CDS Compute as a Service on UKFast

UKFast commodity-based services and CDS private cloud offers a secure, high performance and resilient dedicated private cloud hosting platform. Access to wholly-owned ISO-certified UK data centres with accreditation to Tier 1 “official sensitive”. Reliability assured with access to round the clock support and guaranteed service levels up to 99.99%.


  • On demand - Billed by the hour for resources used
  • Enterprise grade cloud utilising VMWare HP and Cisco UCS technology
  • Private compute and dedicated storage
  • 10Gbps connectivity for every blade server
  • Connect through HSCN PSN or JANET
  • A range of service levels, VM sizes and licencing options
  • UK based data centres fully owned and operated by UKFast
  • Adherent with NCSC cloud security principles
  • Tier 1 / IL0 to IL4 (OFFICIAL / OFFICIAL-SENSITIVE) solutions
  • Advice from CDS experts


  • High levels of security, isolation, reliability, availability and performance
  • Create as many virtual machines as resources allow
  • 100% network uptime guarantee as standard
  • UK based data centres fully owned and operated by UKFast
  • Make compelling citizen facing services, whilst ensuring data remains safe
  • Have confidence in who has access to your data
  • Full solution backups as standard
  • 99.99% infrastructure availability guaranteed
  • Solutions on a cloud that aligns with NCSC best practice
  • Choose the right network to connect your solution to


£163 a virtual machine a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

9 1 1 7 9 8 4 4 5 1 7 8 6 2 5


CDS Jonathan Astin
Telephone: 07904 570073

Service scope

Service constraints
All planned maintenance is covered by a mandatory 5 day notice period. UKFast reserve teh right to conduct unplanned emergency maintenance where necessary, but will always make reasonable efforts to inform impacted customers before work commences. Support is limited to services, hardware and applications provided by UKFast.
System requirements
  • Proof of license ownership for customer-provided Microsoft licenses
  • Customeras must adhere to fair use policy and ToS

User support

Email or online ticketing support
Email or online ticketing
Support response times
From 15 minutes but Severity and SLA dependent
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Support levels
Tickets are responded to on a priority basis. We aim to respond to ALL initial questions within 15 minutes during normal business hours and High Severity tickets will be answered 24/7.
Tailored support plans to cover infrastructure and or application support are available through Cloud support.
Support available to third parties

Onboarding and offboarding

Getting started
UKFast and CDS offer services to enable seamless on-boarding and collaboraton to design the solution to meet your requirements. An on-boarding process would typically include Discovery process / Timeline setting / Risk assessment / implementation process / Quality Assurance
Service documentation
Documentation formats
  • HTML
  • Other
Other documentation formats
MS Word
End-of-contract data extraction
At the end of the contract any customer data stored will only be extracted by UKFast with prior consent of the customer. UKFast shall purge and destroy (as defined in security accreditation for different ILs) customer data from any of its own equipment after the contract ends.
End-of-contract process
A similar process to on-boarding is provided for customers wishing to leave UKFast. We provide full transitional services at an additional charge, as detailed in the pricing document. This includes meeting with the new provider, agree timelines, risk identification, assistance with the new provider.

Using the service

Web browser interface
Using the web interface
MyUKFast is the customer's web interface where you can manage all aspects of the solution. For example creating/managing/deleting/scaling virtual machines, managing reports and monitoribng alerts, firewalls configuration and more.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Currently being rebuilt to offer a fully accessible web interface
Web interface accessibility testing
Testing against WCAG has been performed to uderstand the requirements for MyUKFast rebuild.
What users can and can't do using the API
Create VMs, Manage VMs, Delete VMs, Scale VMs up/down, Power VM on / off, Clone VM, Create and manage templates, Manage Datastores, Manage firewalls, Manage system resources
API automation tools
  • Ansible
  • Chef
  • SaltStack
  • Puppet
  • Other
Other API automation tools
Any appropriate tool can be used
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
Command line interface


Scaling available
Scaling type
  • Automatic
  • Manual
Independence of resources
QoS policies / guaranteed resources
Usage notifications
Usage reporting
  • Email
  • SMS
  • Other


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics
  • Applications
  • Services
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
UKFast Cloud Solutions

