Primo Milestone

Oracle Primavera Cloud Service

Software as a Service for the applications available from the Oracle Primavera product suite. These applications include Primavera P6EPPM, Primavera Unifier, Primavera Prime, and other applications designed to support the delivery of Portfolio, Project and Contract Management.


  • Common Data Environment (CDE) designed to meet your projects' requirements
  • Neutral Platform for communications, processes, documents & models between stakeholders
  • BIM Capability, viewing, federation and co-ordination of the models
  • Integrate scope, cost, schedule and contract under a single platform
  • Empower users autonomy and greater contribution to value added work
  • Multiple scenarios and data linked to projects during execution
  • Configure and automate business processes to match workflow needs
  • Budget, commitment, spend, variance, and forecast management
  • Visibility of resource requirements to support effective Capacity Management
  • "What if” scenario planning, optimization and water-lining capability


  • Single source of truth for communications, documents, processes, and models
  • Connect all data for better insights and continuous improvement
  • Understand performance and trends across all your projects and portfolios
  • Unite stakeholders with a host of collaboration and feedback capabilities
  • Fulfill governance and regulatory reporting and auditing requirements
  • Capture audit trail of decisions, changes and approvals for compliance
  • Embed a common minimum standard for working and capturing data
  • Enforce business rules for budgeting, commits and funding
  • Optimise resource use across Programmes and Projects
  • Easily compare key information and KPIs side-by-side for scenarios


£90.55 to £218 per user per month

  • Education pricing available

Service documents


G-Cloud 11

Service ID

1 0 8 2 7 8 1 3 6 8 7 5 9 1 3


Primo Milestone

Mario Sanvitale


Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
Periodic maintenance windows typically occur during weekends are published in advance.
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
This will be dependent upon the 'Severity' of any issue raised.

Oracle will use reasonable efforts to respond to Severity 1 service requests within fifteen (15) minutes. Oracle will work 24x7 until the Severity 1 service request is resolved, a reasonable work-around is put in place, or as long as useful progress can be made.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Oracle support for Oracle Cloud Services consists of:

» Diagnoses of problems or issues with the Oracle Cloud Services
» Reasonable commercial efforts to resolve reported and verifiable errors in the Oracle Cloud Services so that those Oracle Cloud Services perform in all material respects as described in the associated Program Documentation
» Support during Change Management activities described in the Oracle Cloud Change Management Policy
» Assistance with technical service requests 24 hours per day, 7 days a week
» 24 x 7 access to a Cloud Customer Support Portal designated by Oracle (e.g., My Oracle Support) and Live Telephone Support to log service requests
» Access to community forums
» Non-technical Customer service assistance during normal Oracle business hours (8:00 to 17:00) local time

This service is at no extra cost.
Support available to third parties

Onboarding and offboarding

Getting started
We provide on-line training and user documentation. We can provide further training if required, both on-line and on-site.
Service documentation
Documentation formats
End-of-contract data extraction
For a period of 60 days upon termination of the Oracle Cloud Services, Oracle will make available via secure protocols, Your Content residing in the production Cloud Services environment, or keep the service system accessible, for the purpose of data retrieval by You.
Typically this will be of the form of a Database extract.
End-of-contract process
Database export of the Applications schema is included.

If data is required in additional formats or reports then this will require additional cost.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
Designed for use on mobile devices
Differences between the mobile and desktop service
The native mobile applications are designed for field users to view, update, and collaborate on projects.

They are designed to be intuitive and easy to use for simple status update tasks or project collaboration. They do not feature the full capability and functions of the full browser based solutions.
Service interface
What users can and can't do using the API
The API is accessed through exposed Web Service End-Points.

Nearly all application data and functionality is exposed through these Web Services.

Full documentation is available that lists all exposed data elements, business objects and operations.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available


Independence of resources
The solution is provided on fully scalable platform and infrastructure. The deployment is sized and architected such that the system will provide a responsive end user experience to all of the proposed users of the system.

The infrastructure includes network load balancers and clustered application/data tiers and Oracle Oracle monitors the performance and availability of Services environments through various toolsets. Monitoring information is used to tune the Services environment and improve Cloud Services performances through maintenance activities.


