Trust Cloud
The Service provides a production ready Infrastructure as a Service (IaaS) offering to clients, using Hyper-Converged, Edge Landing, intermediate Local Area Network (LAN) and Firewall technologies.
Trust provides a Bronze Monitoring and Reporting Managed Service. Additional services are available via LOT3 Trust Cloud managed Silver and Gold.
Features
- Hyper Converged environment using Nutanix Hypervisor, via Secure IPsec VPN
- Dedicated environment is not multi-tenanted
- Solution sized for 75 VM’s using
- Redundancy factor RF2 by default
- Product tier CPU & RAM utilisation max with N+1
- Disk customisable
- Designed for 4vCPU:1Core utilisation
- 150GB Cold Data and 25GB Hot data per VM
- Self Service Portal provides pre-configured BluePrint/API deployment scripts
- Self Service for management, ISO templates and Performance data
Benefits
- Nutanix Acropolis Hypervisor (AVH) and Self-Service Portal (SSP) included
- Dedicated environment not multi-tenanted
- Bronze Managed Service for Monitoring, Reporting and Service Desk included
- Crown Hosting UK Location Secure Government Security Classifications standards
- Nutanix default security baselining (with auto-remediation)
- Nutanix Security Technical Implementation Guide (STIG) included in platform operations
- Self Service Portal provided by Nutanix Prism Central and CALM
Pricing
£8,500.69 an instance a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 7 0 6 2 6 1 0 6 6 2 8 6 3 5
Contact
Trust Systems Ltd
Trust Sales
Telephone: 01285 898054
Email: cloud.sales@trustsystems.co.uk
Service scope
- Service constraints
-
Trust Cloud provides a "Template" sized dedicated HCI environments for client workloads reference Trust Cloud Hosting service description.
Customers to provide and perform:
-VM OS update toolsets
-VM OS update management
-Option Bring Your Own Licensing (BYOL) VMware licenses are required; Customer must provide Trust access to the appropriate licensing portals to obtain patches
-Where BYOL has been provisioned for Windows or Linux services, the customer is responsible for VM OS support.
-Planned Maintenance to be advised as in the Service T&Cs
-Access via SSP is limited in relation to the underlying infrastructure provisioned on the nodes of the cluster - System requirements
-
- Customers provide BYOL for Operating System and Applications
- Anti-Virus must be provisioned by customer (Bronze service)
- Additional Trust Cloud services including Anti-Virus are available via LOT3
- Internet landing implemented via IPsec VPN by default
- Direct NW presentation e.g., WAN need design engagement LOT3
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Trust provides a Bronze Monitoring and Reporting Managed Service. This includes Service Desk ticketing and email support.
This provides 30-minute initial response, resolution target is subject to incident severity grading.
Service desk email and ticketing support to 24x7x365 (subject to agreed service level) with no change in response time outside of normal business hours.
A web interface is available to customers to raise, view and manage current and historic incidents and changes. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- None
- Onsite support
- Yes, at extra cost
- Support levels
-
Trust Cloud Hosting includes 'Bronze' Support. The cost for this Managed Service is included in the IaaS monthly cost. (See LOT1 Price document)
1. Managed Infrastructure platform, including:
a. All patching
b. Support of infrastructure (hardware and software) by Cloud Support Engineers
c. Hardware Break-Fix management of All components
d. Minor and major upgrades for all elements
e . Configuration transparent to customer
2. Managed Firewall and network configuration, with changes made based on default change package included with service - additional available under LOT3 when base provision exhausted
Additional levels of Managed Service are available via LOT3 Trust Cloud Enhanced Silver and Gold Services. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
The onboarding service will include:
1. Identify requirements for platform to be running, including VMISO template uploads
2. Identify existing migration requirements, and offer additional services to assist with:
a) Migration of VM’s onto platform
b) VM creation/setup
3. Onboarding Familiarisation process (2-hour process):
a) Remote based session overview of the management platform, with tutorial of activities including basic remote login, through to deploying, managing IaaS objects and of viewing utilisation
b) Setting up new objects, IaaS object removal
4. Standard documentation overview, handover of documents to customers, documentation of setup customer specific platform (including end to end specification)
In addition, the managed service operations:
1. Support contacts
2. Support Portal interface
3. Support documents
4. Service Delivery Manager contacts, and support escalation contacts
5. Service Delivery approach, reviews
6. Service Transition including Service Operational Runbooks - Service documentation
- Yes
- Documentation formats
-
- ODF
- End-of-contract data extraction
-
A Customer ‘exit’ project is started, after notice is served. If the customer requires data secure removal and migration off the IAAS platform the process is:
-Identify size of requirement/approach (WAN copy/local copy)
-Confirm the scope of Professional Services engagement (including day estimate)
For customers wishing to remove data:
1. Formal Service Transition manager project initiated closing all setup service elements and dealing with transition exit according to ITIL framework with checklist of activities
2. Quote for required services Professional services from Rate Card
3. Copy option:
3a. Customer given access to copy VM’s remotely over WAN
3b. Trust Consultancy locally copy data to removable/portable storage media (customer supplied device)
