Cadcorp Spatial Database Service

The Cadcorp Spatial Database Service provides a hosted PostgreSQL database with the PostGIS extension for use within GIS and web mapping software.


  • Hosted PostgreSQL database with the PostGIS extension
  • Security model to support different levels of user
  • Database Management System


  • Spatial database for use within GIS and web mapping
  • Security model
  • Customer data management
  • Guaranteed level of service


£550 per instance per month

  • Free trial available

Service documents


G-Cloud 11

Service ID

2 4 9 8 0 8 6 5 7 4 7 6 3 8 0



Gary Randle

01438 747996

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Private cloud
  • Hybrid cloud
Service constraints The service requires a PostgreSQL/PostGIS compatible client to read and write the data.
System requirements
  • PostgreSQL/PostGIS compatible client to read and write data
  • Customer data to populate Spatial Database Service

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Email support is available between 9:00 and 17:30, Monday to Friday, excluding public holidays. Cadcorp will use its reasonable endeavors to respond within 8 Working Hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Cadcorp provide a single tier support service that includes telephone support, email support and access to an interactive customer portal. All support costs are included within the service subscription fee. Customers are allocated a Cadcorp Account Manager.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Cadcorp supplies the customer with documentation and advice on how to access the service.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction The customer is responsible for extracting all data prior to the contract end.
End-of-contract process At the end of the contract the customer access to the service is revoked. The customer is responsible for extracting all data prior to the contract end.

Using the service

Using the service
Web browser interface No
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Data from this service can be used on both mobile and desktop.
Service interface No
Customisation available Yes
Description of customisation Service administrators can load and manage data, add new database users, create new databases and a range of other database management tasks.


Independence of resources Cadcorp actively monitors server resources and adjusts when required. The service users server instances that can be easily upgraded based on increased service demand.


Service usage metrics Yes
Metrics types On request Cadcorp will provide the customer with service metrics
Reporting types Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Amazon Web Services (AWS)

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users can export their data into and out of the Cadcorp Spatial Data Service using their PostGIS compatible GIS client.
Data export formats
  • CSV
  • Other
Other data export formats
  • Shp
  • Tab
  • Mif
  • GML
  • GeoPackage
Data import formats
  • CSV
  • Other
Other data import formats
  • Shp
  • Tab
  • Mif
  • GML
  • GeoPackage

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability AWS will use commercially reasonable efforts to make Multi-AZ instances available with a Monthly Uptime Percentage of at least 99.95% during any monthly billing cycle.
Approach to resilience Two important aspects of resiliency are high availability and disaster recovery.

High availability is underpinned by the Amazon SLA.

Disaster recovery is the ability to recover from rare but major incidents. This service provides additional options for Multi-AZ deployment, which provides a synchronous standby replica in a different Availability Zone than the DB instance. This provides an immediate failover solution if an unplanned outage occurs on the primary database instance.
Outage reporting AWS provides a public notice page and email alerts can be set up to notify the application administrator of service outage.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Database security is required for all admin tasks. Additional security is required for access through the AWS console.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Less than 1 month
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Less than 1 month
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Lloyd's Register Quality Assurance Ltd
ISO/IEC 27001 accreditation date 22/03/2019
What the ISO/IEC 27001 doesn’t cover The scope of the approval is design, development, installation and distribution of software for Geographic Information Systems. Associated
project management, application development, customer training and consultancy services. Management of information security in relation to IT infrastructure and data in support of all company activities.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Cadcorp information security policies and processes have achieved certification to ISO 27001. It is the Policy of the company to ensure that:

Information will be protected against unauthorised access.

Confidentiality of information will be assured and valuable or sensitive information protected from unauthorised disclosure or intelligible interruption.

Integrity of information will be maintained to safeguard the accuracy and completeness of information by protecting against unauthorised modification.

Regulatory and legislative requirements will be met.

Business Continuity plans will be produced, maintained and tested, this will ensure that information and vital services are available to users when they need them.

Information security training will be available to all staff.

All breaches of information security, actual or suspected, will be reported to, and investigated by the Information Security Manager.

The Information Security Manager has direct responsibility for maintaining the Policy and providing advice and guidance on its implementation.

All managers are directly responsible for implementing the Policy within their business areas, and for adherence by their staff.

It is the responsibility of each employee to adhere to the Policy.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach The Cadcorp Quality Management System in compliance with ISO 9001 fully describes the Cadcorp configuration and change management processes.

All components of the service are tracked through their lifetime. Changes and configurations to a service implementation are tracked within the Cadcorp customer support database using a unique reference ID.

Changes are assessed for potential security impacts inline with Cadcorp ISO 27001 Security Manual and security forms part of the Cadcorp software quality assurance testing.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach The Cadcorp vulnerability management process requires a defined list of IP addresses for access to the database.

Cadcorp closely monitors information on potential threats and reviews online resources for all third party components including Cadcorp software, AWS and databases.

Patches/minor version upgrades to the database are applied are applied to the database shortly after being made available.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach AWS databases are set up with alarms and logging on key database metrics to alert Cadcorp of any resource issues.

When a potential compromise is identified it will be classified in line with the Cadcorp SLA response categories.

Depending on the category Cadcorp will use our reasonable endeavours to respond within 4 to 8 working hours.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach All incidents should be reported to the Cadcorp support desk. The customer will receive a report ID number to use for subsequent enquires. If the incident is related to a common event the support desk will invoke a pre-defined process. Incident reports can be provided on request.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks Public Services Network (PSN)


Price £550 per instance per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Cadcorp can provide access to the Cadcorp Spatial Database Service for a 30 day trial period. Trials are subject to usage and instance restrictions.

Service documents

Return to top ↑