Cloud Volumes ONTAP (CVO) AWS
NetApp Cloud Volumes ONTAP®, the leading enterprise-grade storage management solution, delivers secure, proven storage management services.
Features
- High Availability - Ensures RPO=0 and RTO<60 secs
- Data Protection - With NetApp Snapshot™ technology
- Storage Efficiencies - Thin provisioning, data compression, and deduplication.
- Data Tiering - Automatically move infrequently-used data to object storage
- Cloning-Create writeable clone volumes instantly and with no capacity penalty
- Cloud Migration - With SnapMirror® replication technology
- Kubernetes Integration - For containerized workloads persistent storage
- BlueXP -UI/APIs for management, supporting hybrid & multi-cloud architectures
Benefits
- Provide High Availability for your cloud applications
- Reduce public cloud storage spend with NetApp CVO for AWS
- Multiple storage consumption models
- ONTAP rapidly and easily provisions and manages cloud storage
Pricing
£0.03 to £0.13 a licence a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 9 8 7 8 9 9 2 7 4 4 8 4 5 0
Contact
NETAPP
Chris Roberts
Telephone: 07920284901
Email: chris.roberts@netapp.com
Service scope
- Service constraints
- Cloud Volumes ONTAP limitations can be found here - https://docs.netapp.com/us-en/cloud-volumes-ontap-9101-relnotes/reference-limitations.html#cloud-volumes-ontap-supports-reserved-and-on-demand-vm-instances
- System requirements
-
- Routing, firewall policies must allow HTTP/HTTPS traffic to specific endpoints
- 5 to 6 Private IP addresses
- Use of Security group rules
- Connector https://docs.netapp.com/us-en/bluexp-setup-admin/task-quick-start-connector-azure.html
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- 24x7 access to Cloud Support Engineers via phone, chat, and web. You can have an unlimited number of contacts that can open an unlimited amount of cases. Response times for general guidance is less than 24 hours, system impaired is less than 12 hours, production system impaired is less than 4 hours, production system down is less than an hour, and business critical system down is less than 15 minutes.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Unknown as this is an AWS service.
- Web chat accessibility testing
- Unknown as this is an AWS service.
- Onsite support
- Yes, at extra cost
- Support levels
-
NetApp SupportEdge Services portfolio for cloud:
Support Edge Base for cloud:
Priority 1: 2 hours
•Priority 2: 4 hours
•Priority 3 or 4: Next business day
Support Edge Advisor for Cloud:
•Priority 1: 30 minutes
•Priority 2: 2 hours
•Priority 3 or 4: Next business day
All details can be found here -
https://www.netapp.com/media/78660-DS-4225-NetApp-SupportEdge-Cloud-Portfolio-datasheet.pdf - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Quick start for Cloud Volumes ONTAP in AWS can be found here -
https://docs.netapp.com/us-en/bluexp-cloud-volumes-ontap/task-getting-started-aws.html - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data can be copied out of the solution at any time via standard file copy means, prior to the expiration of the license. The system warns your 30 days before a license is due to expire.
- End-of-contract process
- Once the license term has expired, the system shuts itself down and ceases to serve data. The data itself is not deleted, so can be recovered by renewing the license, or destroyed by deleting the cloud infrastructure underpinning the virtual storage system.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Full guide how to register, create a case, information to include and how to manage and escalate cases, can be found at https://docs.netapp.com/us-en/bluexp-tiering/task-get-help.html#get-support-for-a-cloud-provider-file-service
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- NetApp provides support for BlueXP and its cloud services in a variety of ways. Extensive free self-support options are available 24x7, such as knowledgebase (KB) articles and a community forum. Your support registration includes remote technical support via web ticketing.
- Web interface accessibility testing
-
This Voluntary Product Accessibility Template (VPAT) provides guidance on the accessibility
characteristics of the NetApp ONTAP® Cloud :
Full details can be found here : https://www.netapp.com/us/media/vpat-netapp-ontap-cloud.pdf - API
- Yes
- What users can and can't do using the API
-
The BlueXP REST APIs use mainstream protocols and standards to provide a flexible foundation for deploying and administering your cloud-based and on-premise resources.
