Prolinx Assured Cloud Services (PACS), Secure Platform as a Service (PaaS)
Prolinx PaaS is a UK-hosted assured community Cloud Service that delivers a fully managed UK Sovereign secure and scalable application hosting platform, including Evaluation, Design, Integration and Security Approvals, with an agile storage and consumption model supported by a 24x7x365 Service Desk. Available at the Official and Secret security tiers.
Features
- Multi-functional environment
- Secure, simple, and highly scalable hosting platform to aid collaboration
- Delivered as a fully managed end-to-end service
- ISO9001, ISO20000, ISO27001 certified organisation and ITIL service management framework
- Securely operated in UK by SC/DV Cleared Personnel (minimum level)
- Supported by a 24/7 UK-based Service Desk
- Option to access database, application and specialist support services
- Secure and hardened identity management service
- Connectivity to MSN/MCN(S)/PSN (assured and Protect)
- Initial building block for SaaS
Benefits
- Reduces cost and complexity of managing technology and resources
- Can handle Official (including caveats) in all environments
- Service hosted in the UK ONLY locations for data sovereignty
- Increases operational efficiency through provision of Prolinx expertise
- Allows customer focus on core business values (application and data)
- Simple application on-boarding process
- Flexible replication and backup options
- OS patching/AV/Malware delivered as part of the fully managed service
- Securely operated in UK by SC/DV Cleared Personnel
- Opex billing model allows for stable and predictable financial forecasts
Pricing
£0.10 a virtual machine an hour
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 12
Service ID
1 7 6 7 5 5 4 7 8 3 9 0 5 4 1
Contact
Prolinx Ltd
Sam Howells
Telephone: +44 (0) 330 180 0099
Email: Sam.howells@prolinx.co.uk
Service scope
- Service constraints
- A constraint is each individual new service cannot operate without DAIS accreditation. We agree to represent the proposed services to the accreditors addressing the approach and risk control.
- System requirements
-
- Application licencing is the responsbilitiy of the Application Owner/Customer.
- Need to gain relevant authority approval and accreditation
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Any questions/ requests for information will be acknowledged within 4 working hours and resolved within 1 working day.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Prolinx will offer 1st line support for initial diagnosis, as well as 2nd and 3rd line support. Prolinx also offer consultancy, technical account management and cloud support engineers. A customer support representative is also appointed.
Please refer to SFIA rate card for support costs. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
An Application Requirement Document (ARD) is provided to the Application Owner to complete; this will define the requirement.
The on-boarding process will be initiated that will end with the provision of Administrator account(s), access the VM(s) and to a platform Dashboard.
Prolinx can provide on-line supporting material (User Guides) to assist customers to maximise the benefits of the Official Connections collaborations tool. On-site training can be provided and our Service Desk can be available to provide assistance and guidance to customers as required. More formal classroom training can be provided which Prolinx would be happy to facilitate. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- Termination or migration will necessitate a four week period prior to any expiry of the contractual agreement; Prolinx and the customer will agree an exit plan which will include a mandatory service migration meeting covering: • The return of user generated data most appropriate to meet the exit and security requirements • Whether they wish their data to remain available for future use (i.e.; persistent storage). If the data is not required, it will be purged and destroyed in accordance with the requirements associated with the data BIL rating. • Whether they wish to extract their data. If the data is rated at Official including caveats (BIL3), precautions will need to be put in place to ensure that the security of the data is not compromised. Data can be extracted in a variety of formats including XML, CSV and TXT. • Exit project plan • The compliance requirements for secure destruction of important data and storage media • Risk Assessments and agreed service cessation milestones • Final commercial reconciliation. Prolinx will agree a price for delivering the exit plan and will have fifteen days to transfer or destroy all user generated data within the Prolinx Assured Cloud Service.
- End-of-contract process
- In line with G Cloud T&Cs at least 90 days notice of termination must be provided in writing. In the event of termination, all/any remaining service charges will still apply and will be payable on or before the termination date. Termination or expiry of the contractual agreement will initiate the Exit Project Plan as set out in the off-boarding section of this document.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Manual
- Independence of resources
-
Customer environments are logically segregated to prevent users and customers from accessing resources not assigned to them.
Services which provide virtualized operational environments to customers ensure that customers are segregated via security management processes/controls at the network and hypervisor level.
Prolinx continuously monitors service usage to project infrastructure needs to support availability commitments/requirements. Prolinx maintains a capacity planning model to assess infrastructure usage and demands at least monthly, and usually more frequently. In addition, the Prolinx capacity planning model supports the planning of future demands to acquire and implement additional resources based upon current resources and forecasted requirements. - Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Other
- Other metrics
-
- Custom metrics generated by customers’ applications and services
- Metrics associated with log files generated by the applicatio
- Security metrics associated with user activity
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Machine image
- Flexible backup of Drives available.
- Backup controls
- The back up and data recovery SLAs are more likely to be pre-agreed with the customer, rather than user initiated. However, manual or scheduled backups are possible but need to pre-defined.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Prolinx currently provides SLAs for several services for Goverment Departments. Due to the rapidly evolving nature of Prolinx’s product offerings, SLAs are best to be pre-agreed to satsify the user requirements.
