CDS Compute as a Service
Compute as a Service provides you with the trusted, connected and flexible cloud platform you need to deliver enterprise and cloud-native applications. Self-provision, and scale, secure environments in minutes in our two security domains; Assured OFFICIAL (formerly IL2) and Elevated OFFICIAL (formerly IL3) utilising Service Levels up to 99.99%
Features
- On demand - Billed by the hour for resources used
- Build and configure VMs via secure self-service portal & API
- A range of service levels, VM sizes and licencing options
- Up to 24/7 service desk with CDS support agreement
- Platform spans two UK data centres separated by over 100km.
- Cross-domain functionality: controlled access between internet and Elevated domains
- Assured; UK hosted by SC and NPPV cleared personnel
- Aligned with CESG Cloud Security Principles
- Connect over the internet, PSN, N3 or JANET
- Advice from CDS experts
Benefits
- Enabling cost savings by controlling VM power states
- Get the resources you need, when you need them
- Configure the solution that is right for your application
- Feel supported to get the best from your application
- Architect solutions with confidence that applications and services remain available
- Make compelling citizen facing services, whilst ensuring data remains safe
- Have confidence in who has access to your data
- Solutions on a cloud that aligns with CESG best practice
- Choose the right network to connect your solution to
Pricing
£0.01 a virtual machine an hour
- Minimum contract period: Month
- Excluding VAT
Service documents
Request an accessible format
Framework
G-Cloud 8
Service ID
7 3 5 5 2 0 9 8 1 2 7 9 9 5 6
Contact
CDS
Jonathan Astin
Telephone: 07904 570073
Email: jonathan.astin@cds.co.uk
Support
- Support service type
-
- Service desk
- Phone
- Support accessible to any third-party suppliers
- No
- Support availability
- Up to 24/7 support with separate CDS Support Contract (via Lot 4)
- Standard support response times
- From 15 mins depending upon priority/severity of incident
- Incident escalation process available
- Yes
Open standards
- Open standards supported and documented
- Yes
Onboarding and offboarding
- Service onboarding process included
- Yes
- Service offboarding process included
- No
Analytics
- Real-time management information available
- Yes
Cloud features
- Elastic cloud approach supported
- Yes
- Guaranteed resources defined
- Yes
- Persistent storage supported
- Yes
Provisioning
- Self-service provisioning supported
- Yes
- Service provisioning time
- 1 to 2 days via CDS Technical Architect
- Service deprovisioning time
- Same day
Open source
- Open-source software used and supported
- Yes
API access
- API access available and supported
- Yes
- API type
- RESTful
Networks and connectivity
- Networks the service is directly connected to
-
- Internet
- Public Services Network (PSN)
- New NHS Network (N3)
- Joint Academic Network (JANET)
- Other
Access
- Supported web browsers
-
- Internet Explorer 6
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10+
- Firefox
- Chrome
- Safari
- Opera
- Offline working and syncing supported
- Yes
- Supported devices
-
- PC
- Mac
- Smartphone
- Tablet
Certifications
- Vendor certification(s)
-
- ISO20000 (IT Service Management)
- ISO9001 (Quality)
- ISO27001 (Information Security)
- Cyber Essentials and Cyber Essentials Plus
- VMware vCloud Powered
- PSN acreditation
Data storage
- Datacentres adhere to the EU code of conduct for energy-efficient datacentres
- Yes
- User-defined data location
- Yes
- Datacentre tier
- TIA-942 Tier 3
- Backup, disaster recovery and resilience plan in place
- Yes
- Data extraction/removal plan in place
- Yes
Data-in-transit protection
- Data protection between user device and service
- Data protection within service
- Data protection between services
Asset protection and resilience
- Datacentre location
- Data management location
- Legal jurisdiction of service provider
- UK
- Datacentre protection
- Yes
- Data-at-rest protection
- Secure data deletion
- Other secure erasure process
- Storage media disposal
- CPA Foundation-assured product
- Secure equipment disposal
- Yes
- Redundant equipment accounts revoked
- Yes
- Service availability
- 99.99%
Separation between consumers
- Cloud deployment model
- Community cloud
- Type of consumer
- A specific consumer group, eg Police, Defence or Health
- Services separation
- Yes
- Services management separation
- Yes
Governance
- Governance framework
- Yes
Configuration and change management
- Configuration and change management tracking
- Yes
- Change impact assessment
- Yes
Vulnerability management
- Vulnerability assessment
- Yes
- Vulnerability monitoring
- Yes
- Vulnerability mitigation prioritisation
- Yes
- Vulnerability tracking
- Yes
- Vulnerability mitigation timescales
- Yes
Event monitoring
- Event monitoring
- Yes
Incident management
- Incident management processes
- Yes
- Consumer reporting of security incidents
- Yes
- Security incident definition published
- Yes
Personnel security
- Personnel security checks
Secure development
- Secure development
- Yes
- Secure design, coding, testing and deployment
- Yes
- Software configuration management
- Yes
Supply-chain security
- Visibility of data shared with third-party suppliers
- Yes
- Third-party supplier security requirements
- Yes
- Third-party supplier risk assessment
- Yes
- Third-party supplier compliance monitoring
- Yes
- Hardware and software verification
- Yes
Authentication of consumers
- User authentication and access management
- Yes
- User access control through support channels
- Yes
Separation and access control within management interfaces
- User access control within management interfaces
- Yes
- Administrator permissions
- Yes
- Management interface protection
- Yes
Identity and authentication
- Identity and authentication controls
External interface protection
- Onboarding guidance provided
- Yes
- Interconnection method provided
Secure service administration
- Service management model
Audit information provision to consumers
- Audit information provided
- Data made available by negotiation
Secure use of the service by the customer
- Device access method
- Service configuration guidance
- Yes
- Training
- Yes