4. HCI IAAS platform erased using Blancco software drive eraser with proof provided via certificate.
Customer not requiring secure wipe (satisfied by Nutanix erase operation on data):
1. As per item 1, 2 and 3 above
2. Data erased using Nutanix native consoles by Trust - End-of-contract process
-
Trust will perform exit according to industry best practice:
Exit is project managed by a Service Transition Manager **
Agreed extraction and data wipe timescale
Charges for use of any data software (Blancco)
Data off boarding copy local or via network transfer
Network and Service decommissioning **
Scope of effort and quote provided for exit
Exit will provide time for customers to ‘move’ any data from the system to their own within reasonable limits
Trust will assist with the exit approach if required **
Trust will perform an exit meeting to identify reasons for exit
**Additional charge applies to professional services engagement
For a customer exiting the platform, options are available for data removal from the systems, Trust will use a COTS solution to erase data from the platform disks. The cost of this exit is an additional service cost .
Additional costs:
Service Transition Manager
Professional services to assist with exit
Certificated Data wipe
Secure data copy local device at DC
Using the service
- Web browser interface
- Yes
- Using the web interface
-
The service includes a web portal for provisioning virtual machines and managing these via a console. Three base sizes of Virtual Machines (VM) can be provisioned on Windows and Linux, with the customer able to expand required configurations. The platform allows the customer to bring own base ISO images if needed (Optional Migration Service required as per LOT3).
1. The toolset supports 500 projects
2. There is a Web interface and API
3. Security is via local account or Lightweight Directory Access Protocol (LDAP) to customer LDAP if customer requires/allows
4. The SSP Web service uses a base HTTP that redirects to HTTPS; users authenticate and are directed to specific ‘project’
5. This is a Commercial off the Shelf (COTS) product widely used for such purposes provided by Nutanix. The web interface will use a public vendor provided SSL certificate for security (as will all customer facing solutions utilizing SSL systems). - Web interface accessibility standard
- WCAG 2.1 A
- Web interface accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
-
Nutanix REST APIs allow creation of scripts to run administration commands. The APIs use HTTP requests using get/post/put (etc) to query and make changes to VMs i.e. create, list VM’s, setting categories, modifying configuration, cloning/snapshotting, power changes and deletion. Output from the commands is in JSON.
Multiple API automation tools can be used, Users are only limited by the supported implementation of the Nutanix REST API version and these tools. Trust do not support setup/usage in the managed service, this would be professional services support under LOT3. Trust provide HTML documentation.
Other Tools:
• Go e.g. Creating multiple VM clones
• PowerShell (Default PowerShell installation with Nutanix commandlets will allow scripts to be run)
• Python (scripts utilise requests, urllib3/getpass/argparse/json)
• JSON (Using application e.g. Postman, using JSON scripts for API requests)
• BASH - Scripts are standalone and run without dependencies. Scripts utilise jq, (free sed-like JSON processor)
• PHP (Requires PHP 7.2 or later and are complete, standalone scripts carrying out common API operations)
• Microsoft C# (Code samples utilise Newtonsoft.Json, a JSON framework for .NET).
Access in CALM DSL and operations are limited to the permissions assigned to users, which is limited to only IAAS operations. - API automation tools
-
- Ansible
- Terraform
- Other
- Other API automation tools
-
- Python
- Powershell
- PHP
- BASH
- JSON
- GO
- API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Manual
- Independence of resources
-
Trust Cloud uses a dedicated Hyperconverged Infrastructure (HCI) environment to ensure clients are not impacted by the demands of other users on the system.
Trust Cloud uses FortiGate firewall products which will allow for rate limiting of the segmented workloads using Traffic Shaping. The system will be set-up to have up to 10 customers sharing a pair of physical FortiGate devices, and the source/destination interface paths will be configured with traffic shaping according to the limits of the ingress bandwidth service or a 10th share of the overall bandwidth to the upstream LAN switches, whichever is the greatest. - Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
- Software encryption Leveraging a NIST certified FIPS 140-2 level 1 compliant encryption module
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- Virtual Machines
- Backup controls
-
Base Nutanix system snapshots (stored locally on the cluster) once per day, per IAAS VM
Customer self-restore capability
Off box backup can be provided via Lot3 Trust Cloud Managed services.
Snapshots have a removal of 30 days using GFS model:
Daily backup – 7 for 1 week
Weekly backup – 4 for 30 days
Backups will be setup via initial onboarding for Scheduling.
