Lifebit Biotech Limited

Lifebit CloudOS: Cloud-Based Unified Research Environment

The Lifebit CloudOS Unified Research Environment allows individuals, teams and large organisations to manage, run, scale, and automate big data analysis to reach maximum efficiency over cloud environments or hybrid infrastructures (HPC-Cloud).


  • Federated Unified Research Environment
  • Intuitive cohort building & cohort definition sharing for data discovery
  • Out-of-the-box scaling, automation & parallelisation
  • Programmatic access to Lifebit CloudOS via API
  • Seamless import from DockerHub, Github & Bitbucket repositories
  • State-of-the-art standardised & reproducible pipelines curated by Lifebit
  • Interactive tools including JupyterLab, Integrative Genomics Viewer (IGV), among others
  • Team accounts for streamlined collaboration & management
  • Seamlessly share analysis results & parameters with team members
  • Monitoring analysis progress & costs


  • Automation of big data analysis
  • Run federated analysis across distributed private & public datasets
  • Efficient cohort building and cohort visualisation
  • Scalable Performance with CPUs & GPUs
  • Productivity increase & reduce time-to-publication
  • Cost savings & spending limits
  • Facilitated real-time collaboration
  • Easy sharing of data analysis results & parameters
  • Reproducibility of analyses through cloning runs & FAIR standards
  • Defining data, analysis and project-access permissions within teams


£4,990 to £7,450 a person a year

Service documents


G-Cloud 12

Service ID

5 1 5 2 2 5 0 5 4 8 7 5 9 2 8


Lifebit Biotech Limited Dr. Maria Chatzou
Telephone: 07378294639

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
System requirements
  • Set up cloud account (AWS, Azure, Google Cloud, or Alibaba)
  • Provide Identity and Access Management (IAM) credentials

User support

Email or online ticketing support
Email or online ticketing
Support response times
Buyer must initially contact Supplier through the online Support channels and will receive an initial email response within 24 hours.

Support channels include:
-Through Intercom Messenger on
-Via email to
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Lifebit uses Intercom Messenger, a customer messaging platform, which is compliant with the Web Content Accessibility Guidelines 2.0 Level AA. Specifically, Intercom focuses on three main areas for accessibility with their web chat, and include:
Keyboard navigation
Screen reader support
Colour contrast
Onsite support
Yes, at extra cost
Support levels
We provide a service model based on severity of issue with different response times for each level. For critical issues we respond within 12 hrs. This can be 9-5 or 24/7 depending on Trust requirements (depending on Lifebit CloudOS subscription plan).
Support available to third parties

Onboarding and offboarding

Getting started
Users can easily set up the service through the Lifebit CloudOS interface, which can be accessed through []. Creating a new account is simple, users only have to enter their name and email. Once signed up, users can either opt for 10 free credits of the Lifebit Cloud, or can link their AWS, Azure, Google Cloud or Alibaba accounts to the platform using the Identity and Access Management (IAM) credentials.

To get started, Lifebit has implemented a demo version of Lifebit CloudOS, which allows users to explore the way the platform is structured, in addition to running a demo job with example parameters and data.

If required, users can read the Lifebit CloudOS documentation [] which goes into detail about how to use the platform. For more information, users are encouraged to contact our support service.
Service documentation
Documentation formats
  • HTML
  • Other
Other documentation formats
End-of-contract data extraction
Lifebit CloudOS does not transfer any data, metadata, or log information out of the user's cloud account. Lifebit CloudOS only manages the allocation of the user's resources and never processes any information from the user's analysis or datasets.

Therefore, there is no need for users to extract their data when the contract ends. If they wish, they can simply revoke their Identity and Access Management (IAM) credentials from Lifebit CloudOS and from this point Lifebit CloudOS ceases to have access to the user's storage resources.
End-of-contract process
Since the user's cloud account is linked to Lifebit CloudOS, the user is responsible for revoking Lifebit CloudOS' access to their cloud. As soon as their cloud is disconnected from the settings field in Lifebit CloudOS, the platform will be detached from their account and data. Furthermore, the results generated from the data analysis via Lifebit CloudOS are stored in the user's cloud account storage resources. Therefore, the data generated does not need to be transferred or deleted because they always live on the user's cloud. There are no additional costs associated to disconnecting Lifebit CloudOS from cloud accounts.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Service interface
Description of service interface
Users can easily set up the service through the Lifebit CloudOS interface, which can be accessed through []. Creating a new account is simple, users only have to enter their name, organisation and email. Once the account has been set up, users can run their analyses directly through the Lifebit CloudOS web interface. If desired, users can programmatically access Lifebit CloudOS using the Lifebit API. There are no limitations to how users can set up or make changes through the web interface.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Lifebit has not performed interface testing with users of assistive technology on Lifebit CloudOS.
What users can and can't do using the API
Users can generate a private API key by navigating the settings in Lifebit CloudOS. They can subsequently include the key in HTTP request header to make requests. The option to register user’s endpoint to a webhook for receiving notifications is provided. The following actions can be performed by making API queries. POST request to deploy a job and select all the parameters available through GUI (select instance type, workflow, input data and parameters). GET requests for retrieving information. Request to retrieve information about specific job by providing job id. To retrieve information about all analyses Projects, this includes all the jobs associated with given Projects, including summary statistics (eg. job count per Project). Retrieve information about all available analysis workflows. Current limitations are associated with the cloud account settings. The user is not allowed to change the cloud account configuration from API, or retrieve relevant information but this is designed like so, as a security measure.
API documentation
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Customisation available
Description of customisation
Customisation of Lifebit CloudOS is included in the Enterprise package, our top offering tailored to the organisation's needs. The customised package is discussed before engagement between Lifebit and the organisation looking for a custom solution.

