Enterprise Collaboration Service - OFFICIAL SENSITIVE
The Enterprise Collaboration Service is a web based work-space hosted within the MOD secure cloud. The service can be used to manage, store and securely distribute information up to and including UK OFFICIAL-SENSITIVE classification. The service delivers secure Document Management, Business Process and Business Intelligence toolsets alongside Collaborative networking capability.
- Allows Enterprise teams to collaborate and share applications effectively.
- Deployed for access from the Restricted LAN interconnect (RLI/ALI).
- Data dashboards and visulisation tools
- Used for information assets up to OFFICIAL-SENSITIVE
- Interactive community homepage with notice areas, discussion boards etc.
- Secure document management with full auditability
- Workflow capability
- Enables joint team alliancing, overcomes any local interoperability issues.
- Allows access to multiple applications for Enterprise Project Collaboration
- Allows teams to work collaboratively and securely, from remote locations.
- Enables information sharing across RLI boundaries with approved industry partners.
- Allows the management and storage data up to OFFICIAL-SENSITIVE classification.
- Enables the segregation of Assets Subject to Special Conditions (ASSC)
£29 per licence per month
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
- Modern Slavery statement
DEVONPORT ROYAL DOCKYARD LIMITED
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
Service accessed from RLI/ALI end points including SMI2.
Routine maintenance planned and scheduled in advance, with steps taken to reduce impact to service.
Compatible VDI component available on Client UAD.
|Email or online ticketing support||Email or online ticketing|
|Support response times||Standard 4 Hour response to Priority 1 incidents but ability to tailor to customer requirement.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Standard Infrastructure and application availability - 04:00 – 23:59 (Monday to Friday)* - 95% SLA (Outside Scheduled Downtime).
* Infrastructure and Applications may be available at times outside of the target availability hours stated above. Notwithstanding any such additional availability will be excluded from any Service Availability KPI calculation.
SLA's above and beyond the standard offering are priced on request.
|Support available to third parties||No|
Onboarding and offboarding
The setting up of a new Enterprise Collaboration Service is tailored to the user requirement. This can include:
- digitisation of information assets
- data migration/import
- Admin and user training
- production of appropriate documentation sets
- guidance and assistance for the Information Asset Owner and the accreditation process
These can be priced separately as required.
|Other documentation formats||Microsoft Office Applications|
|End-of-contract data extraction||Should you require your data to be extracted at point of exit a fee will be applied this is subject to the amount of data and security level for data held on the system. Data will be held on backup tapes for up to a year after cessation of the contract, after such time we cannot guarantee that data can be retrieved.|
|End-of-contract process||Formal notice is given for the termination of the service 90 days prior to contract end. Access to the customer workspace is removed. Any data can be extracted, but will be subject to a fee depending upon Security level and volume of data.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||Windows|
|Designed for use on mobile devices||No|
|Description of customisation||The Enterprise Collaboration Service can be tailored according to the customer requirements. This includes look and feel, features, application access, security and system integration with branding to suit corporate or project identity.|
|Independence of resources||Close monitoring of demand and consumption via appropriate performance monitoring toolsets in parallel with appropriate scaling of infrastructure resources to meet demand.|
|Service usage metrics||Yes|
Other metrics available on request
|Reporting types||Reports on request|
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||COTS products as required by Customer.|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||Less than once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Data exports can be provided through requests to the Service desk, the process is tailored to suit the level of security classification and volume of data to be exported.|
|Data export formats||
|Other data export formats||Dependant upon chosen COTS products|
|Data import formats||
|Other data import formats||Dependent upon chosen COTS product|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||Standard Infrastructure and application availability - 04:00 – 23:59 (Monday to Friday)* - 95% SLA (Outside Scheduled Downtime). * Infrastructure and Applications may be available at times outside of the target availability hours stated above. Notwithstanding any such additional availability will be excluded from any Service Availability KPI calculation. SLA's above and beyond the standard offering are priced on request.|
|Approach to resilience||Available on request|
|Outage reporting||Email alerts/phone calls|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
Access is managed through Access Control Lists (ACL's) defined by the Customer through approved workflows. Access to information is managed on a need-to-know basis, this includes restricting Admin access to the data and auditability records against information.
Audits of unused accounts and privilege escalation are undertaken to maintain appropriate access.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||Between 6 months and 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 6 months and 12 months|
|How long system logs are stored for||Between 6 months and 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||DAIS accreditation|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||DAIS accredited|
|Information security policies and processes||Babcock's service conforms to the Security Policy Framework, JSP 440 and JSP 604. We undertake Security Working Groups with our DAIS case officer and NTA. Each new service undertaken follows the outlined accreditation on-boarding process and requires Customer Information Asset Owner approval for on-boarding.|
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||Change management is undertaken subject to ISO20000 controls and processes, the scope of which includes other relevant service management elements.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Available on request due to sensitivity.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
Available on request due to sensitivity.
Complies to Authority defined standards.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||Incident management is undertaken subject to ISO20000 controls and processes, the scope of which includes other relevant service management elements.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||Yes|
|Other public sector networks||RLI / ALI|
|Price||£29 per licence per month|
|Discount for educational organisations||No|
|Free trial available||No|