DEVONPORT ROYAL DOCKYARD LIMITED

Enterprise Apps Store - OFFICIAL SENSITIVE

The OFFICIAL-SENSITIVE Enterprise Apps Store utilises a web-based Virtual Desktop Infrastructure (VDI) to enable Government and industry partners to securely collaborate. Hosted on the RLI/ALI, the service provides a central repository for numerous COTS and bespoke Project, Programme and Engineering applications and avoids desktop interoperability issues.

Features

  • Allows Enterprise teams to collaborate and share applications effectively.
  • Deployed for access from the Restricted LAN interconnect (RLI/ALI).
  • Capable of managing information assest up to OFFICIAL-SENSITIVE
  • UK Hosted

Benefits

  • Enables joint team alliancing, overcomes any local interoperability issues.
  • Allows access to multiple applications for Enterprise Project Collaboration
  • Allows teams to work collaboratively and securely, from remote locations.
  • Enables information sharing across RLI boundaries with approved industry partners.
  • Allows the management and storage data up to OFFICIAL-SENSITIVE classification.
  • Reduces licencing and support costs.
  • Enables the segregation of Assets Subject to Special Conditions (ASSC)

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Service accessed from RLI/ALI end points including SMI2.
Routine maintenance planned and scheduled in advance, with steps taken to reduce impact to service.
Compatible VDI component available on Client UAD.
System requirements
  • Access to a suitable network connection
  • A compatible web browser
  • Compatible VDI Component on UAD

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Standard 4 Hour response to Priority 1 incidents but ability to tailor to customer requirement.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Standard Infrastructure and application availability - 04:00 – 23:59 (Monday to Friday)* - 95% SLA (Outside Scheduled Downtime).

* Infrastructure and Applications may be available at times outside of the target availability hours stated above. Notwithstanding any such additional availability will be excluded from any Service Availability KPI calculation.

SLA's above and beyond the standard offering are priced on request.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started The setting up of a new Enterprise Apps Store is tailored to the user requirement. This can include:
- COTS customisation
- data migration/import
- SME consultancy/training
- production of appropriate documentation sets
- guidance and assistance for the Information Asset Owner and the accreditation process
These can be priced separately as required.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats Microsoft Office Applications
End-of-contract data extraction Should you require your data to be extracted at point of exit a fee will be applied this is subject to the amount of data and security level for data held on the system. Data will be held on backup tapes for up to a year after cessation of the contract, after such time we cannot guarantee that data can be retrieved.
End-of-contract process Formal notice is given for the termination of the service 90 days prior to contract end. Access to the customer workspace is removed. Any data can be extracted, but will be subject to a fee depending upon Security level and volume of data.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 10
  • Internet Explorer 11
  • Chrome
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices No
API No
Customisation available Yes
Description of customisation The Enterprise Apps Store can be tailored according to the customer requirements. This includes look and feel, features and capability using COTS software, security and access and branding to suit corporate or project identity.

Scaling

Scaling
Independence of resources Close monitoring of demand and consumption via appropriate performance monitoring toolsets in parallel with appropriate scaling of infrastructure resources to meet demand.

Analytics

Analytics
Service usage metrics Yes
Metrics types System Availability
User Consumption
Other metrics available on request
Reporting types Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold COTS products as required by Customer.

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Less than once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Data exports are dependent upon COTS products chosen to be deployed within the Enterprise Apps Store.
Data export formats
  • CSV
  • Other
Other data export formats Dependant upon chosen COTS products
Data import formats
  • CSV
  • Other
Other data import formats Dependent upon chosen COTS product

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Standard Infrastructure and application availability - 04:00 – 23:59 (Monday to Friday)* - 95% SLA (Outside Scheduled Downtime). * Infrastructure and Applications may be available at times outside of the target availability hours stated above. Notwithstanding any such additional availability will be excluded from any Service Availability KPI calculation. SLA's above and beyond the standard offering are priced on request.
Approach to resilience Available on request
Outage reporting Email alerts/phone calls

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Limited access network (for example PSN)
  • Username or password
Access restrictions in management interfaces and support channels Access is managed through Access Control Lists (ACL's) defined by the Customer through approved workflows. Access to information is managed on a need-to-know basis, this includes restricting Admin access to the data and auditability records against information.

Audits of unused accounts and privilege escalation are undertaken to maintain appropriate access.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Limited access network (for example PSN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications DAIS accreditation

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards DAIS accredited
Information security policies and processes Babcock's service conforms to the Security Policy Framework, JSP 440 and JSP 604. We undertake Security Working Groups with our DAIS case officer and NTA. Each new service undertaken follows the outlined accreditation on-boarding process and requires Customer Information Asset Owner approval for on-boarding.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Change management is undertaken subject to ISO20000 controls and processes, the scope of which includes other relevant service management elements.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Available on request due to sensitivity.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Available on request due to sensitivity.

Complies to Authority defined standards.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Incident management is undertaken subject to ISO20000 controls and processes, the scope of which includes other relevant service management elements.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks Other
Other public sector networks RLI / ALI

Pricing

Pricing
Price £9525 per instance
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