Hashicorp Product Suite (Enterprise Version)
Hashicorp offer an ecosystem of tools with the goal of revolutionising datacenter management: application development, delivery, and maintenance.With tools like Consul, Nomad, Vault, Terraform, Packer and Vagrant, Hashicorp offers a complete stack of tools to ensure that you can minimizing the challenges of shipping, rapidly iterating, and securing software applications.
Features
- Provision,secure,and run any infrastructure for any application
- Adopt cloud-agnostic approach to provision infrastructure-across private/public-clouds.
- Centrally secure, store, and control access to secrets
- Quickly&efficiently deploy applications of any type,on any infrastructure
- Write, Plan, and Create Infrastructure as Code
- Create platform specific machine images from single-source
- Create&Configure portable development environments
- Vagrant,Packer,Terraform,Vault,Nomad,Consul
- Flexible hosting options & 24x7 support on urgent issues
- Government-Streamline government IT infrastructure from end to end
Benefits
- Code collaboration,review with control,visibility and automated intelligence.
- Easy workflow,regardless of role-developer, operator,or designer
- Flexible Workloads,Easily Deploy,Simplify Operations,Increase Density,Reduce Cost
- Declarative configuration file describe all software requirements
- Safely&predictably create,change&improve production infrastructure
- Secures,stores&tightly controls access to tokens,passwords,certificates,API-keys,
- Secret Storage,Key Rolling,Audit Logs-Handle leasing
- Service Discovery,Failure Detection,Multi Datacenter,KV Storage
- Support enables running applications on any cloud,public or private
- Government-Streamline government IT infrastructure from end to end.
Pricing
£100 to £2,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 11
Service ID
5 7 6 5 5 9 0 0 9 0 2 2 5 6 4
Contact
Nuaware
<removed>
Telephone: <removed>
Email: <removed>@d48ead42-a0bb-4a7f-be66-fd4349975948.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Consul,
Nomad,
Packer,
Serf,
Terraform,
Vagrant,
Vault,
Hashicorp. - Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
- Underlying Infrastructure
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Hashicorp employees dedicated engineers as the first and only level of support. With this in mind, we expect our first and single line of support to be able to troubleshoot any issues, no matter how technical. If a ticket requires further investigation then the support engineer will proactively work with the engineering team responsible for the feature in question.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- User Documentation is provided upon request. All of the install guides are available online. Onsite training, Online training, Kickstarts and further assistance is available - but at an additional cost. The product aims to be self-sufficient for all levels of knowledge.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
All data is saved and retrievable at any given point during the licence engagement.
Hashicorp is COTS publicly available solution and it is possible to move solutions to other appropriate providers. We will assist this off boarding at additional cost through their professional services entry in G10 - End-of-contract process
-
The subscription fee grants access to the service, so no payment results in the account being locked. All data is saved and retrievable at any given point during the licence engagement.
Hashicorp is COTS publicly available solution and it is possible to move solutions to other appropriate providers. We will assist this off boarding at additional cost through their professional services entry in G10
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- No
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- Hashicorp's API aims to cover all functionality of the product. Users are given the expectation that whatever can be done through the browser should have an API counterpart.Hashicorp's API aims to cover all functionality of the product. Users are given the expectation that whatever can be done through the browser should have an API counterpart.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Other
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Support levels.
Specific operating system customisation.
Training.
Professional Services.
Customisation is Usually carried out by network ops and any persons with authorisation
Scaling
- Independence of resources
- Hashicorp has put in place rate limiting and DDOS protection technologies and software techniques. Hashicorp is a stand alone unit and is configured for a particular task. Other users have no capability to place stresses on the service. We apply very rigorous controls around fair usage to guarantee a reliable service for everyone.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Hashicorp Inc.
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- EU-US Privacy Shield agreement locations
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
- Security of data at rest is subject to the security configuration of the buyer or their cloud service provider
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data is exported in code
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
-
Agnostic of security as Hashicorp tools are deployable by the buyer in their chosen network. Hashicorp tools sit in the buyers network and does not have any connectivity into a network provided by us.
All data is encrypted in transit using HTTPS or SSH.
SSL is sufficient to protect the data in transit. - Data protection within supplier network
- Other
- Other protection within supplier network
-
Hashicorp has multiple layer of network defences in place, including Border router which also performs stateless traffic filtering, Firewall, and Application proxy.
Logging and monitoring, SIRT investigation, access management, change management, standardised config management.
Availability and resilience
- Guaranteed availability
-
Hashicorp is in full control of the software and therefore availability of Docker is validated and supported to work in specific operating environments as outlined in the support plan.
Hashicorp puts in place rate limiting and DDOS protection technologies and software techniques. As such we apply very rigorous controls around fair usage to guarantee a stable service for everyone - Approach to resilience
- Rigorous controls around fair usage to guarantee a stable service for everyone.
- Outage reporting
-
API and
Email Alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Support is available for all users and is done via e-mail. Access control is delegated to the e-mail server and client(s). Regarding management interfaces Hashicorp provides several different user roles within a Hashicorp for Business account. Management control of the account is given to Organisation Owners. Within an organisation non-owners can be made administratives of groups of repositories but without access to the management interface for the buyer's account.
- Access restriction testing frequency
- Less than once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
We have defined the risk tolerance parameters for our company and have adequate, sustained funding and allocation of security resources.
We produce and circulate quarterly reports on vulnerabilities, breaches, and status. Improvement of consensus-building, messaging and reporting is key.
All part of the Security and Security-GRC org have direct visibility into work and are active contributors across the product and service. - Information security policies and processes
- We have a core employee handbook that outlines a number of employment standard and expectations of conduct that employees must sign as part of their hiring paperwork, including code of conduct, computing policy, and escalation to security for incidents. This is available on our intranet, and is supplemented by other complementary policy type documents.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Ensure all documentation, requirements, design, test, and acceptance documentation for items is accurate and consistent with the actual physical design
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Hashicorp is responsible for ensuring the vulnerabilities of the software are minimised. Hashicorp subscribe to vendor vulnerabilities communications, assess any notifications for relevance, and patch; this is also complemented by our internal application security team reviews and automated testing, by external security researchers testing of our systems, and resulting patching.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Its is the buyer's or their chosen Cloud providers responsibility to protectively monitor the deployment but they can use anomaly detection and real time monitoring capabilities
- Incident management type
- Supplier-defined controls
- Incident management approach
- We do not state compliance with one individual standard we have included leading industry practices that are appropriate to Hashicorp. We are in our readiness phase on our SOC 2 audit work, this report will be available once issued, but no hard date has been set for the audit at this time. We have an established SIRT, modelled on leading industry practices.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £100 to £2,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Free trial version for Vault, Terraform, Consul and Nomad.
Yes, for more information, please get in contact. - Link to free trial
- https://www.hashicorp.com/products/vault/trial