Cloud Archive Storage service is an S3-compatible cloud storage solution that solves the growing challenges of data storage in terms of cost, security, compliance, location, reliability and availability.
Data is stored entirely in the UK, encrypted in-transit and at-rest, resilient and with the highest levels of physical and digital security.
- Secure and highly-available object-based cloud storage
- Simple and flexible price based on storage capacity
- No unpredictable per-request charges
- Encryption of data in-transit and at-rest
- UK-based, ex-MoD, ISO27001, PCI-DSS and CyberEssentials Plus certified datacentres
- Reduce data storage and management costs
- Rest assured that critical data is secure and always available
- Benefit from predictable, monthly costs - no access charges
- Assured UK data residency and sovereignty
- 24/7/365 monitoring by our ever-vigilant, UK-based Operations Team
- Work with a trusted partner to reduce infrastructure management overhead
£18 per terabyte per month
- Free trial available
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
The Bunker Secure Hosting Limited
Cloud Archive Storage uses an S3-compatible API to directly read/write/query the Object Storage.
For access over the Public Internet, you may be subject to latency and network load outside of The Bunker's control. A direct connection option is available to customers hosting within The Bunker's datacentres to give enhanced archive performance.
The S3-compatible API can be adapted to present other storage protocols such as CIFS/NFS giving customers the ability to access the archive as a native filesystems. This will typically require an additional client accessor device or software client.
|System requirements||S3-compatible storage gateway, backup or other software.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Target first response time is 15 minutes.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Support is provided through our 24/7/365 Service Desk who will proactively manage all support calls to resolution, escalating incidents and problems in line with comprehensive operational level agreements, service level agreements and third party underpinning contracts.
Comprehensive service support and service management is provided for each contract according to operational requirements and is built into contract pricing.
Service delivery is ensured by your dedicated technical account manager supported by service delivery managers and our team of cloud support engineers.
|Support available to third parties||Yes|
Onboarding and offboarding
Customers receive a welcome pack containing details of the service, key contacts, processes and services that they should be aware of.
Typically, initial on-boarding and introductory usage of the platform is covered during the project delivery to ensure customers maximise the value of their investment. Additional, focused training is available at an extra cost.
|End-of-contract data extraction||
Where customers are able to extract their data through their own methods, they are free to do so. The Bunker can assist in bulk data extraction although this may incur additional costs if specialised hardware or software is required.
The Bunker will purge and destroy customer data from it's own equipment upon contract termination in accordance with it's ISO27001 policies. Additional data destruction measures may be pre-agreed with the client in advance and may incur additional costs.
|End-of-contract process||A Customer may choose to “off-board” their systems to stop taking Services from The Bunker. The Customer must submit a formal request into their account manager (directly or via the Service desk), who will assist in arranging any required off-boarding services and the deletion of Customer data. Once the required works are agreed and the Customer has exported their data, The Bunker will shut down and destroy any remaining services. Fees may apply for off-boarding technical work and process management.|
Using the service
|Web browser interface||No|
|What users can and can't do using the API||Users can use the S3-compatible API to Write, Read and Delete objects in the store.|
|API automation tools||
|Command line interface||Yes|
|Command line interface compatibility||
|Using the command line interface||User can use S3-compatible command line tools to Write, Read and Delete objects in the store.|
|Independence of resources||The Cloud Archive Storage platform is capacity managed to ensure it can meet the demands on the service.|
|Infrastructure or application metrics||Yes|
|Other metrics||Storage useage|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||Never|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Backup and recovery
|Backup and recovery||No|
|Data protection between buyer and supplier networks||Private network or public sector network|
|Data protection within supplier network||
|Other protection within supplier network||The Bunker also include SSH encryption.|
Availability and resilience
|Guaranteed availability||Service availability achieved within any month shall be calculated monthly as follows: (Total online hours of availability – service downtime) x 100% Total online hours of availability. The service availability calculation above will exclude any time which occurred as a result of events outside the control of The Bunker. In the event the service availability service level of 99.9% is not achieved when measured over a monthly period, the following service credits shall apply: System availability achieved Applicable service credit 99.9% to 100% 0% of the monthly charge for the affected service line; 99% to 99.89% 5% of the monthly charge for the affected service line; 98% to 98.9% 10% of the monthly charge for the affected service line; For each full percentage point thereafter a further 5% of the monthly charge for the affected service line subject to a maximum of 100% of the affected service line for the month|
|Approach to resilience||Datacentre infrastructure is designed in a N+1 or N+N depending on requirements or infrastructure type. Network ISP services are deployed in a N+N configuration. Customer Environments are deployed according to the specific requirements of the customer.|
|Outage reporting||Outage reports are delivered via Email.|
Identity and authentication
|Other user authentication||Bearer tokens|
|Access restrictions in management interfaces and support channels||
Administrative access to the Cloud Archive Storage platform uses strong authentication, TLS VPN or SSH with Public Key Authentication for onward access to the infrastructure.