The REST style of application development begins by identifying a set of server-based resources. The resources defined with the BlueXP REST APIs can be broadly categorized as follows:
Storage resources
Used to manage and administer cloud storage resources (for example, Cloud Volumes ONTAP, Azure NetApp Files) as well as on-premises and edge storage resources
Platform resources
Used to manage users, workspaces, accounts, Connectors, credentials in BlueXP control plane
Data resources
Used to protect and create backup of your cloud and on-premises data, manage your licenses and subscriptions to BlueXP - API automation tools
-
- Ansible
- Chef
- OpenStack
- Terraform
- Puppet
- Other
- Other API automation tools
- WorkFlow automation (WFA)
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- Yes
- Command line interface compatibility
- Other
- Using the command line interface
- The ONTAP command-line interface (CLI) provides a command-based view of the management interface. You enter commands at the storage system prompt, and command results are displayed in text.
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- You can use storage quality of service (QoS) to guarantee that performance of critical workloads is not degraded by competing workloads.
- Usage notifications
- Yes
- Usage reporting
-
- API
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- All / Any Data can be backed up.
- Backup controls
- Backups can be done via both manual and automated standard NetApp Back and recovery services.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
AWS currently provides SLAs for several services. Due to the rapidly evolving nature of AWS’s product offerings, SLAs are best reviewed directly on our website via the links below:
• Amazon EC2 SLA: http://aws.amazon.com/ec2-sla/
• Amazon S3 SLA: http://aws.amazon.com/s3-sla
• Amazon CloudFront SLA: http://aws.amazon.com/cloudfront/sla/
• Amazon Route 53 SLA: http://aws.amazon.com/route53/sla/ - Approach to resilience
-
The AWS Business Continuity plan details the process that AWS follows in the case of an outage, from detection to deactivation. AWS has developed a three-phased approach: Activation and Notification Phase, Recovery Phase, and Reconstitution Phase. This approach ensures that AWS performs system recovery and reconstitution efforts in a methodical sequence, maximizing the effectiveness of the recovery and reconstitution efforts and minimizing system outage time due to errors and omissions.
AWS maintains a ubiquitous security control environment across all regions. Each data centre is built to physical, environmental, and security standards in an active-active configuration, employing an n+1 redundancy model, ensuring system availability in the event of component failure. Components (N) have at least one independent backup component. All data centres are online and serving traffic. In case of failure, there is sufficient capacity to enable traffic to be load-balanced to the remaining sites.
Customers are responsible for implementing contingency planning, training and testing for their systems hosted on AWS. AWS provides customers with the capability to implement a robust continuity plan, including the utilization of frequent server instance back-ups, data redundancy replication, and the flexibility to place instances and store data within multiple geographic regions across multiple Availability Zones. - Outage reporting
- Public dashboard; personalised dashboard with API and events; configurable alerting (email / SMS / messaging)
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Username or password
- Other
- Other user authentication
-
AWS controls access via unique user ID/password authentication. No actions are permissible without authentication. Remote access is multi-factor, login attempts are limited, remote administrative access attempts are logged and reviewed by Security. Suspicious activity initiates incident response procedures.
A session lock out policy that is systematically enforced: locks are retained until identification/authentication procedures are concluded.
AWS’s Identity and Access Management (IAM) system controls access to AWS services/resources. IAM facilitates the issuance of access permissions per user/group. MFA is available at no extra cost. - Access restrictions in management interfaces and support channels
-
IAM provides user access control to AWS services, APIs and specific resources. Other controls include time, originating IP address, SSL use, and whether users authenticated via MFA devices.
API calls to launch/terminate instances, change firewalls, and perform other functions are signed by customers’ Amazon Secret Access Key (either the root AWS Account’s Secret Access Key or the Secret Access key of a user created with AWS IAM). Amazon EC2 API calls cannot be made on customers’ behalf without access to customers’ Secret Access Ke.
API calls can be encrypted with TLS/SSL for confidentiality and customers can use TLS/SSL-protected API endpoints. - Access restriction testing frequency
- Less than once a year
- Management access authentication
- Other
- Description of management access authentication
- Management access is via a NetApp Cloud Central account, which is authenticated through an OpenID Provider (we use Auth0 as an identity hub). The application redirects the browser to Auth0, Auth0 authenticates the user and redirects the user to the app with an access_token in the hash fragment of the URI.
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- FIPS-140-2, Common Criteria and DoDIN APL.
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
"ISO/IEC 27001 and ISO/IEC 15408
For further information check the below links:
https://security.netapp.com/certs/
https://library-clnt.dmz.netapp.com/info/web/ECMP1138936.html?&access=a
FIPS-140-2, Common Criteria and DoDIN APL.
https://security.netapp.com/certs/ - Information security policies and processes
-
NetApp is committed to providing its customers with quality products that provide the security posture they require. In pursuit of a continued and supportive relationship, NetApp recognizes that the changing security and threat landscape requires PwC to seek information about NetApp’s Secure Development LifeCycle practices.
