Shaping Cloud

Microsoft Azure Hosting (Gold Partner), IaaS, PaaS, SaaS

Microsoft Azure Hosting and Managed Services, including IaaS, PaaS, SaaS and all other associated services.

Extensive experience through successfully migrating large public sector workloads to Azure since 2015.

Now also providing the same to other sectors.


  • Full range of Microsoft Azure services
  • Security and regulatory compliance for cloud services
  • Azure web app development and associated services and training
  • Optimisation services (performance & cost)
  • Training on Azure platform
  • Design, Build, and Support services
  • Storage services including hybrid, backup, BCDR, and archiving
  • Database services, including Managed Instance and PaaS
  • Projection and planning services, including performance, demand, and cost
  • Integration specialist, including APIs and iPaaS


  • Direct, immediate access to Azure services
  • An experienced partner that understands your context and complexity
  • Flexible, scalable services to meet changing or uncertain needs
  • Cost effective services through optimised design and management
  • Cost control through use of Optimisation and Managed services
  • Expert advice
  • Confidence in planning and migrating to Azure
  • Assured planning and migration for specific workloads
  • Assurance when migrating highly sensitive data


£10.92 per virtual machine

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11


Shaping Cloud

Mark Melvin


Service scope

Service scope
Service constraints None
System requirements
  • We consider all systems
  • We can discover all your systems using non-intrusive tools
  • We can assess and recommend hosting specification
  • We specify remediations in preparation for migration
  • We can recommend alternatives to Azure for unsuited workloads

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Various options available to suit your needs and budget - represented in contract terms and agreed SLA's/ KPI's
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 AA or EN 301 549
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 AA or EN 301 549
Web chat accessibility testing Whilst we have not tested our web chat with assistive technology users, our developers are experienced in providing web and software solutions that support users that require assistance. Therefore we are confident we can meet your requirements and remain flexible to ensure all users are able to use our support systems.
Onsite support Yes, at extra cost
Support levels We are able to tailor support to specific customer needs. We also offer standard support services that include 9-5 M-F through to 24/7/365.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We can set you up to consume Azure services within a day. We also offer a full breadth of professional services to support you in building the case for cloud, setting budgets, planning, ensuring a smooth migration, and ongoing support in optimising your new environment. Our experienced business, PMO, and technical resources can provide you with assurance throughout your journey to cloud.
Service documentation Yes
Documentation formats
  • ODF
  • PDF
  • Other
Other documentation formats
  • Word document
  • JPG
  • Visio
  • XLSX
End-of-contract data extraction Customers can extract / export their data at any time.

The method of extraction will usually be determined by the service or application in use. For example, migration of VMs, data mirroring, database export, backup and restore to another location, file copy, or migrating the whole subscription to another provider.
End-of-contract process This is covered within our contract and often influenced or determined through customer's requirements.
Within an agreed period of time as specified within the contract, Shaping Cloud will remove all customer documentation and configuration entries from our systems and cease management activities.
Should a migration to another service provider or platform be required, Shaping Cloud can provide technical and non-technical resources as required. Shaping Cloud will support customers and new service providers with handover and ensure all documentation is up to date to maximise success and ensure service continuity for the customer. Unless this off-boarding support is included within the contract, this support will be classed as a new project.

Using the service

Using the service
Web browser interface Yes
Using the web interface Azure services are available directly through the Microsoft Portal.

Services with Shaping Cloud are available through an appropriate Shaping Cloud self-service portal.
Web interface accessibility standard WCAG 2.1 AA or EN 301 549
Web interface accessibility testing V
What users can and can't do using the API The majority of Azure services are available through APIs for automation and monitoring activities.
Shaping Cloud also have their own integration platform as a service (iPaaS) product, 'SPINR' that connects into all Azure and SaaS APIs, has open APIs, and can connect into on premise and legacy systems and data sets.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
  • Other
Other API automation tools Wide range of 3rd party services
API documentation Yes
API documentation formats Other
Command line interface Yes
Command line interface compatibility Windows
Using the command line interface Almost all features of Microsoft Azure are accessible via Azure CLI (Powershell). This is optimised for managing and administering Azure resources from the command line, and for building automation scripts. See for more details.


Scaling available Yes
Scaling type
  • Automatic
  • Manual
Independence of resources All Azure services are assured with respect to performance.

Shaping Cloud managed services are carefully planned to ensure we can honour our contract and SLAs with customers.
Usage notifications Yes
Usage reporting
  • API
  • Email


Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics Spend
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Files
  • Virtual Machines
  • Databases
  • Images
  • Configurations
  • Determined as required by customer
Backup controls Either directly through the Azure management portals, through our support team, or as determined within the agreed contract.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Users schedule backups through a web interface
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Microsoft provides a detailed description of the their SLA and service credits here:

If you require a higher SLA for certain applications, systems, or workloads, Shaping Cloud can design and implement a service on Azure to meet your exact requirements, e.g. HA.
Approach to resilience Azure is designed and built with resilience to provide assured service levels. For more detail, see:
Outage reporting Microsoft reports all outages through their dashboard and it is possible to enlist for email alerts.

For total service status see

For Shaping Cloud managed services, we provide a variety of options for automatic and manual alerts including web portal, email, telephone, and SMS.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Support channel access is on the basis of named contacts, authenticated via our provided ID system, or trusted ID from client.

Full role based access is available within Azure. This ensures that only those users who are authenticated and authorised can access any Azure or application management features.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 11/01/2019
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes See

for all compliance, certification and audit details

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Shaping Cloud follow ITIL v3 service management framework and continually review and seek to improve services to clients.

We recommend configuration and change management processes to clients and all specific requirements are covered within the contract or SLA.

Azure reviews and updates configuration settings and baseline configurations of hardware, software, and network devices annually. Changes are developed, tested, and approved prior to entering the production environment from a development and/or test environment.

The baseline configurations that are required for Azure-based services are reviewed by the Azure security and compliance team and by service teams.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability scanning is performed on server operating systems, databases, and network devices. The vulnerability scans are performed on a quarterly basis at minimum. Azure contracts with independent assessors to perform penetration testing of the Azure boundary. Red-team exercises are also routinely performed and the results are used to make security improvements.
See for details for more details
Protective monitoring type Supplier-defined controls
Protective monitoring approach Azure security has defined requirements for active monitoring. Service teams configure active monitoring tools in accordance with these requirements. Active monitoring tools include the Microsoft Monitoring Agent (MMA) and System Center Operations Manager. These tools are configured to provide time alerts to Azure security personnel in situations that require immediate action.
Incident management type Supplier-defined controls
Incident management approach Microsoft implements a security incident management process to facilitate a coordinated response to incidents, should one occur.

If Microsoft becomes aware of unauthorised access to customer data that's stored on its equipment or in its facilities, or it becomes aware of unauthorised access to such equipment or facilities resulting in loss, disclosure, or alteration of customer data, Microsoft:

Promptly notifies the customer of the security incident.
Promptly investigates the security incident and provides customers detailed information about the security incident.
Takes reasonable and prompt steps to mitigate the effects and minimise any damage resulting from the security incident.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Third-party
Third-party virtualisation provider Microsoft
How shared infrastructure is kept separate See
for more details

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes
Description of energy efficient datacentres


Price £10.92 per virtual machine
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Trial options available on Azure

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