CDS

Secure Collaboration for Government

Secure Collaboration enables project leaders to manage and direct online collaboration using a clear and simple Document Exchange platform; within and across organisations; up to Official Sensitive level; with drag and drop simplicity.

Features

  • Document collaboration tools
  • Team project hub tools
  • Secure up to Official Sensititve
  • User management tools
  • Turnkey service

Benefits

  • Enables sharing across departmental boundaries
  • Enables team and project-based collaboration
  • Able to share sensitive material
  • Easy user management
  • Quick to set-up
  • Scalable based on user and business needs

Pricing

£10000 to £15000 per licence

Service documents

G-Cloud 10

561953815593317

CDS

James Davis

0113 399 4076

james.davis@cds.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Planned maintenance arrangements and support related upgrades
System requirements Web browser: IE11+, latest Firefox or Chrome

User support

User support
Email or online ticketing support Email or online ticketing
Support response times CDS provide standard weekday support from 9am to 5.30pm. Our standard SLA is based on ITIL guidelines e.g. P1 loss of service – service resolution in 2hrs. For full details of response times, please refer to the service definition document. Out of hours support is by separate arrangement.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Our standard SLA provides incident response targets based on severity, e.g. P1 loss of service – restoration in 2hrs. We provide 5 support levels ranging from business critical to low priority. For more information, please refer to the attached service description. Access to the service desk is subject to establishing a Support and Maintenance Contract. We establish a support contract with a minimum level of provision per month, appropriate to the size and complexity of your project. CDS' Service Desk operates to ITIL standards and is manned by dedicated team of support technicians and experienced developers.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started From initial contact a demonstration is provided - At Discovery stage we establish all requirements - At Delivery stage we create and develop based on the requirements - At Testing stage we ensure all functionality meets requirements across UAT and Production - Prior to delivery to Production we provide onsite training and documentation.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • Microsoft Word
  • Microsoft Excel
End-of-contract data extraction Discussed as part of final exit strategy. Ownership of the data vests with the client and CDS will provide all data in a full SQL Database backup. Delivered to the client via trusted hand.
End-of-contract process The service will cease on the agreed date/time and users will be denied access. All data will be returned to the client in accordance with the specific client contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Responsive based on the mobile device
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing The administration interface has not been tested, however the user presentation layer is compliant to WCAG 2.0 AA.
API No
Customisation available Yes
Description of customisation Onboarding - The interface can be re-styled to reflect the necessary corporate colours and guidelines - The development of bespoke features and functionality can be requested at any time and deployed - Users are categorised as System Admin, Community Group Admin and Users - System Admin Users control take responsibility and governance for the system and can devolve responsibility to Community Group Admin Users - Community Group Admin Users can set up community groups, assign security levels and authorise selected user access - All users can customise account and system alerts - Users can apply security sensitivity level access to documentation

Scaling

Scaling
Independence of resources In order to guarantee that users are not affected by the demands from other users, we use resource reservations and shares such as internet bandwidth shaping. In addition, the capacity planning team ensure that usage in terms of all resources are constantly monitored and increased accordingly relating to user demand.

Analytics

Analytics
Service usage metrics Yes
Metrics types There is Management Information reporting is included within the application eg. User activity, Login date, Login count, activity. Other bespoke reports and analytical data reporting can be developed and/or extracted as part of the support contract (subject to the extent of the request).
Reporting types
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach The application has some Management Information reporting built in. Other bespoke reporting or data extracts are provided on request.
Data export formats CSV
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Microsoft Excel
  • XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks PSN assured service, assured by CESG-assured components.
Data protection within supplier network
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network UK, assured by independent validation of assertion.

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% availability during service hours (9am - 5pm Monday to Friday).
Approach to resilience Available on request.
Outage reporting Email alert via Account Manager channels

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Username or password
Access restrictions in management interfaces and support channels Customers can raise and update support tickets using our interactive online portal and/or email. Access to our portal is by invitation only, and requires a username and password. Interaction by email can be restricted to specific domains, email addresses, or disabled altogether. We also offer access by telephone for urgent requests, and will always attempt to verify the identity of the caller, either using our standard procedure, or one agreed with the customer. Access to management interfaces are only available from the CDS network.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 05/11/2004
What the ISO/IEC 27001 doesn’t cover N/a
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Plus

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards UK, assured by independent validation of assertion.
Information security policies and processes CDS is certificated to BS EN ISO 27001 – Information Security Management System and registered under the Data Protection Act 1998. (DPA No. Z5255664). CDS ensures client information is securely maintained through our audited processes and procedures. These are detailed in our SYSOPS which form part of our ISO27001 accreditation which is independently audited twice yearly. Our SYSOPS cover personnel and IT security requirements. All managers and staff within CDS will take steps to ensure that personal data is kept secure at all times against unauthorised or unlawful loss or disclosure. CDS employs a dedicated Security manager (ITSM) and runs a Security forum which is chaired by our Managing Director ensuring board level engagement.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach CDS operate a mature Change Management process, which is certified to the ISO 20000 standard. We ensure that all configuration or service changes are put through a controlled Change Management process, to ensure that impact and risk are managed, quality is maintained, and that changes are planned, documented and approved. Impact and risk assessment includes security considerations. Our Change Register is underpinned by a Configuration Management toolset and process, which charts the lifecycle of configuration items, and allows for them to be linked to service transactions, such as incidents and changes.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach CDS undertake periodic independent pen and vulnerability scanning of our networks and network services. This forms part of our ISO 27001 and Cyber Essentials Plus accreditation. CDS also undertake vulnerability scanning of client solutions during development and at the point of release. Subsequent scans form part of contractual agreements. CDS also run Nessus scans of the environment at least weekly. Identified vulnerabilities are assessed based upon the threat type and business risk. Those issues requiring attention form part of a remediation plan. The individual items are assigned a priority and are tracked through our ITIL service desk to completion.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach IDS and IPS are in place on firewalls which provide perimeter protection to our networks and are configured to alert on suspicious activity e.g. sql injection, XSS etc. Logs are also monitored using ManageEngine. Server Logs and Syslogs are harvested to a central reporting server and alerts are in place to notify suspicious activity such as repeated, failed administrator login attempts as well as more sophisticated events indicating exfiltration attempts. Where relevant and appropriate, GPG13 logging is implemented – by way of example we implemented this level of reporting and alerting for the Metropolitan Police.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach CDS operate a mature Incident and Service Request Management process, certified to the ISO 20000 standard. The process is operated by our Service Management tool, which is interactive and can be configured to support the ticket workflow and metrics agreed with customers. Customers can report and update incidents via our interactive portal, email and telephone. Though we operate a core Incident Management policy and process, these can be tailored within customers Service Level Agreements to support common incidents and events. We operate a separate Major Incident Management process, which can provide incident reports, post-mortems etc., when criteria are triggered.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £10000 to £15000 per licence
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