangling between MPS, CAC, and others over the lead role in setting cybersecurity standards and implementing reviews of network products and services as called for under the Cybersecurity Law. The relationship between the MLPS and CII protection in the overall Cybersecurity Law regimewas therefore long unclear, as was the balance of power in cybersecurity rules for network products and services. MLPS has now fully updated its regime, at the same time as the definitions of CII and required protections around CII have also gradually come into focus.
The Guiding Opinions translated by DigiChina below point to a joining of MLPS and CII protection rules under MPS and Communist Party leadership—with few mentions of the CAC itself or the broader cyberspace regulatory establishment. This suggests that the MPS gained significant ground within the Chinese cyber interagency, and the MPS now primarily owns the CII protection issue, along with a key role in reviewing and certifying network products and services used in CII networks. The ministry’s power is not absolute, however. The CAC still administers supply chain–oriented security reviews in IT procurement under rules finalized this year, and both those rules and the new Guiding Opinions point to local and sectoral regulators as helping define which entities fall under the CII protection regime. –Graham Webster and Paul Triolo
[Chinese-language original] [Archived version]
TRANSLATION
Date: Sept. 22, 2020
Guiding Opinions on Implementing the Cybersecurity Multi-Level Protection System and Critical Information Infrastructure Security Protection System
The cybersecurity multi-level protection system (MLPS) and the critical information infrastructure (CII) security protection system are basic systems determined in relevant Party Center documents and the Cybersecurity Law” In recent years, all work units and all departments have, according to the Center’s cybersecurity policies and requirements, as well as the provisions of laws and regulations such as the Cybersecurity Law, comprehensively strengthened cybersecurity work, and forcefully safeguarded the security of national CII, important networks, and data. But along with the rapid development of information technology, cybersecurity work still faces a number of new circumstances, new tasks, and new challenges. In order to deeply implement the MLPS and the CII security protection system, to complete and perfect the national cybersecurity comprehensive defense and control system, effectively guard against cybersecurity threats, forcefully deal with cybersecurity incidents, strictly attack unlawful and criminal activities harming cybersecurity, and realistically ensure national cybersecurity, the following guiding opinions are formulated.
I. Guiding concepts, basic principles and work objectives(1) Guiding concepts
With Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era as guidance; according to the policy decisions and arrangements of the Party Center and the State Council; with the comprehensive national security concept in command, earnestly implement the cyber superpower strategy, and comprehensively strengthen overall planning of cybersecurity work; with implementing the MLPS and CII security protection system as basis; with protecting the security of CII, important networks, and data as focal points; comprehensively strengthen cybersecurity defense management, monitoring and early warning, emergency response, investigation of attacks, intelligence and information and all other such work items; promptly monitor and deal with cybersecurity risks and threats as well as sudden cybersecurity incidents; protect CII, important networks, and data from attack, intrusion, interference, and destruction; punish unlawful and criminal online activities according to the law; realistically raise cybersecurity protection capabilities; vigorously build the comprehensive national cybersecurity defense and control system; realistically safeguard national cyberspace sovereignty, national security, and society’s public interest; protect the lawful rights and interests of the masses; and ensure and stimulate the healthy development of economic and social informatization.
(2) Basic principles
- Persist in hierarchical protection and focusing on prominent issues. On the basis of the degree of importance of networks (including network infrastructure, information systems, data resources, etc.) in national security, economic construction, and social life, as well as factors such as the degree of harm after they are damaged, etc., scientifically determine the security protection level of networks, implement hierarchical protection, hierarchical supervision and management, and focus on ensuring the security of CII and MLPS Level 3 and above networks.
- Persist in vigorous defense and comprehensive protection. According to laws, regulations, and relevant national standards and norms, fully use artificial intelligence, big data analysis, and other such technologies; vigorously implement cybersecurity management and technological protection measures; strengthen cybersecurity monitoring, situational awareness, notification and early warning, emergency response, and other such key work points; comprehensively adopt cybersecurity protection, defense, and safeguard measures; guard against and contain the occurrence of major cybersecurity risks and incidents; and protect the security of new technology applications and new business models such as cloud computing, the Internet of Things, the new-type Internet, big data, smart manufacturing, etc.
- Persist in protection according to the law, and creating joint forces. According to the provisions of the Cybersecurity Law and other such laws and regulations: public security bodies are to implement cybersecurity protection, supervision, and management duties according to the law; competent authorities for the cybersecurity sector (including supervision and management departments, similar hereafter) are to implement cybersecurity management and supervision responsibilities according to the law; strengthen and implement the primary protection responsibilities of network operators; and fully give rein to and muster forces from all sides of society, cooperate and coordinate, work as a team, and create joint forces for cybersecurity protection work.
- Deeply implement the cybersecurity MLPS. MLPS level filing, multi-level monitoring and assessment, security construction, inspection, and other such basic work items are to be deeply advanced. The “three changes and six defenses” measures of “actualization, systematization, regularization” [the “three changes”] and “dynamic defense, active defense, deep defense, precision defense, overall defence, joint defense” [the “six defenses”] in cybersecurity protection are to be effectively implemented, a desirable ecosystem for cybersecurity protection to be basically established, and national comprehensive cybersecurity defense capabilities and levels to markedly increase.
- Establishment and implementation of the CII security protection system. Central elements of CII are to be clarified, security protection bodies to be completed, responsibilities to be determined, and protection to be powerful. On the foundation of implementing the MLPS, security protection measures for CII-related critical personnel management, supply chain security, data security, emergency response, and other such focus points are to be effectively implemented, and CII security protection capabilities to be strengthened notably.
- Markedly increasing cybersecurity monitoring, early warning, and emergency response capabilities. A three-dimensional intersectoral, interdepartmental, and interregional cybersecurity monitoring system and cybersecurity protection platform is to be basically completed; and cybersecurity situational awareness, notification, early warning, incident detection and processing capabilities to rise markedly. Cybersecurity preparatory plans are to be scientific and fully completed, emergency response mechanisms to be perfected, emergency response drills to be launched on a regular basis, and major cybersecurity incidents to be effectively prevented, contained, and dealt with.
- Basically creating a comprehensive cybersecurity protection and control system. Cybersecurity protection work mechanisms are to be completed and perfected—a cybersecurity work structure with Party Committees in the comprehensive lead, all departments taking responsibility according to the division of work, and social forces from many sides participating to be further perfected. Cybersecurity responsibilities are to be effectively implemented, cybersecurity management and defense, supervision and guidance, investigation of attacks and other such capabilities to increase markedly, and an integrated “attack, defense, management and control” comprehensive cybersecurity prevention and control system to be basically created.