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
What’s backed up
  • Files
  • Folders
  • Virtual machines
  • Databases
  • Operating systems - Linux and Windows
  • Microsoft Exchange servers
  • Active Directory
Backup controls
UKFast will agree and impelment a robust and granular back-up schedule on the customer's behalf.
Datacentre setup
Multiple datacentres
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Network availability - 100% infastructure availability. 99.99% availability is based on the total number of operating hours of a given calendar month and excludes planned and emergency maintenance. Service credits of up to 10% of the standard monthly support fee and payable for any month where availability SLA is not met.
Approach to resilience
UKFast owns and operates a 5.52MW tier 31,000 rack data centre estate. This contains multiple physically separe buildings connected by dedicated fibre. High voltage power connections are provided from separate primary sub-stations. All mission-critical services including Standby Generation, Cooling systems and UPS are provided at N+1 or greater across the whole facility. The complex has a power density of over 6KW per square foot, providing diverse A&B quadruple power feeds. The data centre complex is supported by 9MW of standby generation with over 100,000 litres of fuel storage and 8 hours fuel supply SLA. All critical services are supported by 4.6MW of UPS power and 4.9MW of data centre cooling. The public sector hosting suite fully resilient networking, switches, carrier-redundant lease lines, power and back-up generators, all separated from teh rest of the UKFast network and data centre complex.
Outage reporting
A public status range is available on the UKFast website, which shows live status of our core network and infrastructure along with details of any incidents. Customer notifications are managed via our ticketing system accessible via MyUKFast.

Identity and authentication

User authentication
  • 2-factor authentication
  • Limited access network (for example PSN)
  • Username or password
Access restrictions in management interfaces and support channels
Management access to the environments is strictly restricted to authorised and vetted personnel. Granular access rights ensure individual personnel have acess to only the resources they need in order to carry out their specific tasks and responsibilities.Logical and physical separation of access rights is provided, and all management interfaces are restricted to internal privileged networks and are not accessible to the internet or external networks.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Limited access network (for example PSN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
Ultima Risk Management
PCI DSS accreditation date
What the PCI DSS doesn’t cover
Office network not covered as this has no client infrstructure
Other security certifications
Any other security certifications
  • Cyber Essentials
  • Cyber Essentials Plus
  • SOC 2

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
CDS is certificated to BS EN ISO 27001 – Information Security Management System and registered under the Data Protection Act 1998. (DPA No. Z5255664). CDS ensures client information is securely maintained through our audited processes and procedures. These are detailed in our SYSOPS which form part of our ISO27001 accreditation which is independently audited twice yearly. Our SYSOPS cover personnel and IT security requirements. All managers and staff within CDS will take steps to ensure that personal data is kept secure at all times against unauthorised or unlawful loss or disclosure. CDS employs a dedicated Security manager (ITSM) and runs a Security forum which is chaired by our Managing Director ensuring board level engagement.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
CDS manage the performance, security and integrity of underpinning hardware/software configurations to expected standards. All hardware will be configured by experts, then managed, maintained and monitored to industry standards. Including availability, capacity and performance, pre-empting any incidents or problems. We will ensure that all operating systems, all firewalls, and all essential partner software, are checked for security or performance patches every month. Should any critical security patches be announced, these will be implemented ASAP. Any critical patching of the underlying hardware estate will be managed using our Change Management and Release and Deployment Management processes, certified to ISO 20000 standard.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
CDS undertake periodic independent pen and vulnerability scanning of our networks and network services. This forms part of our ISO 27001 and Cyber Essentials Plus accreditation. CDS also undertake vulnerability scanning of client solutions during development and at the point of release. Subsequent scans form part of contractual agreements. CDS also run Nessus scans of the environment at least weekly. Identified vulnerabilities are assessed based upon the threat type and business risk. Those issues requiring attention form part of a remediation plan. The individual items are assigned a priority and are tracked through our ITIL service desk to completion.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
IDS and IPS are in place on firewalls which provide perimeter protection to our networks and are configured to alert on suspicious activity e.g. sql injection, XSS etc. Logs are also monitored using ManageEngine. Server Logs and Syslogs are harvested to a central reporting server and alerts are in place to notify suspicious activity such as repeated, failed administrator login attempts as wel as more sophisticated events indicating exfiltration attempts. Where relevant and appropriate, GPG13 logging is implemented – by way of example we implemted this level of reporting and alerting for the Metropolitan Police
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
CDS use the Service ticket prioritisation and categorisation matrix that has been used successfully on GCloud listings since being revised through collaboration in 2013. This matrix, which underpins our mature Service Delivery portfolio aims to offer an effective service workflow for Incident and Service Request Management, items to be delivered as part of release units, as well as Problem Management. As obligated by ISO/IEC 20000 standard, CDS operates the full service lifecycle as detailed in the standard, which includes all recognised Service Management processes, such as Incident and Service Request Management, Problem Management, Change Management, Release and Deployment Management.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres


£163 a virtual machine a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.