Sitekit Digital Health

LHCR 'Region in a Box'

Consultancy and development services to configure and deploy the target architecture for LHCR regions to establish an information sharing environment that helps health and care services continually improve treatment, tailors care to the needs of individuals, empowers people to look after themselves better and make informed health and care decisions.


  • Core interoperability (e.g. Open-APIs, Record-Location, Event-Management, Longitudinal Record, PHR)
  • Reference Services (e.g. Metadata-Management, Directory of Services, Master Patient-Index)
  • Data Services (e.g. De-ID/Re-ID, Data Integration, Data Processing)
  • Information Governance & Security (e.g. Patient Choices, Authentication, IG Impementation)
  • Modern cloud-based architecture
  • Scalable
  • Based on open standards


  • Improved citizen engagement
  • On-demand access to records
  • Support for Integrated Care
  • Improved care coordination for LTCs/complex conditions
  • Removal of paper-based overheads.
  • Improved quantity and quality of information available to citizens
  • Right information provided to health professionals at the right time
  • Real-time access to data to support resource management
  • Enable the delivery of personalised services
  • Overcome interoperability challenges


£5000 to £7500000 per instance

Service documents


G-Cloud 11

Service ID

3 0 5 6 6 8 8 1 9 9 0 2 3 3 5


Sitekit Digital Health

Michael Catania

0845 299 0900

Service scope

Service constraints
There are no specific service constraints buyers are required to know about. Sitekit's solutions are underpinned by Microsoft's Azure Cloud platform, an open, flexible, scalable platform that address specific business and technical requirements for security, performance and operational processes. It allows custom implementations to focus on building out scenarios and applications. Azure provides a rapid, low-cost, low-risk and fail-fast platform for organisations and is backed by a cloud platform with the largest compliance portfolio in the industry.
System requirements
Internet connectivity from the commissioning region's networks

User support

Email or online ticketing support
Email or online ticketing
Support response times
The support provided via the Sitekit Service Desk is via both email and phone, Monday to Friday 9am to 5pm excluding UK bank holidays. Out of hours emergencies are ticketed via our emergency email address, which goes directly to our out of hours support.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
The following provided as standard: 1)Very High: A security breach whereby a third party gains access to personal data or an individual’s account may be compromised. A security alert that is categorised as being critical to data security. In the event of a security breach, the technician will take immediate action to limit further unauthorised access to the Infrastructure Applications. Investigative work to provide a resolution will then commence during Service Hours • Response: 30 minutes • Resolution: 8 service hours 2)High - An error that renders the software inoperative or causes the software to fail catastrophically. • Response: 1 service hour • Resolution: 16 service hours 3)Normal - An error that affects performance of the software and significantly degrades the use of the software. A security alert that is categorised as being medium severity. • Response: 1 service hour • Resolution: Best efforts to obtain resolution in 40 service hours 4)Low - An error that affects performance of the Infrastructure Applications but does not significantly degrade the use of the service. A security alert that is categorised as being low severity. • Response: 1 service hour • Resolution: Best efforts to put resolution in the next software release
Support available to third parties

Onboarding and offboarding

Getting started
Requirements workshop + high-level architecture and envisioning
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
No persistant data is stored by LHCR Region in a Box components. Health and care data stored by health and care agencies remain the responsibility of those agencies. Personal health and care data stored in a citizen's Personal Health Record (PHR) remains the responsibility of the citizen.
End-of-contract process
Off-boarding the service does not require any data extraction or removal processes. If an agency terminates the LHCR region in a box, all server instances and databases will be stopped; an audit log will be provided to the agency.

Using the service

Web browser interface
Using the web interface
Services are managed via Microsoft's Azure Portal ( This portal gives sufficiently skilled and appropriately authorised users complete control over all aspects of platform set-up and management.
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
None, not applicable - check MS azure portal accessibility
What users can and can't do using the API
Core interoperability services contain a number of APIs which provide standardised access to reference data and IG / security services
API automation tools
Other API automation tools
  • Automated deployment
  • Automated real-time monitoring
  • Automated testing (e.g. Sprinkler for FHIR testing)
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
Command line interface


Scaling available
Scaling type
Independence of resources
LHCR region in a box is built on Microsoft's Azure - platform services designed to serve business-critical applications for many millions of users. Uptime is guaranteed by Microsoft SLAs.
Usage notifications
Usage reporting


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
Regular reports


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft Azure Cloud Services

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup controls
According to Microsoft Azure Cloud Backup functionality:
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9% Service credits if Sitekit does not meet this level. Azure services according to Microsoft Azure SLAs:
Approach to resilience
Available on request
Outage reporting
Via Microsoft Azure status portal: Or additional tooling (e.g., Application Insights: An agency may commission Sitekit to monitor and report outages on its behalf.

Identity and authentication

User authentication
Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces and support channels is restricted via username and password.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Centre for Assessment Ltd
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Our statement of applicability covers all the controls defined by ISO27001 with the exception of 14.2.7 Outsourced development and 11.1.6 Delivery and Loading Areas because they do not apply to us.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Sitekit implements an ISO27001 compliant ISMS (Information Security Management System).

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Sitekit maintains an ISO27001 certified configuration and change management process, available on request. As part of Sitekit's SDL (Secure Development Lifecycle) software components / tooling are assessed for suitability - this is recorded in Sitekit's Application Lifecyle Tool Records Report.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Sitekit maintains an ISO27001 certified vulnerability management process, available on request. Sitekit carries out threat-modelling as part of software design under the company's SDL (Secure Development Lifecycle); mitigation actions are then put in place. Sitekit will deploy patches either as part of scheduled software maintenance or immediately when Sitekit becomes aware of a Critical vulnerability. Sitekit runs frequent training sessions on emerging internet security threats.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Sitekit maintains an ISO27001 certified protective monitoring process, available on request. Potential compromises are assigned the highest priority under Sitekit's SLA (Critical) and immediately investigated.
Incident management type
Supplier-defined controls
Incident management approach
Sitekit maintains an ISO27001 certified incident management process, available on request. Users would raise a support request with Sitekit's support desk; Sitekit will investigate the support requests and categorise as an incident if appropriate to do so. Sitekit maintains an ISO27001 compliant incident report template, available on request.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Third-party virtualisation provider
Microsoft Azure
How shared infrastructure is kept separate
Each organisation organisation occupies its own 'tenant' on the Azure platform

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres


£5000 to £7500000 per instance
Discount for educational organisations
Free trial available

Service documents

Return to top ↑