Nigsun Limited

Managed Hyper Scale Infrastruture

Compute as a Service provides you with the trusted, connected and flexible cloud platform you need to deliver enterprise and cloud-native applications. Cloud Storage is a secure, massively scalable and very resilient next generation storage platform designed to address a wide variety of use-cases.


  • Hybrid options available
  • Integrate with dedicated or private environments.
  • Select hosting from: AWS, Azure, UKCloud or Google.
  • Resilience through the use of multiple regions
  • Connect over the internet, PSN, HSCN, RLI or JANET.
  • Pay for what you use, scale indefinitely and on-demand


  • Pay for what you use, scale indefinitely and on-demand.
  • Get the resources you need, when you need them.
  • Reduce risk by using proven design blueprints
  • Know where your data is at all times
  • Easy to adopt: test, develop and run proof of concepts.


£4,650 to £4,850 an instance a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

9 7 1 1 9 8 3 2 5 0 0 1 7 4 2


Nigsun Limited Syed Kazmi
Telephone: 02079934030

Service scope

Service constraints
The Services are always available except for:
• scheduled maintenance carried out during a regular maintenance window, such as backups, database administration and log processing.
• Public holidays (in England and Wales) where the service desk will not be manned.
For scheduled maintenance windows we will give customers at least 4 weeks notice, and endeavour to schedule the windows for lower impact time periods. Over any 12 month period, the average maintenance windows will not exceed 4 hours per month.
All users, configurators and administrators will require internet access or connectivity through the government secure internet to the platform.
System requirements
  • EUDs fully patched and protected by up to date AV.
  • Scheduled maintenance carried out during a regular maintenance window.
  • All users require internet access or government network connectivity.
  • All users to sign SyOps and Acceptable Use Policy.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 20 minutes
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
We utilize the ITIL methodology throughout our service, focusing on change, incident, escalation, and problem management. With these core principles and our Lifecycle model we can ensure timely resolution of incidents and permanent eradication of problems identified within our services.

Dependent on the selected Service Tier customers have the option to utilize a Account Manager who has overall responsibility of the end to end delivery, encompassing aspects such as lifecycle technical and commercial.
Support available to third parties

Onboarding and offboarding

Getting started
Nigsun can provide suitable training for standard procedures to customers taking on the service and if required bespoke training can be arranged on request ensuring customers’ proficient use of the service.
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • Microsoft Office
  • CSV or Text Files
End-of-contract data extraction
Customers are able to remove their data at any time through the same means they uploaded. Either over their network or via the AWS Import/Export services.
End-of-contract process
Supplier retain control and ownership of their data. Supplier will not erase customer data for 30 days following an account termination. This allows customers to retrieve content from Supplier services so long as the customer has paid any charges for any post-termination use of the service offerings and all other amounts due.

Using the service

Web browser interface
Command line interface


Scaling available
Scaling type
Independence of resources
Each user operates in a separate instance, provisioned with their own platform.
Usage notifications
Usage reporting


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra support
Organisation whose services are being resold

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
What’s backed up
  • Files
  • Virtual Machines
  • Application
  • Databases
Backup controls
By agreed amendment to the Service Management Plan.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Availability 97.0%. Users are credited a service credit of up to 10% of monthly charge (15% for Enhanced support) if availability falls below this level.
24x7 Access For Enhanced Support and Crisis incidents only
Approach to resilience
Available on request.
Outage reporting
Customer notifications are managed via ticketing system and email alerts.

Identity and authentication

User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
There is no access from User Accounts to management interfaces.
System Admins access management capabilities from dedicated machines connected via an SSTP VPN requiring proprietary Certificates.
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication
Devices users manage the service through
Dedicated device on a segregated network (providers own provision)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
Security Metrics
PCI DSS accreditation date
What the PCI DSS doesn’t cover
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Nigsun operates a management system to ensure that controls are deployed to address business and legislative requirements. This is coupled with a continual internal and external audit programme against international and industry accepted standards for security, with Quarterly management review of progress against targets and metrics and the programme for ensuring employees are aligned and understand their responsibilities to comply the highest standards.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Change management system operational which documents all changes, responsible parties, time of change and senior-level sign off. All changes pass through a Change Advisory Board (CAB)
Vulnerability management type
Vulnerability management approach
Vulnerability scan run once per month and critical vulnerabilities patched within 30 days. Additional vulnerability scan run after any significant change implementation.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Internally designed and developed threat monitoring system is run on all infrastructure.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
The Incident Management, for all the Incidents arising across the Infrastructure and Production managed by Nigsun Incident Management Team. The main activities of incident management are the following:
 Incident detection and recording on NSTICKET.
 Classification and initial support.
 Investigation and diagnosis.
 Resolution and recovery.
 Incident closure.
 Evaluation of incident management process.
 Key Performance Indicators (KPI’s) for major Incidents (P1/P2’s)

ISO27001-complaint processed by 24/7 available team to make it operational ASAP.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
Other virtualisation technology used
Vendor Specific Custom
How shared infrastructure is kept separate
VPC sharing allows customers to share subnets with other accounts within the same Organization. This is a very powerful concept that allows for a number of benefits:

Separation of duties: centrally controlled VPC structure, routing, IP address allocation.
Application owners continue to own resources, accounts, and security groups.
allow reference security group IDs of each other.
Efficiencies: higher density in subnets, efficient use of VPNs, Direct Connect and similar services.
Hard limits can be avoided
Connect connection through simplified network architecture.
Costs can be optimized through reuse of NAT gateways, VPC interface endpoints, and intra-Availability Zone traffic.

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
We use intelligent motion sensors through the premises to ensure that all our office lights, bulbs and equipment are automatically switched off when not in use. All our PCs have Power saving function enabled to reduce carbon emissions. All our offices and datacentre lighting are energy saving. All our radiators are fitted with adjustable controls.
Nigsun DCIM is completely online as we try to reduce paper usage as much as we can. We maintain all our customers and employee records online and upload any related information rather than keeping paper files.

We advise and encourage our domestic and overseas clients to reduce the use of paper by filling online forms and submitting data on our management system. This potentially reduces paper use and carbon miles for postage.


£4,650 to £4,850 an instance a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.