Cyberfort Ltd

Cloud Archive Storage

Cloud Archive Storage service is an S3-compatible cloud storage solution that solves the growing challenges of data storage in terms of cost, security, compliance, location, reliability and availability.

Data is stored entirely in the UK, encrypted in-transit and at-rest, resilient and with the highest levels of physical and digital security.

Features

  • Secure and highly-available object-based cloud storage
  • Simple and flexible price based on storage capacity
  • No unpredictable per-request charges
  • Encryption of data in-transit and at-rest
  • UK-based, ex-MoD, ISO27001, PCI-DSS and CyberEssentials Plus certified datacentres

Benefits

  • Reduce data storage and management costs
  • Rest assured that critical data is secure and always available
  • Benefit from predictable, monthly costs - no access charges
  • Assured UK data residency and sovereignty
  • 24/7/365 monitoring by our ever-vigilant, UK-based Operations Team
  • Work with a trusted partner to reduce infrastructure management overhead

Pricing

£18 per terabyte per month

  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

8 7 1 2 8 0 0 9 3 9 1 4 4 9 0

Contact

Cyberfort Ltd

Ian McKay

07766 006064

bidmanagement@cyberfortgroup.com

Service scope

Service constraints
Cloud Archive Storage uses an S3-compatible API to directly read/write/query the Object Storage.

For access over the Public Internet, you may be subject to  latency and network load outside of The Bunker's control.  A direct connection option is available to customers hosting within The Bunker's datacentres to give enhanced archive performance.

The S3-compatible API can be adapted to present other storage protocols such as CIFS/NFS giving customers the ability to access the archive as a native filesystems.  This will typically require an additional client accessor device or software client.
System requirements
S3-compatible storage gateway, backup or other software.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Target first response time is 15 minutes.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support is provided through our 24/7/365 Service Desk who will proactively manage all support calls to resolution, escalating incidents and problems in line with comprehensive operational level agreements, service level agreements and third party underpinning contracts.

Comprehensive service support and service management is provided for each contract according to operational requirements and is built into contract pricing.

Service delivery is ensured by your dedicated technical account manager supported by service delivery managers and our team of cloud support engineers.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Customers receive a welcome pack containing details of the service, key contacts, processes and services that they should be aware of.

Typically, initial on-boarding and introductory usage of the platform is covered during the project delivery to ensure customers maximise the value of their investment. Additional, focused training is available at an extra cost.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Where customers are able to extract their data through their own methods, they are free to do so. The Bunker can assist in bulk data extraction although this may incur additional costs if specialised hardware or software is required.
The Bunker will purge and destroy customer data from it's own equipment upon contract termination in accordance with it's ISO27001 policies. Additional data destruction measures may be pre-agreed with the client in advance and may incur additional costs.
End-of-contract process
A Customer may choose to “off-board” their systems to stop taking Services from The Bunker. The Customer must submit a formal request into their account manager (directly or via the Service desk), who will assist in arranging any required off-boarding services and the deletion of Customer data. Once the required works are agreed and the Customer has exported their data, The Bunker will shut down and destroy any remaining services. Fees may apply for off-boarding technical work and process management.

Using the service

Web browser interface
No
API
Yes
What users can and can't do using the API
Users can use the S3-compatible API to Write, Read and Delete objects in the store.
API automation tools
  • Ansible
  • Chef
  • Puppet
API documentation
No
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • Other
Using the command line interface
User can use S3-compatible command line tools to Write, Read and Delete objects in the store.

Scaling

Scaling available
No
Independence of resources
The Cloud Archive Storage platform is capacity managed to ensure it can meet the demands on the service.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Other
Other metrics
Storage useage
Reporting types
  • API access
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Never
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
No

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
The Bunker also include SSH encryption.

Availability and resilience

Guaranteed availability
Service availability achieved within any month shall be calculated monthly as follows: (Total online hours of availability – service downtime) x 100% Total online hours of availability. The service availability calculation above will exclude any time which occurred as a result of events outside the control of The Bunker. In the event the service availability service level of 99.9% is not achieved when measured over a monthly period, the following service credits shall apply: System availability achieved Applicable service credit 99.9% to 100% 0% of the monthly charge for the affected service line; 99% to 99.89% 5% of the monthly charge for the affected service line; 98% to 98.9% 10% of the monthly charge for the affected service line; For each full percentage point thereafter a further 5% of the monthly charge for the affected service line subject to a maximum of 100% of the affected service line for the month
Approach to resilience
Datacentre infrastructure is designed in a N+1 or N+N depending on requirements or infrastructure type. Network ISP services are deployed in a N+N configuration. Customer Environments are deployed according to the specific requirements of the customer.
Outage reporting
Outage reports are delivered via Email.

Identity and authentication

User authentication
  • Username or password
  • Other
Other user authentication
Bearer tokens
Access restrictions in management interfaces and support channels
Administrative access to the Cloud Archive Storage platform uses strong authentication, TLS VPN or SSH with Public Key Authentication for onward access to the infrastructure.

Additional application-level access controls are implemented within the Object Storage software.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
Devices users manage the service through
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSi
ISO/IEC 27001 accreditation date
Valid from:19/05/17 -Expires: 18/05/2020
What the ISO/IEC 27001 doesn’t cover
A14.2.7 Outsourced Development
15.1.3 Information, Commuincation and technology supply chain
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
CNS
PCI DSS accreditation date
Valid from: 27/07/18 Expires:27/09/19
What the PCI DSS doesn’t cover
CyberEssentials and CyberEssentials Plus. Data Security and protection toolkit.
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
The Bunker are an ISO 27001 accredited company.  The scope of the accreditation is business wide across two data centres with a SOA covering 112 out of 114 controls.  Data protection policies, processes and procedures are supported by a Personal Information Management System BS10012 aligning the business to the six principles of GDPR.  The Bunker are also registered with Visa as a Managed Service Hosting Provider giving them the ability to architect internal and external data environments to the twelve requirements of PCI DSS.

The Bunker have a robust set of policies, processes, and procedures in place including; business continuity, breach management, physical and environment security, HR resource security, incident management, asset management, access control, supplier relationships, information management and information security policies all of which are enforced at board level.  

Policy is reviewed and signed off by the senior management team.  An Information governance and compliance team is in place with clear roles of responsibilities to manage and maintain the compliancy frameworks within the business.

There is a dedicated data protection officer reporting directly to the group board responsible for advising, consulting and monitoring overall compliance within the business.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
The Bunker's change management policy is documented and audited as part of our ISO27001 accreditation and ensures all changes are auditable and subject to the correct level of scrutiny based on the potential risk and impact.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The Bunker use continual vulnerability monitoring to alert us to threats in realtime and in the face of constant changes to our services.

An annual infrastructure assessment is commisioned to perform more detailed analysis. Critical vulnerabilities are patched or mitigated within 30 days.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The Bunker deploy next generation endpoint security agents which constantly assess the behaviour of the servers and endpoints for malicious or threatening activity. Threats are notified to out 24x7x365 Service Desk for remediation.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
The Bunker operate ISO27001 and ITIL process for Incident Management, with defined paths for escalation which are dependant on Impact and Urgency.
Users can report Incidents by Email, Telephone or Self Service Portal.
Incident Reports are provided via Email.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Pricing

Price
£18 per terabyte per month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
1TB Vault and setup assistance for 30 days.

Service documents

Return to top ↑