NetApp has a comprehensive secure development lifecycle program based on industry best practices which includes, security training, static analysis security testing (SAST), dynamic analysis security testing (DAST), vulnerability scanning, third-party penetration testing and other security practices. NetApp further incorporates certain security features such as encrypted data-at-rest and data-in-motion depending on the system. NetApp’s secure development lifecycle is a journey and continues to be rolled out to achieve maturity.
As part of the development, ONTAP executes various secure development lifecycle practices and determines corrective actions. SAST, DAST, Fuzzing and vulnerability scanning are performed with each release. Pentration testing is performed at least annually.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Changes to AWS services and features follow secure software development practices, including security risk reviews prior to launch. Developer access to production environments is via explicit access system requests, subject to owner review and authorisation.
Teams set bespoke change management standards per service, underpinned by standard AWS guidelines.
All production environment changes are reviewed, tested and approved. Stages include design, documentation, implementation (including rollback procedures), testing (non-production environment), peer to peer review (business impact/technical rigour/code), final approval by authorised party.
Emergency changes follow AWS incident response procedures. Exceptions to change management processes are documented and escalated to AWS management. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
AWS Security performs vulnerability scans on the host operating system, web applications, and databases in the AWS environment. Approved 3rd party vendors conduct external assessments (minimum frequency: quarterly). Identified vulnerabilities are monitored and evaluated. Countermeasures are designed and implemented to neutralise known/newly identified vulnerabilities.
AWS Security monitors newsfeeds/vendor sites for patches and receives customer intelligence via http://aws.amazon.com/security/vulnerability-reporting/.
AWS customers are responsible for all scanning, penetration testing, file integrity monitoring and intrusion detection for their Amazon EC2 and Amazon ECS instances/ applications. Scans should include customer IP addresses (not AWS endpoints). AWS endpoint testing is part of AWS compliance vulnerability scans. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
AWS deploys (pan-environmental) monitoring devices to collect information on unauthorized intrusion attempts, usage abuse, and network/application bandwidth usage. Devices monitor:
• Port scanning attacks
• Usage (CPU, processes, disk utilization, swap rates, software-error generated losses)
• Application metrics
• Unauthorized connection attempts
Near real-time alerts flag potential compromise incidents, based on AWS Service/Security Team- set thresholds. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
AWS adopts a three-phased approach to manage incidents:
1. Activation and Notification Phase
2. Recovery Phase
3. Reconstitution Phase
To ensure the effectiveness of the AWS Incident Management plan, AWS conducts incident response testing, providing excellent coverage for the discovery of defects and failure modes as well as testing the systems for potential customer impact.
The Incident Response Test Plan is executed annually, in conjunction with the Incident Response plan. It includes multiple scenarios, potential vectors of attack, the inclusion of the systems integrator in reporting and coordination and varying reporting/detection avenues.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
The scale of AWS allows them to achieve higher resource utilization and energy efficiency than the typical on-premises data center. Multiple studies conducted by 451 Research found that moving on-premises workloads to AWS can lower customers’ workload carbon footprints by nearly 80% and up to 96% once AWS is powered with 100% renewable energy. AWS infrastructure is 3.6 times more energy efficient than the median of surveyed U.S. enterprise data centers and up to 5 times more energy efficient than the average European enterprise data center.
AWS use advanced modeling methods, such as computational fluid dynamics tools, to optimize our data center design. This allows AWS to understand how a data center will perform before it is ever built, enabling us to optimize for higher reliability and energy efficiency in our systems. Once the data centers are operational, real-time, physics-based models allow us to further improve and optimize our designs. They build these custom models using AWS services and weather datasets from the Amazon Sustainability Data Initiative to predict system performance for sites and track their performance.
Cooling is one of the largest sources of energy usage in AWS data centers and continuously innovating in cooling efficiency.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
NetApp's hardware and software solutions are designed to help customers achieve their sustainability goals, including reducing their carbon footprint and optimising data management to conserve energy and resources. To support the complete product lifecycle management, NetApp focuses on energy-efficient technologies such as deduplication, compression, and compaction that dramatically reduce product footprint, lowering overall energy costs. Similarly, using larger capacity media also reduces customers’ footprint and can significantly impact the energy required to run their data centre(s).
