The Bunker Secure Hosting Limited

Cloud Archive Storage

Cloud Archive Storage service is an S3-compatible cloud storage solution that solves the growing challenges of data storage in terms of cost, security, compliance, location, reliability and availability.

Data is stored entirely in the UK, encrypted in-transit and at-rest, resilient and with the highest levels of physical and digital security.


  • Secure and highly-available object-based cloud storage
  • Simple and flexible price based on storage capacity
  • No unpredictable per-request charges
  • Encryption of data in-transit and at-rest
  • UK-based, ex-MoD, ISO27001, PCI-DSS and CyberEssentials Plus certified datacentres


  • Reduce data storage and management costs
  • Rest assured that critical data is secure and always available
  • Benefit from predictable, monthly costs - no access charges
  • Assured UK data residency and sovereignty
  • 24/7/365 monitoring by our ever-vigilant, UK-based Operations Team
  • Work with a trusted partner to reduce infrastructure management overhead


£18 per terabyte per month

  • Free trial available

Service documents

G-Cloud 11


The Bunker Secure Hosting Limited

Christopher Scott

01304 814800

Service scope

Service scope
Service constraints Cloud Archive Storage uses an S3-compatible API to directly read/write/query the Object Storage.

For access over the Public Internet, you may be subject to  latency and network load outside of The Bunker's control.  A direct connection option is available to customers hosting within The Bunker's datacentres to give enhanced archive performance.

The S3-compatible API can be adapted to present other storage protocols such as CIFS/NFS giving customers the ability to access the archive as a native filesystems.  This will typically require an additional client accessor device or software client.
System requirements S3-compatible storage gateway, backup or other software.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Target first response time is 15 minutes.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Support is provided through our 24/7/365 Service Desk who will proactively manage all support calls to resolution, escalating incidents and problems in line with comprehensive operational level agreements, service level agreements and third party underpinning contracts.

Comprehensive service support and service management is provided for each contract according to operational requirements and is built into contract pricing.

Service delivery is ensured by your dedicated technical account manager supported by service delivery managers and our team of cloud support engineers.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Customers receive a welcome pack containing details of the service, key contacts, processes and services that they should be aware of.

Typically, initial on-boarding and introductory usage of the platform is covered during the project delivery to ensure customers maximise the value of their investment. Additional, focused training is available at an extra cost.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Where customers are able to extract their data through their own methods, they are free to do so. The Bunker can assist in bulk data extraction although this may incur additional costs if specialised hardware or software is required.
The Bunker will purge and destroy customer data from it's own equipment upon contract termination in accordance with it's ISO27001 policies. Additional data destruction measures may be pre-agreed with the client in advance and may incur additional costs.
End-of-contract process A Customer may choose to “off-board” their systems to stop taking Services from The Bunker. The Customer must submit a formal request into their account manager (directly or via the Service desk), who will assist in arranging any required off-boarding services and the deletion of Customer data. Once the required works are agreed and the Customer has exported their data, The Bunker will shut down and destroy any remaining services. Fees may apply for off-boarding technical work and process management.

Using the service

Using the service
Web browser interface No
What users can and can't do using the API Users can use the S3-compatible API to Write, Read and Delete objects in the store.
API automation tools
  • Ansible
  • Chef
  • Puppet
API documentation No
Command line interface Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • Other
Using the command line interface User can use S3-compatible command line tools to Write, Read and Delete objects in the store.


Scaling available No
Independence of resources The Cloud Archive Storage platform is capacity managed to ensure it can meet the demands on the service.
Usage notifications Yes
Usage reporting Email


Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • Other
Other metrics Storage useage
Reporting types
  • API access
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Never
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery No

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network The Bunker also include SSH encryption.

Availability and resilience

Availability and resilience
Guaranteed availability Service availability achieved within any month shall be calculated monthly as follows: (Total online hours of availability – service downtime) x 100% Total online hours of availability. The service availability calculation above will exclude any time which occurred as a result of events outside the control of The Bunker. In the event the service availability service level of 99.9% is not achieved when measured over a monthly period, the following service credits shall apply: System availability achieved Applicable service credit 99.9% to 100% 0% of the monthly charge for the affected service line; 99% to 99.89% 5% of the monthly charge for the affected service line; 98% to 98.9% 10% of the monthly charge for the affected service line; For each full percentage point thereafter a further 5% of the monthly charge for the affected service line subject to a maximum of 100% of the affected service line for the month
Approach to resilience Datacentre infrastructure is designed in a N+1 or N+N depending on requirements or infrastructure type. Network ISP services are deployed in a N+N configuration. Customer Environments are deployed according to the specific requirements of the customer.
Outage reporting Outage reports are delivered via Email.

Identity and authentication

Identity and authentication
User authentication
  • Username or password
  • Other
Other user authentication Bearer tokens
Access restrictions in management interfaces and support channels Administrative access to the Cloud Archive Storage platform uses strong authentication, TLS VPN or SSH with Public Key Authentication for onward access to the infrastructure.

Additional application-level access controls are implemented within the Object Storage software.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
Devices users manage the service through
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSi
ISO/IEC 27001 accreditation date Valid from:19/05/17 -Expires: 18/05/2020
What the ISO/IEC 27001 doesn’t cover A14.2.7 Outsourced Development
15.1.3 Information, Commuincation and technology supply chain
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification CNS
PCI DSS accreditation date Valid from: 27/07/18 Expires:27/09/19
What the PCI DSS doesn’t cover CyberEssentials and CyberEssentials Plus. Data Security and protection toolkit.
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes The Bunker are an ISO 27001 accredited company.  The scope of the accreditation is business wide across two data centres with a SOA covering 112 out of 114 controls.  Data protection policies, processes and procedures are supported by a Personal Information Management System BS10012 aligning the business to the six principles of GDPR.  The Bunker are also registered with Visa as a Managed Service Hosting Provider giving them the ability to architect internal and external data environments to the twelve requirements of PCI DSS.

The Bunker have a robust set of policies, processes, and procedures in place including; business continuity, breach management, physical and environment security, HR resource security, incident management, asset management, access control, supplier relationships, information management and information security policies all of which are enforced at board level.  

Policy is reviewed and signed off by the senior management team.  An Information governance and compliance team is in place with clear roles of responsibilities to manage and maintain the compliancy frameworks within the business.

There is a dedicated data protection officer reporting directly to the group board responsible for advising, consulting and monitoring overall compliance within the business.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach The Bunker's change management policy is documented and audited as part of our ISO27001 accreditation and ensures all changes are auditable and subject to the correct level of scrutiny based on the potential risk and impact.
Vulnerability management type Supplier-defined controls
Vulnerability management approach The Bunker use continual vulnerability monitoring to alert us to threats in realtime and in the face of constant changes to our services.

An annual infrastructure assessment is commisioned to perform more detailed analysis. Critical vulnerabilities are patched or mitigated within 30 days.
Protective monitoring type Supplier-defined controls
Protective monitoring approach The Bunker deploy next generation endpoint security agents which constantly assess the behaviour of the servers and endpoints for malicious or threatening activity. Threats are notified to out 24x7x365 Service Desk for remediation.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach The Bunker operate ISO27001 and ITIL process for Incident Management, with defined paths for escalation which are dependant on Impact and Urgency.
Users can report Incidents by Email, Telephone or Self Service Portal.
Incident Reports are provided via Email.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres No


Price £18 per terabyte per month
Discount for educational organisations No
Free trial available Yes
Description of free trial 1TB Vault and setup assistance for 30 days.

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