Backups will be scheduled via the SSP (Self Service Portal)
Restores provided by cloning a second VM from a snapshot
The customer to maintain supported OS and backup scripts. - Datacentre setup
- Single datacentre
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- Customer can connect via any IP connectivity option that is secure, examples include MPLS, SD-WAN
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
99.9% availability on the TrustCloud platform as standard.
Where:
“Availability" = ((Total Uptime - Total Downtime) / Total Uptime) x 100
"Total Downtime" = the total amount of time (in minutes) where there is a complete loss of the defined service.
"Total Uptime" = the total number of minutes in the relevant Service Measurement Period.
Service Credits Payable where the Supplier fails to meet the Target Availability:
4hrs or less: None
In excess of 4 hours but not greater than 10hours: 1% per hour*
In excess of 10 hours: 15%*
*Percentage of the monthly equivalent of Trust Cloud - Approach to resilience
- Available on request .
- Outage reporting
- The Trust Service Desk monitor the platform 24x7x365 through various toolsets (PRTG/Auvik/Nutanix/AlertLogic). The service desk provide 30minute response SLAs to all alerts/events from these tools. On receipt of a service affecting event an incident will be created and email alerts sent to affected clients. The normal incident management process determines update frequency and resolution targets based on incident severity. For example, a P1 incident receives 30minute status updates.
Identity and authentication
- User authentication
-
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
- LDAP Integration for username/password authentication
- Access restrictions in management interfaces and support channels
-
Trust Management Service and support Teams use Duo two factor authentication with AD authentication to access the RDS support VM’s. From there, they must provide named access with LDAP authentication to the individual systems access:
1. OpenGear – used via RADIUS, AD and NPS to access all console ports and IPMI ports on the Nutanixs
2. Network switches, IPMI ports, OOB management – integrated into the management Active Directory via NPS Services
3. OpenGear uses authentication and logging via AD
4. Management VMs – accessed via the management network from the support VM’s only, with AD to authenticate users - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 31/08/2021
- What the ISO/IEC 27001 doesn’t cover
- Trust Cloud environments not in Node4 are not covered until recertification in 6th August 2024. Remediation is in place to achieve this.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Trust Systems operate an Information Security Management Forum (ISMF) to govern ISO and Compliance standards with the business monthly. This reviews Security policy and process from the staff to the Senior Leadership and Operations Leadership. The ISMF ultimately is represented at the main board to report ISO27001 items such as Risk Register and Security Incidents.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Customer changes must be raised through our RFC form. Only customer authorised contacts can raise RFCs to Trust. A request from an unauthorised contact will be referred to the service owner. Changes include the following which are communicated to the directly affected customer:
-Firewall changes (access list change to policy)
-Upgrades to customer platforms (new nodes)
-Changes to existing nodes (e.g. more RAM)
Trust Changes:
Major Feature updates, System upgrades (e.g. replacement for EOL hardware).
Changes to configurations will be raised on change management platform and assessed for potential security impact. Trust will communicate according to the defined Change process. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Vulnerability and Threat Management will be in conjunction with Trust Systems partner AlertLogic. AlertLogic will scan for known vulnerabilities and notify Trust Systems of issues on a daily basis. Trust will then analyse vulnerabilities and evaluate an appropriate response.
Trust Systems will adhere to Cyber Essentials + and patch within 14 days of patch release aa per this framework. Any specifically raised high priority threats will be mitigated by the Service Desk team as a P1 with urgent priority. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Trust Systems subcontractor AlertLogic will provide a Threat Monitoring and Management Service; Where an Intrusion Event is detected a process exists where Trust Systems will be notified according to, subject to the SLA, 24/7 Security Operations and required technology to monitor for threats and escalate them to customers. Scanning will include:
1. PCI Scanning for vulnerabilities
2. File Integrity Monitoring
3. Network Monitoring
4. Log Data Monitoring
5. Log Analysis
6. Log Collection & Search with 12 Month Retention
7. Web Log Analytics - Incident management type
- Supplier-defined controls
- Incident management approach
-
Trust follows the SANS Institute incident response principals for security incidents reported via the service desk.
Prepare—establish security policies, carry out risk assessments, determine which assets are sensitive and establish an incident response team.
Identify—monitor systems to detect anomalous activity, identify security incidents or threats.
Contain—conduct short-term containment procedures to stop the spread of the threat e.g. apply fixes
Eradicate—identify the root cause of the incident, remove malware and implement measures to prevent future attacks.
Recover—restore your production systems and apply measures for preventing further attacks.
Learn—perform analysis following an incident with documentation via PDF to the client.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- Fortigate Virtualised Firewalls
- How shared infrastructure is kept separate
-
Compute is physically separated. Trust implements virtualisation only for the network. Fortigate Virtualised firewalls are used to segregate traffic between clients via firewall policy and individual client VDOMs. The clients are ‘landed’ through shared WAN connectivity on an IP address on the Fortigate firewall. Additionally the Mellanox switches support 802.1q Virtual Local Area Network segmentation.