- Choice of public, private, hybrid cloud, or use of on-premise computing
- 24/7 bioinformatics and data analysis support
- Advanced Auditing
- Automated recommendations on best resources and data to be used for each analysis, and prediction of analysis costs and duration.


Independence of resources
Since each user's personal cloud account is linked to Lifebit CloudOS, the demand they place on the service is provided by their own cloud provider and not through Lifebit CloudOS. This ensures infinite scalability through either AWS, Azure, Google Cloud or Alibaba cloud providers.


Service usage metrics
Metrics types
Users can refer to the start time, execution time, cost, and computational resources (instances) used for all jobs deployed through Lifebit CloudOS. Furthermore, after job completion, users can also access job monitor analytics (i.e. CPU and RAM usages per process in the pipeline).

For team accounts, administrators have a detailed overview of what each team member has used in terms of resources, and can also implement different spending caps for each member of the team.
Reporting types
  • API access
  • Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other data at rest protection approach
No physical media exist where the data are stored within Lifebit's premises. Data protection of the cloud providers' policies apply.
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Lifebit CloudOS utilizes Identity and Access Management (IAM) authentication, allowing the user to manage their cloud and data in a secure way.

With Lifebit CloudOS, users' data never leaves their secure cloud environment, as Lifebit CloudOS does not ingest or transfer any data, metadata, or log information out of the user's environment. Lifebit CloudOS only manages the allocation of user resources and never processes any information from the user's analysis or datasets.
Data export formats
  • CSV
  • Other
Other data export formats
Interactive html webpage with links pointing to the results files
Data import formats
  • CSV
  • Other
Other data import formats
  • TXT
  • VCF
  • GFF
  • ZIP
  • GZIP
  • JSON
  • BAM
  • BED
  • Lifebit CloudOS is agnostic, any data type can be used.

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • Other
Other protection between networks
Lifebit CloudOS encrypts data-in-transit using NIST approved open-source cryptographic libraries.
Data protection within supplier network
Other protection within supplier network
Not applicable because Lifebit CloudOS never transfers data.

Availability and resilience

Guaranteed availability
Lifebit commits to 99.5% uptime for Lifebit CloudOS. Details related to penalties for non-performance will be covered in the contract between Lifebit and the client.
Approach to resilience
This information is available on request.
Outage reporting
Any outages can be reported through an API, email alerts and/or web chat support.

Identity and authentication

User authentication needed
User authentication
  • Username or password
  • Other
Other user authentication
Identity and Access Management (IAM) credentials for linked cloud account
Access restrictions in management interfaces and support channels
Management interfaces require authentication in the form of username and password.
Access restriction testing frequency
At least once a year
Management access authentication
  • Username or password
  • Other
Description of management access authentication
Identity and Access Management (IAM) credentials

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
SOCOTEC Certification UK Ltd
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Information security policies provide Lifebit with a framework and standards for information security program and assurance activities. Important attributes: management engagement in security governance for alignment with overall organization policies and goals; integration of security architecture with enterprise architecture; continuous evaluation the information security strategy to ensure alignment with business needs and the organization’s risk appetite; regular review of the organization’s risk appetite to ensure it continues to be appropriate for the environment in which the organization operates. Management formally approves the information security strategy, policy, and architecture to ensure appropriate implementation, coverage and maturity for security controls and processes.

Lifebit has an Information Security Officer responsible for all aspects of security for Lifebit CloudOS. Policies are published and employees are mandated to sign up to the adherence of these policies on an annual basis.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Lifebit's CloudOS SaaS Services change management process aligns with ITIL v3 ITSM best practices. All the changes will be tested before deployment.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We assess vulnerability and potential test by performing biannual penetration testing and frequent reviews by an Information Security Officer.

We follow a model of continuous integration and deployment. New patches are scheduled to be deployed daily but in urgent occasions of threats Lifebit might proceed in deploying the changes as soon as possible.

Penetration testing feedback (outsourced) and reviews from Information Security Officer.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Lifebit leverages the cloud provider's security tools as the first layer of defense against unauthorized access. Alerts are reviewed on a daily basis and appropriate action is taken upon review.
Incident management type
Supplier-defined controls
Incident management approach
Lifebit has an incident management process in place. Further details will be part of master service agreement.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£4,990 to £7,450 a person a year
Discount for educational organisations
Free trial available
Description of free trial
Included (no time limit): Run analysis over own cloud account, Import any application from public and private Container/Git repositories, Curated bioinformatics pipelines, 'Out-of-the-box’ auto-scaling and automation, Sharing/monitoring data analysis, Programmatic access (API)

Not included: Cost-saving with spot instances, Team functionality, Administrator capability
Link to free trial

Service documents