FCO Services

Hybrid Cloud Hosting

FCO Services provides private, community or multi-tenanted Tier 1 (OFFICIAL) environments consisting of two or more distinct sets of infrastructure. Our datacentre-hosted systems and public cloud vendor environments are securely linked allowing data and application scalability and portability.
For Government. By Government.


  • Dedicated on premise with offsite public cloud
  • Private cloud - dedicated, secure datacentre on UK Crown Property
  • Service Management 24x7x365


  • In government partner
  • 100% UK Security Cleared Staff
  • Hosted on secure UK Crown Property
  • Security compliant service delivery (ISO 27001)
  • Managed service assurance (ISO 9001, ISO 20000, ISO 22301)


£440 per person per day

Service documents


G-Cloud 11

Service ID

3 0 6 3 0 9 3 7 6 3 2 7 8 4 0


FCO Services

Elizabeth Arneill

01908 515789


Service scope

Service constraints
Unknown - dependent on vendor purchase
System requirements
Unknown - dependent on vendor purchase

User support

Email or online ticketing support
Email or online ticketing
Support response times
Based on the priority of the ticket, FCO Services can respond within 30 minutes on a 24x7/365 basis.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
The FCO Services Global Support Centre (GSC) acts as the single point of contact for the receipt of all interactions, incidents and service requests from the Customer’s nominated representative (s) with the service capable of delivering operational support and management on a 24x7x365 basis.
Standard GSC Operational hours: 0900-1700 Mon-Fri excl. UK public holidays
Accepted methods of contact include customer contact via telephone and email which may result in the subsequent creation of an incident or service request.
The GSC can be contacted for support by customers in either one of two ways
1. By telephone
2. Via email with the customer utilising an FCO Services defined template for email communications
Support available to third parties

Onboarding and offboarding

Getting started
FCO Services can provide tailored training and user documentation dependent on customer requirements.
FCO Services will provide DNS name to connect to portal;
Low level designs can be provided
Service documentation
Documentation formats
End-of-contract data extraction
FCO Services can provide support and professional services to facilitate the customer's requirements
End-of-contract process
At the end of the contract, the customer's environment/solution will be deleted.

Using the service

Web browser interface
Using the web interface
FCO Services can provide an interface to (VMWare's) V-Centre for customers with dedicated environments to administer their VMs.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
VMware is dedicated to support customers to make VMware products and technologies accessible to people with disabilities. The available VPATs contain the accessibility features in VMware products to address the regulations of Section 508 standards.
Web interface accessibility testing
None carried out
Command line interface


Scaling available
Independence of resources
Each customer is provisioned with its own environment isolated from other customers with its own resources and capacity. Shared infrastructure is systematically capacity managed to understand and resolve any potential demand issues.
Usage notifications
Usage reporting
  • Email
  • Other


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • Memory
  • Number of active instances
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft; Amazon

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Backup and recovery

Backup and recovery
What’s backed up
  • VM
  • Files
Backup controls
FCO services manage all back-ups
Datacentre setup
Multiple datacentres
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The standard Government Secure Applications Environment (GSAE) platform service offering is made with a target availability of 99.5% that factors in platform level resilience for customer tenancies - reducing the risk of service disruption in the event of hardware/software failures of platform level components.
Service availability of the platform is supported by FCO Services using an integrated approach consisting of event, incident, problem and change management.

Note: Availability calculations are based on the agreed hours of support and operation with regular maintenance windows (e.g. security patching) pre-defined and utilised for operational management activities. Planned outages, because of change events and activity, are excluded from availability calculations.
Approach to resilience
FCO Services ‘secure hosting’ platform has been designed and built with resilience in mind to remove single points of failure - from customer accessibility using secure networks through to high availability of physical infrastructure components that are located in two physical locations.
Outage reporting
FCO Services takes a customer centric, integrated, approach for event, incident, problem and change management activities where any outages, planned or unplanned, involve prompt and efficient customer notification through the appropriate channels of communication.
For major outages, e.g. P1 and P2s, SMS and email alerts sent to named customers

