Into the Dragon's Den
This talk explores the strategic and operational security risks for Western SaaS companies expanding into the Chinese market, focusing on the 'Made in China 2025' initiative. It details how foreign businesses are compelled to form joint ventures with local operating partners, creating significant vectors for intellectual property theft and surveillance. The speakers provide a framework for 'antifragile' operations, emphasizing data residency, regional isolation, and the necessity of assuming a malicious insider threat. The presentation concludes with practical advice on minimizing external dependencies and implementing robust, automated security controls to mitigate these geopolitical risks.
The Hidden Cost of SaaS Expansion: Why Your "Joint Venture" is a Backdoor
TLDR: Expanding SaaS operations into China requires forming joint ventures with local partners, which creates a massive, often overlooked, attack surface for intellectual property theft and surveillance. These partnerships effectively mandate the sharing of source code and infrastructure access, turning your own employees and systems into potential assets for state-aligned intelligence gathering. Security teams must shift to an "antifragile" operational model that prioritizes regional isolation, strict data residency, and the assumption that any system within the Chinese perimeter is already compromised.
Expanding your SaaS footprint into new markets is a standard growth play, but the technical and geopolitical reality of operating in China is fundamentally different from spinning up a new region in AWS US-East. When you enter this market, you aren't just deploying infrastructure; you are entering a regulatory and operational environment that treats your data, your source code, and your employees as strategic assets. The "Made in China 2025" initiative isn't just a policy document—it is a blueprint for technology acquisition that relies on the forced integration of foreign companies into local supply chains.
The Mechanics of the "Operating Partner" Trap
The core of the risk lies in the requirement to form joint ventures with local "operating partners." From a security perspective, this is a forced supply chain compromise. You are essentially being asked to hand over the keys to your kingdom to an entity that is legally and culturally obligated to prioritize the interests of the Chinese state.
When you integrate these partners into your CI/CD pipelines, identity providers, or data stores, you are creating a massive vector for Broken Access Control. These partners often demand access to source code for "security audits" or "localization," which provides them with the perfect opportunity to identify vulnerabilities, plant backdoors, or exfiltrate proprietary algorithms. If you are using Okta or similar identity providers to manage access, you are likely granting these partners the same privileges as your own engineers.
Why Your Current Security Model Will Fail
Most security teams operate on the assumption of "good faith" from internal users. In a standard US-based environment, an engineer might be a risk, but they are rarely a state-sponsored intelligence asset. In the context of a joint venture in China, you must assume that your "operating partner" is a malicious insider.
Traditional detection methods like DLP or standard log monitoring are insufficient here. If an attacker has legitimate, authorized access to your systems, they don't need to "hack" in the traditional sense. They can simply use valid credentials to perform authorized actions that look like normal business operations. This is the essence of Identification and Authentication Failures.
To defend against this, you need to move toward a model of regional isolation. This means:
- Data Residency: Keep Chinese user data strictly within Chinese borders, and ensure that no global data pipelines or analytics engines have direct access to this environment.
- Architectural Segmentation: Treat your China region as a completely separate, untrusted entity. If you are using tools like GitHub or Jira, do not use the same instances for your global and Chinese operations. Use local alternatives like Gitee or regionalized instances that are physically and logically isolated.
- Credential Rotation: Assume that any secret, token, or credential used in the China region is compromised. Implement automated, high-frequency rotation for all service accounts and API keys.
The "Antifragile" Operational Mindset
If you are a pentester or researcher looking at this, stop looking for SQL injection and start looking for the "business logic" of the partnership. How does the joint venture handle code reviews? Who has access to the production environment? Where are the logs stored, and who has the ability to purge them?
The goal is to build an "antifragile" system—one that doesn't just survive an attack, but is designed to function even when components are known to be compromised. This means moving away from manual, human-driven processes. If a human has to manually approve a deployment or access a database, you have already lost. Your deployment pipelines should be fully automated, with no human access to production. If a human needs to "fix" something, they should be doing it through a controlled, audited, and ephemeral interface that leaves no permanent access behind.
What to Do Next
If your organization is planning an expansion, your first task is to map the dependencies. Identify every single point where your global infrastructure touches the Chinese environment. If you find that your global CI/CD pipeline is pulling code from a repository that your Chinese partner can modify, you have a critical vulnerability.
Don't wait for a breach to realize that your "operating partner" is not your friend. Start by auditing your identity and access management (IAM) policies. If you can't prove that your Chinese partner has zero access to your global production environment, you are already operating in a state of compromise. The "Dragon's Den" isn't a place you visit; it's a reality you have to build your entire security architecture around. If you aren't prepared to treat your own infrastructure as hostile, you aren't ready to operate in this market.
Vulnerability Classes
Target Technologies
Attack Techniques
Up Next From This Conference
Similar Talks

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

Hiding in Plain Sight: Next-Level Digital Privacy