Service usage metrics


Supplier type
Reseller providing extra support
Organisation whose services are being resold
Oracle Primavera

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Other
Other data at rest protection approach
Data at Rest is encrypted via 'Transparent Data Encryption', a Security function of the oracle Database.
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Exporting from the applications is standard capability and formats available include Excel/CSV and XML.
Also standard reporting capability provides multiple formats of output including: Excel, PDF, RTF, PowerPoint

Proprietary formats include Primavera P6 and Microsoft Project.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Availability and RPO/RTO Metrics are available through the Primavera Service Descriptions:
Approach to resilience
Oracle Cloud Services are deployed in resilient computing facilities with resilient infrastructure, redundant network connections, and power at each hosting facility.
Outage reporting
Any outages are initially reported to your designated contacts via email.

Identity and authentication

User authentication needed
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
For service components managed by Oracle, Oracle’s access to Your Content is restricted to authorized staff on a need to know basis.

Oracle uses the principle of "Least privilege" in which user permissions and system functionality are carefully evaluated and access is restricted to the resources required for users or systems to perform their duties.

Oracle Cloud operations teams access Services environments through a DMZ environment inside a dedicated extranet isolated from Oracle's internal corporate networks. Only approved operations and support engineers with a valid account can access a customer environment using multi-factor authentication through a virtual private network (VPN).
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
SSAE 16 SOC 2 Type I/II

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Oracle has adopted security controls and practices for Oracle Cloud Services that are designed to protect the confidentiality, integrity, and availability of Your Content that is hosted by Oracle in Your Oracle Cloud Services environment and to protect Your content from any unauthorized processing activities such as loss or unlawful destruction of data. Oracle continually works to strengthen and improve those security controls and practices.
Oracle Cloud Services operates under practices which are aligned with the ISO/IEC 27002 Code of Practice for information security controls, from which a comprehensive set of controls are selected.
Information security policies and processes
Oracle’s overarching Organizational Security is described in the Oracle Security Organization Policy and the Oracle Information Security Policy.
The Chief Corporate Architect, who reports directly to the CTO, manages the functional departments directly responsible for identifying and implementing security controls at Oracle . The Global Information Security, Global Product Security, Global Physical Security, and Oracle Security Architecture organizations comprise Oracle Corporate Security, which provides in dependent security policy, guidance and compliance oversight to Oracle worldwide.

The Oracle Security Oversight Committee (OSOC) oversees the implementation of Oracle-wide security programs, including security
policies and data privacy standards. The OSOC is chaired by Oracle’s
CEO, General Counsel, and Chief Corporate Architect.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Oracle Cloud Operations performs changes to cloud hardware infrastructure, operating software, product software, and supporting application software that is provided by Oracle to maintain operational stability, availability, security, performance, and currency of the Services. Oracle follows formal change management procedures to review, test, and approve changes prior to application in the production service.

The Oracle Cloud quality assurance process includes security-specific test plans. These test plans include the review of data visibility, access control, password control, administrative privileges, end-user role privileges, and data access rules. Security-specific testing focuses on operation and processing according to the Oracle Cloud design and specifications.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability assessment tools are used to identify security threats and vulnerabilities in the Cloud Services and Services environments. Formal procedures are in place to assess, validate, prioritize, and remediate identified issues. Oracle subscribes to vulnerability notification systems to stay apprised of security incidents, advisories, and other related information. Oracle acts on the notification of a threat or risk once it has confirmed that, both, a valid risk exists and that the recommended changes are applicable to Services environments.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Oracle evaluates incidents that create suspicions of unauthorized access to or handling of customer data whether the data is held on Oracle hardware assets or on the personal hardware assets of Oracle employees and contingent workers. When Oracle's GIS organization is informed of such incidents, it defines escalation paths and response teams to address those incidents. GIS will work with the Customer, internal LoBs, the appropriate technical teams, and law enforcement where necessary to respond to the incident. The goal will be to restore confidentiality, integrity, and availability of the Customer's environment, and to establish root causes and remediation steps.
Incident management type
Supplier-defined controls
Incident management approach
Oracle employees are required report suspected incidents in accordance with the Oracle Information Security Incident Reporting and Response Policy.

Every Cloud Service user is responsible for reporting information security issues. Customers can formally report security concerns according to the terms specified in the ordering document and according to the following information:

Reporting security vulnerabilities - An Oracle Cloud Services customer can use the Cloud Customer Support Portal

Report privacy concerns to Oracle’s Privacy office at

Incident reports and updates will be provided to the designated customer contacts.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£90.55 to £218 per user per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