Introduction and Context:
Western companies continuing to do business in China have to accept that the security framework of the state will not loosen anytime soon and more likely will drift in the direction of more control, more surveillance with priority given to the collective good and social stability, as promulgated by the ideological thought of the China Communist Party (CCCP), over individual rights and freedoms which are the norm in Western democracies. This, however, does not have to be incompatible with technical innovation, high quality products, and economic growth as has been shown in the past decade according to the authors of a recent Harvard Business Review article from the Understanding China series. For an up-to-date view, see also a 2023 perspective from the Asia Society Policy Institute. It is clear China is a current global competitor in many domains like automotives, space launch technologies, artificial intelligence, biopharma, e-commerce, and high-end consumer products manufacturing at scale. However, China continues a policy whereby western companies must setup a Chinese entity and transfer intellectual properties (IP), for products made and sold in China, to its China domicile business entity. This could be fine as seen by the large number of western companies which have a China based subsidiary. But there are risks of exposure or theft of IP or personal identifiable information (PII) by malicious actors, or extra-legal intrusive reviews by government entities.
Problem:
A large multinational pharmaceutical company was advised that a way to minimize the risks is to create a new zero-trust network connecting all business offices and manufacturing centers, and to secure each site with robust firewall and security inspection and threat management systems integrated into each site local area network (LAN). However, how to design this network? How can it be managed by the non-China based network team? How to control the #SDWAN edge routers? How can traffic in and out of China be made secure? Is it feasible with the China Great Firewall?
Ingenium Grex Solution:
We were initially asked to design only connectivity for the sites. However, as threats and risks were more clearly aligned with business strategy and information security policy, the design scope increased to include two new hosting datacenters, two new cloud regions with high-speed cloud connectivity, and all with resiliency. We proceeded to examine options consider how to best balance cost, functionally, and security requirements.
Design Outcome:
Lessons:
- China has specific laws and regulations about how work can be procured and invoiced. For example all professional services need to be sourced through a China based service provider. Some technical services, like network circuits or hardware, can be procured through a non-China service provider, others need to be procured locally. It is important to first understand how to procure all the needed services in Mainland China.
- It is equally important to understand the statement of work (SOW) creation and execution process as there are very specific formats, content, regulations and signing requirements. For example, paper based signing is still the norm.
- People communication can be a challenge, but many China based service providers are now able to assign personnel with dual-language skills. This should also be assessed upfront.
- Finally, when deploying virtualized services like SDWAN, SDLAN, etc. It is critical to evaluate technically what is feasible based on the service support model, role based access, and geographic location of support personnel.
Peter Singh is Principal at Ingenium Grex, and can be reached at peter.singh@ingrex.net