PaaS Application Hosting
Microsoft Azure App Service for website and mobile application hosting. This platform allows for the development of powerful applications for any platform or device meeting rigorous performance, scalability, security and compliance requirements.
Features
- Hybrid cloud service management, PaaS
- Can include Azure Active Directory and Office365 if required
- Monitoring, patching, configuration and optimisation
- Networking, data centre configuration and management
- Service Management underpinned by a Service Level Agreement (SLA)
- Service managed proactively by our ITIL aligned Service Desk.
Benefits
- Specialist Skills from our Cloud Experts
- Public Sector Experience
- Flexibility, the service adapts as your organisation grows and matures
- Lower operating costs, remove the overhead of on-site staff
- Security Cleared Staff maintain Information Security
- Experts with Agile and ITIL Experience, ISO27001 and ISO9001
- Cost Benefits through Flexible Resourcing Model
Pricing
£49.90 an instance a month
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at <removed>@a3edc28e-8a9d-4ef0-a94e-de8baba5abb8.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 10
Service ID
9 9 4 7 2 4 3 1 2 1 3 7 0 1 1
Contact
P2V Systems
<removed>
Telephone: <removed>
Email: <removed>@a3edc28e-8a9d-4ef0-a94e-de8baba5abb8.com
Service scope
- Service constraints
-
Sufficient internet connectivity amd compatible web browser to access Azure portal.
SSL encryption of App Service available at additional cost.
Domain name creation or management not included within service.
Further details available at https://opbuildstorageprod.blob.core.windows.net/output-pdf-files/en-us/Azure.azure-documents/live/app-service.pdf - System requirements
- N/A
User support
- Email or online ticketing support
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support levels range from 1-3. Cost are dependant on individual customer requirements.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- P2V Systems will manage the installation and setup of the service. We can also provide consultation and advice around configuration. On-going Management and support is available.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Prior to terminating the contract, the customer is able to transfer all their data out of the solution.
- End-of-contract process
- Additional costs may apply depending on the quantity of data.
Using the service
- Web browser interface
- Yes
- Using the web interface
- An all-in-one web portal that allows you to build, deploy and manage your Azure cloud resources.
- Web interface accessibility standard
- WCAG 2.0 AA or EN 301 549
- Web interface accessibility testing
- N accordance with EN 301 549. More information available upon request.
- API
- Yes
- What users can and can't do using the API
- Users can connect to the API with an authorised account and manage all aspects of the PaaS Application Hosting. RBAC is applied to the Backup Service and this applies to the API as well.
- API automation tools
-
- Ansible
- Chef
- Puppet
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- All functionality offered by the Azure service can be managed by the CLI
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- SLA, multi tenancy, multiple sites across multiple regions. 99.95% availability Service credits available
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
- Regular reports
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- Files, virtual machines, databases or full disaster recovery
- Backup controls
- The customer will notify P2V Systems of the need for data restoration via our support line. P2V Systems will confirm the disaster recovery invocation with one of the customers’ named contacts and decide on the level of recovery needed; individual file, database recovery or full disaster recovery.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Encryption of data at rest
Availability and resilience
- Guaranteed availability
- 99.95% SLA for uptime.
- Approach to resilience
- Available upon request.
- Outage reporting
- Email alerts and dashboards
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- RBAC using policy of least privilege
- Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
-
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BM Trada
- ISO/IEC 27001 accreditation date
- 31/05/2016
- What the ISO/IEC 27001 doesn’t cover
- A.14.2.7 Outsourced development A.14.2.6 Secure development environment A.14.2.5 System development procedures A.9.4.5 Access control to program source code
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- In compliance with ISO 27001
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- In compliance with ISO 27001/9001
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- In compliance with ISO 27001.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- In compliance with ISO 27001
- Incident management type
- Undisclosed
- Incident management approach
- In compliance with ISO 27001
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- Microsoft
- How shared infrastructure is kept separate
- Different tenancy, subscriptions and network. More information available upon request.
Energy efficiency
- Energy-efficient datacentres
- Yes
Pricing
- Price
- £49.90 an instance a month
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at <removed>@a3edc28e-8a9d-4ef0-a94e-de8baba5abb8.com.
Tell them what format you need. It will help if you say what assistive technology you use.