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Username or password
  • Other
Other user authentication
FCO Services' standard authentication is username and password for non administrative accounts, with Bitlocker used to secure device access; further authentication can be applied in accordance with customer requirements.
Access restrictions in management interfaces and support channels
Management interfaces are restricted to key support personnel, audited and monitored, accessed through dedicated hardware device and dedicated Bastion infrastructure.
Secure devices follow National Cyber Security Centre (NCSC) guidance; Bastion infrastructure requires 2 factor authentication to access management interfaces.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Less than 1 month
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
This is in scope:
FCO Services Global Digital Technology including infrastructure, development, operations and support for Secure Managed and hosted IT Services holding information up to "OFFICIAL" tier of the UK Government's classification scheme in accordance with statement of Applicability dated 27 July 2018.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
  • Cyber Essentials Plus
  • ISO 20000
  • ISO 9001
  • ISO 22301

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
The applications will process and store data classified as OFFICIAL in the Government Security Classification scheme.
FCO Services adheres to the following ISO standards:
* 27001 (Information Security Management)
* 20000 (Service Management System)
* 9001 (Quality Management)
* 22301 (Business Continuity Management)
* Cyber Essentials Plus.

As well as aligning to the ITIL framework for managing and delivering FCO Services products and services.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The FCO Services Configuration Management System is used to manage and maintain Products, Services and Components as well as associated customer assets and services.
A standardised data model of technical and non-technical components ensures Configuration Items are managed in a consistent controlled manner aiding the evaluation of impacts and risks during the Change Management process.
Our Change Management capability is used for service introduction, retirement, patching and additional enhancements/changes. By utilising a consistent, structured approach, we're able to mitigate the risks associated with change whilst ensuring timely and appropriate communications with customers in relation to potentially service impacting change events.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
FCO Services vulnerability management approach is aligned to meet the Information Assurance requirements expected by all HMG organisations as well as international standards for information Security management (e.g. Cabinet Office Security Policy Framework, ISO/IEC 27001:203).
This ensures that both internal and client systems managed by FCO Services are subject to standard procedures for the identification of vulnerabilities as well as the safe and timely installation of patches with maximum permitted timescales. Patches are prioritised dependent upon categorisation of systems under FCO Services management responsibility with vulnerabilities systematically assessed and remediated on timescales ranging from immediate to 4 weeks.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
FCO Services availability management is delivered on a specific product basis with each specific product having its own availability target. Service availability targets and performance reporting are supported using an integrated approach consisting of event, incident, problem and change management.
Availability targets are monitored and reported with any outages impacting the availability targets logged and tracked in a standardised, consistent manner.
Incident management type
Supplier-defined controls
Incident management approach
FCO Services’ Global Support Centre acts as the single point of contact for all interactions, incidents and service requests from the customer, with the service capable of delivering operational support and management on a 24x7x365 basis.
The primary objective for incident management is the use of structured incident management activities to identify and resolve service quality issues within service level targets agreed during initial customer engagement.
The GSC can support multiple contact methods which include direct interaction with the customer end-user or desk-desk interaction which triages calls before allocation to FCO Services.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
How shared infrastructure is kept separate
Each customer is provisioned with its own environment isolated from other customers with its own resources and capacity.

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
Recognised for reducing its environmental footprint, FCO Services’ efficient data centre has won the prestigious European Code of Conduct Awards for Energy Efficiency in Data Centres from the European Commission’s Joint Research Centre.
From using rainwater recycling systems for hybrid cooling towers to implementing cold aisle containment and designing the underground structure of the data centre as a natural heat drain – FCO Services have adopted recognised energy efficient best practice to reduce the impact of related environmental, economic and energy demands.
FCO Services currently operate at a world class efficiency power usage effectiveness of 1.1, well below the average value of 2.0 seen in most data centres.


£440 per person per day
Discount for educational organisations
Free trial available

Service documents

Return to top ↑