Prolinx offer well-architected solutions that leverage unique capabilities such as multiple IL3 Secure Data centres that, can ease the burden of achieving specific high availability SLA requirements. - Approach to resilience
-
The PACS Business Continuity plan details the process that PROLINX follows in the case of an outage, from detection to deactivation. PROLINX has developed a three-phased approach: Activation and Notification Phase, Recovery Phase, and Reconstitution Phase. This approach ensures that PROLINX performs system recovery and reconstitution efforts in a methodical sequence, maximizing the effectiveness of the recovery and reconstitution efforts and minimizing system outage time due to errors and omissions.
PROLINX maintains a ubiquitous security control environment across all their data centres. Each data centre is built to physical, environmental, and security standards in an active-active configuration, employing an n+1 redundancy model, ensuring system availability in the event of component failure. Components (N) have at least one independent backup component. All data centres are online and serving traffic. In case of failure, there is sufficient capacity to enable traffic to be load-balanced to the remaining sites.
Customers are responsible for implementing contingency planning, training and testing for their systems hosted on PACS. PROLINX provides customers with the capability to implement a robust continuity plan, including the utilization of frequent server instance back-ups, data redundancy replication, and the flexibility to place instances and store data within multiple geographically separated data centres. - Outage reporting
- An email alert and direct conversation with the Global Operations Security Control Centre (GOSCC) for MoD clients.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Prolinx make use of trusted roles and have separation of duty and limits on each transactional privilege set. All these measures combine to an accepted standard practise which has satisfied already provisioned MoD and other Government contracts.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 20/06/2018
- What the ISO/IEC 27001 doesn’t cover
- There are no exceptions and our certificate covers the following: The provision of IT infrastructure solutions and IT managed services, which includes consultancy, design and implementation services. This in accordance with the ISMS statement of applicability dated 20/06/2018.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
CSA CCM version 3.0
ISO/IEC 27001
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Prolinx has a variety of methods already in use to support change and configuration management to track and identify components from cradle to grave. The design and change of any function is managed via key stages from initiation, planning and co-ordination through to validation and testing and early life support. This will be managed using ITIL methodologies and best practices.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- The Prolinx monitoring platform can provide real-time views of availability statistics, as well as detailed monitoring and analysis of data from virtual switches, routers, servers and any other SNMP-enabled devices. The Prolinx monitoring platform which includes availability, security and integrity monitoring of the applications and VMware horizon environment. Prolinx also use Fortigate firewalls and Fortigate wireless hardware for its architectures. These products are best of breed within the market and can be fully managed, supported and monitoring by Prolinx service desk. Every incident that requires escalation we engage the relevant parties taking any necessary action reporting directly to the GOSCC
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- The Prolinx monitoring platform can provide real-time views of availability statistics, as well as detailed monitoring and analysis of data from virtual switches, routers, servers and any other SNMP-enabled devices. The Prolinx monitoring platform which includes availability, security and integrity monitoring of the applications and VMware horizon environment. Prolinx also use Fortigate firewalls and Fortigate wireless hardware for its architectures. These products are best of breed within the market and can be fully managed, supported and monitoring by Prolinx service desk. Every incident that requires escalation we engage the relevant parties taking any necessary action reporting directly to the GOSCC
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- The Service Desk manages incidents using a dedicated service management tool suite these can be raised by a telephone call, email or from an automated alerting system. Incidents are classified and prioritised in accordance with the agreed SLAs. There are multiple types of classification and several levels of prioritisation that can have different response and resolution characteristics ranging from 30 minute responses with 4 hour resolutions to 4 hour responses with 48 hour resolutions with several levels in between. Incidents are managed to ensure that any impact is minimised and the situation is dealt with appropriately.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- We use a blend of the most popular technologies such as VMware, Hyper V, Red Hat etc and have suitably qualified and and experienced personnel competent in these technologies to bespoke secure IaaS solutions to our customers.
- How shared infrastructure is kept separate
- Customer environments are logically segregated, preventing users and customers from accessing unassigned resources. Customers maintain full control over their data access. Services which provide virtualized operational environments to customers, ensure that customers are segregated and prevent cross-tenant privilege escalation and information disclosure via hypervisors and instance isolation.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
Prolinx comply with the guidelines within the EU Code of Conduct for Energy Efficient Data Centres. The Datacentre utilised by Prolinx uses electrical and cooling systems that are certified by their M&E Design & Construction contractor to exceed the UTI Tier III uptime percentage.
They offer the highest levels of sustainability across their data centres without compromising security and availability. In accordance with EU guidelines, the Datacentre has implemented and exceeded the requirements of the HMG Greening Strategy, designed to ensure the lowest possible environmental impact. The direct air-cooled data centre is considered best-in-class, requiring no mechanical cooling >99% of the year.
Because the Datacentres are factory-built offsite, the embedded carbon footprint and construction waste are greatly reduced – and have BREEAM accreditation indicating we recycle over 90% of this waste. We responsibly source power through competitive tendering that favours renewable energy. The data centre building has photo voltaic cell installations on the roof to capture solar energy. We have also introduced rainwater harvesting at the site to offset water consumption. Our own Datacentre benefits from cold isles which supply cooling only to the area that requires it. DCs have a PUE of 1.2
Pricing
- Price
- £0.10 a virtual machine an hour
- Discount for educational organisations
- Yes
- Free trial available
- No