The OFFICIAL-SENSITIVE Enterprise Apps Store utilises a web-based Virtual Desktop Infrastructure (VDI) to enable Government and industry partners to securely collaborate. Hosted on the RLI/ALI, the service provides a central repository for numerous COTS and bespoke Project, Programme and Engineering applications and avoids desktop interoperability issues.
- Allows Enterprise teams to collaborate and share applications effectively.
- Deployed for access from the Restricted LAN interconnect (RLI/ALI).
- Capable of managing information assest up to OFFICIAL-SENSITIVE
- UK Hosted
- Enables joint team alliancing, overcomes any local interoperability issues.
- Allows access to multiple applications for Enterprise Project Collaboration
- Allows teams to work collaboratively and securely, from remote locations.
- Enables information sharing across RLI boundaries with approved industry partners.
- Allows the management and storage data up to OFFICIAL-SENSITIVE classification.
- Reduces licencing and support costs.
- Enables the segregation of Assets Subject to Special Conditions (ASSC)
£9525 per instance
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
- Modern Slavery statement
DEVONPORT ROYAL DOCKYARD LIMITED
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
Service accessed from RLI/ALI end points including SMI2.
Routine maintenance planned and scheduled in advance, with steps taken to reduce impact to service.
Compatible VDI component available on Client UAD.
|Email or online ticketing support||Email or online ticketing|
|Support response times||Standard 4 Hour response to Priority 1 incidents but ability to tailor to customer requirement.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Standard Infrastructure and application availability - 04:00 – 23:59 (Monday to Friday)* - 95% SLA (Outside Scheduled Downtime).
* Infrastructure and Applications may be available at times outside of the target availability hours stated above. Notwithstanding any such additional availability will be excluded from any Service Availability KPI calculation.
SLA's above and beyond the standard offering are priced on request.
|Support available to third parties||No|
Onboarding and offboarding
The setting up of a new Enterprise Apps Store is tailored to the user requirement. This can include:
- COTS customisation
- data migration/import
- SME consultancy/training
- production of appropriate documentation sets
- guidance and assistance for the Information Asset Owner and the accreditation process
These can be priced separately as required.
|Other documentation formats||Microsoft Office Applications|
|End-of-contract data extraction||Should you require your data to be extracted at point of exit a fee will be applied this is subject to the amount of data and security level for data held on the system. Data will be held on backup tapes for up to a year after cessation of the contract, after such time we cannot guarantee that data can be retrieved.|
|End-of-contract process||Formal notice is given for the termination of the service 90 days prior to contract end. Access to the customer workspace is removed. Any data can be extracted, but will be subject to a fee depending upon Security level and volume of data.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||Windows|
|Designed for use on mobile devices||No|
|Description of customisation||The Enterprise Apps Store can be tailored according to the customer requirements. This includes look and feel, features and capability using COTS software, security and access and branding to suit corporate or project identity.|
|Independence of resources||Close monitoring of demand and consumption via appropriate performance monitoring toolsets in parallel with appropriate scaling of infrastructure resources to meet demand.|
|Service usage metrics||Yes|
Other metrics available on request
|Reporting types||Reports on request|
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||COTS products as required by Customer.|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||Less than once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Data exports are dependent upon COTS products chosen to be deployed within the Enterprise Apps Store.|
|Data export formats||
|Other data export formats||Dependant upon chosen COTS products|
|Data import formats||
|Other data import formats||Dependent upon chosen COTS product|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||Standard Infrastructure and application availability - 04:00 – 23:59 (Monday to Friday)* - 95% SLA (Outside Scheduled Downtime). * Infrastructure and Applications may be available at times outside of the target availability hours stated above. Notwithstanding any such additional availability will be excluded from any Service Availability KPI calculation. SLA's above and beyond the standard offering are priced on request.|
|Approach to resilience||Available on request|
|Outage reporting||Email alerts/phone calls|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
Access is managed through Access Control Lists (ACL's) defined by the Customer through approved workflows. Access to information is managed on a need-to-know basis, this includes restricting Admin access to the data and auditability records against information.
Audits of unused accounts and privilege escalation are undertaken to maintain appropriate access.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||Between 6 months and 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 6 months and 12 months|
|How long system logs are stored for||Between 6 months and 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||DAIS accreditation|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||DAIS accredited|
|Information security policies and processes||Babcock's service conforms to the Security Policy Framework, JSP 440 and JSP 604. We undertake Security Working Groups with our DAIS case officer and NTA. Each new service undertaken follows the outlined accreditation on-boarding process and requires Customer Information Asset Owner approval for on-boarding.|
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||Change management is undertaken subject to ISO20000 controls and processes, the scope of which includes other relevant service management elements.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Available on request due to sensitivity.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
Available on request due to sensitivity.
Complies to Authority defined standards.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||Incident management is undertaken subject to ISO20000 controls and processes, the scope of which includes other relevant service management elements.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||Yes|
|Other public sector networks||RLI / ALI|
|Price||£9525 per instance|
|Discount for educational organisations||No|
|Free trial available||No|