Deloitte LLP

Keytree-Deloitte Infrastructure, Application, and Cloud Automation by Click

Click Automation is a software tool designed specifically to assist with and simplify the build, installation, and management of cloud and hybrid environments. Non-technical users execute simple guided procedures that build and manage infrastructure and applications, prompting responses based on the company standards and platform best practice.


  • Automation Software providing DevOps, FinOps, and BizOps functionality
  • Self-Service consumable automation for non-privileged, non-technical users
  • Provides prebuilt build plans available for SAP and non-SAP applications
  • Build temporary POC/Fix environments without need for technical team
  • Build or copy application environments using 4 step guided procedure


  • Increases business and application agility
  • Can integrated into customer on-premise systems and other third parties
  • Proven accelerator for Cloud Migration Projects
  • Works across Microsoft Azure, AWS, and Google Cloud Platform
  • Reduce dependency on key technical, security, and support resources


£1,667 to £4,167 a unit a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

7 3 0 3 8 2 6 0 7 8 8 3 4 4 0


Deloitte LLP Donna Farrell
Telephone: 44 207 303 0913

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Microsoft Azure
Amazon Web Services
Google Cloud Platform
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Keytree does not usually deliver end-user training but rather supports the customer, or its selected training provider, in delivering the training via a train-the-trainer approach.
System requirements
  • Provisioning via Automation
  • Operational Management via Automation
  • System Migration to Cloud

User support

Email or online ticketing support
Email or online ticketing
Support response times
The Keytree Global Service desk receives tickets via a dedicated service portal. The Service Desk & Delivery Support staff are ITIL v3 Foundation qualified. We respond to tickets within the published SLAs which are : Priority 1 - 1 working hour Priority 2 - 4 working hours Priority 3 - 8 working hours
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Case by case basis - we can provide 24 hour, 7 days a week.
Support available to third parties

Onboarding and offboarding

Getting started
An external wiki page includes full and comprehensive instruction manual.
Service documentation
Documentation formats
End-of-contract data extraction
There is no data extraction. Click does no management any transactional data.
End-of-contract process
Click is decommissioned.

Using the service

Web browser interface
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Screens are adaptable for desktop and mobile use
Service interface
Customisation available
Description of customisation
Click incorporates Customers standards, policies, and requirements as configuration and can be completely customised. Additionally, Click can be customised to build and manage any application, as well as providing customised operational and lifecycle processes. It can also be customised to leverage customer enterprise solutions like backup, monitoring, data management, security, etc.


Independence of resources
Click is underpinned by a small amount of infrastructure to provide core services which then dynamically provisions temporary resources to deliver user tasks which are destroyed at the conclusion of the process.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Click surfaces data from the landscapes and applications it manages builds
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Click will provide 99.5% availability in any subscription month. A subscription month will be considered to be a calendar month during which the client has had a full site subscription for the entirety of the month.
Approach to resilience
The solution is architected using all of the availability features provided by the cloud platform for the highest resilience and availability. For all the underlying app, database, and serverless technologies, availability is assured using the multiple availability zones, hence in the event of a failure, the service would not be affected. Persisted data is backed up in a secure format and replicated to multiple locations.
Outage reporting
Via a Keytree "Help Desk"

Identity and authentication

User authentication needed
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Corporate Directory IdP with 2-factor authentication for Super Admins.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Certification Europe (UK) Ltd
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
All aspects of KIT are covered by Keytree's ISO 27001-2013 certification.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Information security policies and processes
Click follows ISO 27001-2013, which outlines our processes and is used to continuously improve our internal policies and processes. We have a strong IT Governance process driven from the CTO through technical architects into all projects and products.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Click makes regular updates and changes to the service, all of which go through in-depth testing to ensure that there is no regression on the service. The components of the service are tracked through release notes and guides for users.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Click carries out regular penetration tests that cover all the features and functions available, but generally cover all elements ranging from scanning for open ports, cross scripting vulnerabilities through to post flood attacks, cookie data and server/service/app configuration.
Any threats are prioritised in order on critical, high, medium and low. The top 3 levels will be resolved as a high priority with the low priorities being scheduled in for routine maintenance.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Click will use tooling to monitor the system activity and network traffic of the underlying services for suspicious activity.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Click allow organisations to provide P2, P3, & P4 incidents via our support desk. For P1 incidents, Click has a 24/7 phone number available to call for full system outages. If a P1 incident occurs then when the issue is fixed and the service is restored, Click will update all customer administrators of the times the service was lost and restored and the reason behind it. For any planned outages, the relevant communications will be carried out.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£1,667 to £4,167 a unit a month
Discount for educational organisations
Free trial available
Description of free trial
Demonstration System available by arrangement for maximum of 30 days.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.