In the self service portal user configuration and information is managed via software level constructs known as ’project’, where each customer is a project, and all resources can only be access by that project. Users must separately authenticate against the portal to access their projects.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Energy efficiency is part of both Crown Hosting’s ISO 14001 and ISO 50001 certifications and management systems and is addressed in how DCs are designed. Also, contractual obligations with client and/or suppliers, guidance in documents such as rules for working in a DC as well as other requirements such as part of our CCA/CCL agreements in terms of energy efficiency.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
Trust Systems has registered for ISO14001, undergone an External pre-Audit for the full Audit in July 2024. We recognise our responsibility to the environment beyond legal and regulatory requirements. We are committed to complying with all legislation and relevant regulations, reducing our environmental impact and continually improving our environmental performance as part of our business strategy and operating methods. We will encourage customers, suppliers and other stakeholders to do the same. All employees have a responsibility to ensure this policy is met. We endeavour to: 1. Paper • Minimise the use of paper in the office. • Reduce packaging as much as possible. • Seek to buy recycled and recyclable paper products. • Reuse and recycle all paper where possible. 2. Energy and Water • Reduce the amount of energy used as much as possible. • Switch off lights and electrical equipment when not in use. • Adjust heating with energy consumption • Take energy consumption and efficiency of new products into account 3.Office Supplies • Evaluate the environmental impact of any new products. • Favour more environmentally friendly and efficient products where possible. • Reuse and recycle everything we can. 4.Transportation • Promote the use of travel alternatives. • Make additional efforts to accommodate those using public transport or bicycles. • Offer employees an Electric Vehicle (EV) scheme Culture • Work in consultation with staff and stakeholders where necessary. • Work with suppliers, contractors and subcontractors to improve their environmental performance. • Use local labour and materials where available to reduce CO2 and help the community. Our chosen data Centre operator is ISO14001 certified and is committed to: Climate Neutral Data Centre Pact Supporting HMG to achieve Carbon Net Zero Their Staff - Investors in People Platinum Committed to training future staff - partnering with UTC HeathrowEqual opportunity
Trust Systems is committed to a policy of treating all its employees, workers and job applicants equally. No employee or potential employee will receive less favourable treatment because of any 'protected characteristic', namely age (or perceived age); disability (past or present); gender reassignment; marriage or civil partnership status; race, colour, nationality, ethnic or national origins; religion or belief; sex; sexual orientation; and part-time or fixed term status. No employee or potential employee will be disadvantaged by any conditions of employment that cannot be justified as necessary on operational grounds. Trust Systems aims to encourage, value and manage diversity and is committed to equality for its entire staff. Trust Systems wishes to attain a workforce which is representative of the communities from which it is drawn. These principles of equality of opportunity and non-discrimination also apply to the way our staff treat customers, our business partners and visitors. Our equal opportunities policy is a commitment to make full use of the talents and resource of all its employees and to provide a healthy environment which will encourage good and productive working operations within the organisation. The policy is to be applied throughout Trust Systems, including recruitment and selection; promotion, appraisal, transfer and training; terms of employment, benefits, facilities and services; grievance and disciplinary procedures; and dismissals, resignations and redundancies. Trust Systems will ensure that all managers and supervisors with responsibility for any of the areas of particular concern are provided with the appropriate equality and equal opportunities training necessary. Other staff may also be required to attend equal opportunities training. There should be no discrimination, whether direct or indirect, because of any of the protected characteristics set out in Trust Systems’ statement of principle on equal opportunities set out above.Wellbeing
Trust Systems is committed to protecting the health, safety and welfare of its employees, promoting well-being and positive mental health for all its staff, and tackling the causes of stress and work-related mental ill health. We aim to promote a positive working environment where: 1. Well-being of employees is a priority. 2. We work with employees to promote the physical and mental health of all employees. 3. All staff feel able to talk openly about their mental health and not fear discrimination if their condition is a disability or bullying or harassment. 4. People with mental health issues could participate in the workplace. We recognise that stress in the workplace is a health and safety issue and acknowledges the importance of identifying and reducing the causes of workplace stress. We also recognise that an employee’s performance or behaviour can be affected if they are experiencing mental ill health, and that appropriate support and adjustments should be explored before considering any formal measures such as disciplinary action. This policy applies to all staff, including employees, temporary and agency workers, other contractors, interns, volunteers and apprentices. Managers are responsible for implementation and Trust Systems is responsible for providing the necessary resources.
Pricing
- Price
- £8,500.69 an instance a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Trust cloud Proof of Concept is a cut down functional version of the service with reduced SLA and Services. Available on request.