Big Blue Door Ltd

Website Security Health Check, Audit and Penetration Testing

We regularly undertake security audits and penetration testing using our certified cloud engineers and fully-qualified developers, producing reports highlighting critical security issues and vulnerabilities. We will make clear recommendations on how to fix the current issues and advise you on ongoing maintenance and security optimisations.

Features

  • Site audit and health check
  • Penetration testing
  • Firewall testing
  • Security evaluation
  • Vulnerability assessment
  • Code audit against industry standards
  • Development and correction of substandard/incorrect code
  • Technical architecture review and analysis (full stack)
  • Site speed, efficiency and performance setup analysis
  • Analytics and SEO review

Benefits

  • Cyber Essentials certified
  • Fully independent health check service
  • Immediate correction of any security issues and/or vulnerabilities
  • Fully compliant and transferrable code (you own all code)
  • Rigorous testing and quality assurance
  • Agile development process that adheres to GDS open standards
  • Improved site response times
  • Improved processing times and hosting performance statistics
  • Fully secure - ISO 27001 certified
  • Public sector specialists with over a decade of experience

Pricing

£172.50 per unit per month

  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

7 0 0 2 5 9 8 8 3 9 3 8 3 6 0

Contact

Big Blue Door Ltd

Paul Jenkins

0203 773 6040

paul@bigbluedoor.net

Service scope

Service constraints
N/A
System requirements
No specific system requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
We offer a full service desk for responding to defects, issues and change requests (please note change requests are chargeable). This includes a full ticketing system to log and manage change requests, as well as a dedicated phone-line when clients need more urgent response.
All critical items will be responded to within 30 minutes; this support is 24/7 - please refer to our SLA for further details.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
For every specific project we will agree a full service level agreement at the outset of the project which will allow us to ensure an appropriate level of support for your needs. As standard though we offer a full service desk, email, phone, live chat and onsite from core hours of Monday to Friday, 9.00am to 5.30pm. 24/7/365 support is also available as required.

Big Blue Door includes backups and disaster recovery as part of our standard support and maintenance offerings, but we also offer these services independently. Procuring these services independently of your hosting provider spreads risk and removes potential single points of failure.

We take nightly database backups with retention periods as follows:
- Daily backups for a one week
- Weekly backups for one month
- Monthly back ups to indefinitely
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We would generally provide the initial setup for clients as part of a wider hosting service offer. Should direct training be required this can be facilitated along with documentation.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
A data dump can be generated from the service at any time and ported elsewhere.
End-of-contract process
Data extract is included as part of the service, however any additional support is extra and can be provided as required on an individual basis.

Using the service

Web browser interface
Yes
Using the web interface
From your account control panel users can manage service aspects such as: Service setup, DNS management, Firewall rules, ordering new services (VM's / dedicated servers etc) as well as monitor the status of servers.
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
This service has been tested using ChromeVox.
API
Yes
What users can and can't do using the API
Services can be setup using the API, as well as performing tasks such as rebooting the service as required.
API automation tools
OpenStack
API documentation
Yes
API documentation formats
HTML
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • MacOS
Using the command line interface
As above users can setup services and restart servers as needed.

Scaling

Scaling available
No
Independence of resources
Monitoring ensures that independent users are not affected by other users.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Memory
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Memset

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
Database and all files backup
Backup controls
Big Blue Door includes backups and disaster recovery as part of our standard support and maintenance offerings, but we also offer these services independently. Procuring these services independently of your hosting provider spreads risk and removes potential single points of failure.

We take nightly database backups with retention periods as follows:
- Daily backups for a one week
- Weekly backups for one month
- Monthly backup (retained indefinitely)

The exact nature of the backups and what is included can be tailored and agreed at the project outset.
Datacentre setup
Multiple datacentres
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
For every specific project we will agree a full service level agreement with you at the outset of the project which will allow us to ensure an appropriate level of support for your needs. As standard though we offer a full service desk, email, phone, live chat and onsite from core hours of Monday to Friday, 9.00am to 5.30pm. 24/7/365 support is also available as required.
Approach to resilience
Information is available on request
Outage reporting
We provide email alerts and reporting on any outages.

Identity and authentication

User authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Restriction is managed by secure key's (for API access) as well as username & passwords for more routine support channels. Where we use third party support systems (e.g. Slack) two factor authentication can be supported.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
The British Assessment Bureau
ISO/IEC 27001 accreditation date
May 2015
What the ISO/IEC 27001 doesn’t cover
Big Blue Door as a business is covered by this certification.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Big Blue Door is both ISO 27001 and ISO 9001 certified, and all relevant staff have completed full Disclosure and Barring Service Checks. We complete quarterly information security reviews to ensure that standards are maintained and we follow a cycle of continuous improvement.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We have an agreed change management process to allow services to evolve over time. Before any service updates a security impact report is completed.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
-
Protective monitoring type
Undisclosed
Protective monitoring approach
-
Incident management type
Supplier-defined controls
Incident management approach
We have defined process for any outages and will update clients via agreed methodologies - outage reports are then completed within 24 hours of all resolutions and circulated.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
AWS has a long-term commitment to use 100% renewable energy. When companies move to the AWS Cloud from on-premises infrastructure, they typically reduce carbon emissions by 88% because our data centers can offer environmental economies of scale. Organizations generally use 77% fewer servers, 84% less power, and tap into a 28% cleaner mix of solar and wind power in the AWS Cloud versus their own data centers. To find out more about our sustainability initiatives and to track our progress, visit aws.amazon.com/about-aws/sustainability.

Pricing

Price
£172.50 per unit per month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
We would offer a free trial during any development period and would on a case by case basis consider options for a defined alpha launch.

Service documents

Return to top ↑