Additional application-level access controls are implemented within the Object Storage software.
|Access restriction testing frequency||At least once a year|
|Management access authentication||
|Devices users manage the service through||
Audit information for users
|Access to user activity audit information||No audit information available|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||Between 6 months and 12 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||BSi|
|ISO/IEC 27001 accreditation date||Valid from:19/05/17 -Expires: 18/05/2020|
|What the ISO/IEC 27001 doesn’t cover||
A14.2.7 Outsourced Development
15.1.3 Information, Commuincation and technology supply chain
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Who accredited the PCI DSS certification||CNS|
|PCI DSS accreditation date||Valid from: 27/07/18 Expires:27/09/19|
|What the PCI DSS doesn’t cover||CyberEssentials and CyberEssentials Plus. Data Security and protection toolkit.|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
The Bunker are an ISO 27001 accredited company. The scope of the accreditation is business wide across two data centres with a SOA covering 112 out of 114 controls. Data protection policies, processes and procedures are supported by a Personal Information Management System BS10012 aligning the business to the six principles of GDPR. The Bunker are also registered with Visa as a Managed Service Hosting Provider giving them the ability to architect internal and external data environments to the twelve requirements of PCI DSS.
The Bunker have a robust set of policies, processes, and procedures in place including; business continuity, breach management, physical and environment security, HR resource security, incident management, asset management, access control, supplier relationships, information management and information security policies all of which are enforced at board level.
Policy is reviewed and signed off by the senior management team. An Information governance and compliance team is in place with clear roles of responsibilities to manage and maintain the compliancy frameworks within the business.
There is a dedicated data protection officer reporting directly to the group board responsible for advising, consulting and monitoring overall compliance within the business.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||The Bunker's change management policy is documented and audited as part of our ISO27001 accreditation and ensures all changes are auditable and subject to the correct level of scrutiny based on the potential risk and impact.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
The Bunker use continual vulnerability monitoring to alert us to threats in realtime and in the face of constant changes to our services.
An annual infrastructure assessment is commisioned to perform more detailed analysis. Critical vulnerabilities are patched or mitigated within 30 days.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||The Bunker deploy next generation endpoint security agents which constantly assess the behaviour of the servers and endpoints for malicious or threatening activity. Threats are notified to out 24x7x365 Service Desk for remediation.|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
The Bunker operate ISO27001 and ITIL process for Incident Management, with defined paths for escalation which are dependant on Impact and Urgency.
Users can report Incidents by Email, Telephone or Self Service Portal.
Incident Reports are provided via Email.
|Approach to secure software development best practice||Supplier-defined process|
Separation between users
|Virtualisation technology used to keep applications and users sharing the same infrastructure apart||No|
|Price||£18 per terabyte per month|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||1TB Vault and setup assistance for 30 days.|