The Advanced Secure Gateway is the “Swiss Army Knife” of gateways. This service provides secure access and transport of data hosted in the cloud with different types of internet hosted users and services, allowing the secure upload and secure download of information and reports, and consolidation of data sets.
- Secure exchange of data between specific users and data repositories
- On the Internet and in Cloud Data Centre facilities
- Integrates with Thales Secure Cloud Gateway and Remote Access infrastructure
- Provides mutually authenticated connections and TLS/SSL/SSH protocol breaks
- Two Factor authentication, supports single sign-on authentication including SAML
- Traffic through the gateway is scanned by the anti-virus engine
- Configurable malware remediation
- Flexibility to provide bespoke services to meet customer requirements
- ISO27001 ISO20000 Certified
- SC, NPPV3 cleared staff
- Advanced Secure Gateway can use customer provided or commercial certificates
- “cloudready” approach, supporting multiple cloud providers
- Varied deployments; cloud, hybrid or on premise networks
- Access to PSNP-P from Cloud providers
- Access to PSNP-P and PSNP-S from non-PSN connected devices
- NOC and SOC Monitoring accredited by PSNA
- Designed around customer availability targets and SLAs
- Takes advantage of current network topology to maximise cost savings
- Assistance with implementation and transition to Thales Gateway Services
- Highest levels of security and regulatory compliance for CNI
£908 per person per day
Thales UK Ltd
|Service constraints||Customers will be required to comply with security policies when consuming services at PSN PROTECTED (IL3/OFFICIAL) level. Thales offer consultancy for customers to the current status against the compliance required and detail approaches to mitigation against any shortfalls in that compliance.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Response is based on SLAs and service requirements agreed with the client.|
|User can manage status and priority of support tickets||No|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Support is provided in line with customer specific SLAs
Service Delivery Managers are assigned to each client.
|Support available to third parties||Yes|
Onboarding and offboarding
Thales can provide assistance to customers for the design of their Secure Gateway solution, which provides an assured / accredited and secure way of accessing information over different classifications of networks, and bearers of opportunity.
Thales offers assistance with implementation and transition to new Gateway services. This can be provided for green field sites where no previous solution is in place. Thales can:
• Carry out Site Surveys.
• Develop Transition Plans / Strategies.
• Develop Implementation Plans against previously developed designs.
|End-of-contract data extraction||We will provide an extract of the data held by Thales to the customer in an agreed format.|
At the end of the contract the data is provided to the customer in an agreed format (CSV or xml) and then deleted from Thales systems.
For an additional fee, Thales can return the data in alternative formats or retain the data for an extended period if required.
Using the service
|Web browser interface||No|
|Command line interface||No|
|Independence of resources||Infrastructure is monitored 24x7 for availability and capacity, in line with ISO27001 and ISO20000.|
|Infrastructure or application metrics||Yes|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Backup and recovery
|Backup and recovery||No|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||The Advanced Secure Gateway is delivered as a geo-graphically diverse high availability service designed to exceed 99.95% availability.|
|Approach to resilience||Available on request|
|Outage reporting||In the event of an outage, a Service Delivery Manager will inform customers, and a Major Incident Manager will be appointed. Outages will also be reported in the Service Delivery Management report.|
Identity and authentication
|Access restrictions in management interfaces and support channels||
Access to management interfaces is restricted to appropriately security cleared and authorised Thales staff members. Network segmentation is in place to secure management interfaces, located within secure processing facilities. These configurations are subject to CHECK ITHC. Management interfaces are not exposed to the internet. All event logs are sent to the Thales CSOC for protective monitoring and retained for 12 months. Thales systems are also subject to internal and external audit.
Support – No 3rd parties are provided with remote access to the Thales CSOC network. Only trusted suppliers are used, with contractual and NDA clauses used to protect information.
|Access restriction testing frequency||At least once a year|
|Management access authentication||
|Devices users manage the service through||Dedicated device on a segregated network (providers own provision)|
Audit information for users
|Access to user activity audit information||Users receive audit information on a regular basis|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users receive audit information on a regular basis|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||KPMG|
|ISO/IEC 27001 accreditation date||25/4/18|
|What the ISO/IEC 27001 doesn’t cover||The Thales UK Information Security Management System (ISMS) incorporates the people, processes and technologies supporting the portfolio of network services.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||
|Other security governance standards||
PSN services at OFFICIAL,
CAS(T) – CESG Assured Services (Telecoms),
Police Enhanced Regime,
Cyber Essentials Plus,
NCSC CCSC (Certified Cyber Security Consultancy),
NCSC CCP (Certified Cyber Professional),
Sector specific accreditation
|Information security policies and processes||
The Thales Gateway service is certified to a number of different standards, including ISO 27001:2013. This is based on an ISMS (Information Security Management System) which consists of Thales UK policy, process and procedures in addition to ISO 27001 clauses. The ISMS is audited by independent 3rd parties annually.
An annual IA (Information Assurance) schedule ensures that policies are implemented, assessed and effective. This includes internal audits, external audits, Security Working Groups, Security Awareness campaigns.
The reporting structure is defined in the Thales IA Management Plan, along with incident management processes and RACI matrix.
The Thales Gateway service assurance is also achieved through additional certifications and accreditations, which include audit reports being submitted to the Cabinet Office, NCSC and the National Police Information Risk Management Team (NPIRMT).
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||All Requests for Change (RFC)’s are presented to a Thales’ Change Board (CAB). The CAB is attended by Business, Technical, Service Delivery and Information Assurance stakeholders along with the owner of the RFC’s. On receipt of a request to make changes to the service; an RFC will be generated and submitted to CAB prior to delivery. Changes will be notified to customer CABs where there is a change to the device(s) which may impact service.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
As part of the Thales compliance requirements, Thales has a requirement to be able to adequately respond to Low to Critical level patches and vulnerabilities.
The Thales CSOC utilise an IBM vulnerability management module to prioritise vulnerabilities. The CSOC also utilise various threat intelligence and vulnerability feeds to stay informed of the latest vulnerabilities. The CSOC then advise on recommended activity and mitigations.
Thales Change Management is then used to apply patches in a managed and timely manner – to prevent disruption to customer services.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
The Thales CSOC provides protective monitoring and threat intelligence to identify potential compromises, cyber attacks and non compliance.
The CSOC follow processes and escalation paths in response to potential compromises and security incidents. A severity matrix is used to assign a priority to each incident. The priority determines the response for the incident. Agreed stakeholders and contacts are contacted depending on the severity.
Incidents are responded to within SLA – in accordance with the assigned priority.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
Thales operates a 24 hours a day 365 days a year UK Network Operations Centre which utilises a monitoring platform, and trouble ticketing platform for Incident and Problem Management. The Service desk is accredited to ISO 20000, ISO27001 and all processes are aligned to ITIL.
Thales adopts a tiered approach to incident management. Tier 1 has the technical knowledge to triage all incidents, and will categorise and prioritise in line with agreed Customer priorities. The team is skilled to offer technical and product knowledge to resolve incidents, respond and deploy remote teams or involve third parties if required.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Separation between users
|Virtualisation technology used to keep applications and users sharing the same infrastructure apart||Yes|
|Who implements virtualisation||Supplier|
|Virtualisation technologies used||VMware|
|How shared infrastructure is kept separate||The environment has been built in line with CESG security procedures and managed through appropriate policies. It is also subject to annual ITHC in line with maintaining GDS-A accreditation for operation.|
|Price||£908 per person per day|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|