Our packaging is made from 98% recycled/renewable materials and we use 80 Plus titanium power supplies for our hardware. Our e-waste and product take-back (free for all customers) programs (https://www.netapp.com/company/environmental-certifications/e-waste-management), adherence to environmental directives (https://www.netapp.com/company/environmental-certifications/), and the provision of sustainability tools like the NetApp Sustainability Dashboard (https://docs.netapp.com/us-en/active-iq/BlueXP_sustainability_dashboard_overview.html) and the Product Attribute to Impact Algorithm (PAIA) methodology to calculate product carbon footprint, all demonstrate our commitment to protecting our environment and fighting climate change.
For more information about NetApp’s environmental, social, and governance (ESG) initiatives, refer to the following URL https://www.netapp.com/esg. Our 2023 ESG report can be downloaded at https://www.netapp.com/pdf.html?item=/media/79434-NetApp-esg-report.pdf. Our Social Impact efforts include offering employees up to five days paid time off each year to volunteer at approved non-profit organizations from a global database, many of which benefit the environment. Specifically in the UK this year, a team volunteered at a nature reserve to remove an invasive species and sow wildflowers.
To summarize, our solutions adhere to circular economy principles that emphasize product durability, end-of-life management, recyclability, and environmental responsibility. For additional information on NetApp’s sustainability efforts, refer to the following URLs https://www.netapp.com/esg/sustainability/ and https://www.netapp.com/esg/sustainable-technology/.Covid-19 recovery
2021 ESG NetApp’s response to the global pandemic began in January 2020, months before major steps were taken in much of the world launching Thrive Belonging. From matching COVID-related charitable donations to shifting rapidly to remote work, NetApp has taken a mix of steps to keep our teams and communities safe while also delivering products and services uninterrupted.
At the outset, we assembled a company-wide crisis management team to execute our Business Continuity Plan and prepare to mitigate the impact of COVID-19. We put in place measures requiring most of our global workforce to work from home.
Our leadership monitored and managed the situation to mitigate impact to sales, global supply chains, and support and services.
As pandemic risks recede, we’re shifting to a hybrid workplace, a mix of remote and onsite work that promises to deliver a productive balance of engagement and tailored flexibility for employees.
2024 in a COVID-19 recovery world NetApp WX introduced Thrive Together, taking steps such as consultancy with an external organisation to take feedback on how we run an approach to being more present in the office by adjusting the office to meet a post COVID-19 world and taking feedback from internal stakeholders including employees and Employee Business Resource Groups.
While retaining hybrid working, all offices are suitable for social distancing and flexibility is available for those wishing to socially distance such as attending during off-peak times or attending meeting remotely.
In the UK a renovation has taken place to adapt our office to a post Covid-19 based of feedback after a return to the office. NetApp offices have washing and hygiene facilities suitable for all members of staff.
Office workspaces that individuals or groups can also work from flexible across the world booked via a service, including a weekly office day in London.Tackling economic inequality
We believe that community engagement has the power to bring positive, measurable change to our communities. Through our social impact programs, NetApp empowers our people to care for our communities and harness the power of data/AI for good—investing in programs and partnerships that support economic equality and community vitality in the communities where we live and work around the world.
Our social impact initiatives fall into three categories: data/AI literacy, equity, and sustainability. While the demand for data/AI skills will only increase in the years ahead, students experience significant racial gaps when it comes to data literacy. Through our Data Explorers program, we help bridge those inequities and prepare students for the jobs of the future.
Our equity programs focus on expanding access to data/AI skills and careers for underrepresented groups, closing the racial and gender gaps in the data science field and creating career paths. Finally, we work to accelerate data/AI solutions to support environmental sustainability, recognizing the urgent need to address environmental risks—and the employment opportunities that will accompany these new solutions. In addition to these NetApp investments, we also support employee community engagement programs that empower employees to support the causes they are most passionate about—including organizations that tackle inequality and create career and economic opportunities for others. NetApp supports those efforts through paid volunteer time off, matching donations, grants tied to employee volunteering, and more.Equal opportunity
NetApp’s work environment is based upon respect for the individual and their particular talents and qualities. We strive to recognize and optimize each employee’s unique differences and individual contributions to foster an environment where everyone has access to equal opportunity and can thrive in their role here at NetApp. NetApp is an equal opportunity employer and makes employment decisions on the basis of merit. We want to have the best available persons in every job. Our policy prohibits unlawful discrimination based on race, color, creed, sex, gender/transgender status, gender identity, gender expression, religion, marital status, age, citizenship status, national origin or ancestry, physical, physiological and mental health condition, medical condition including but not limited to AIDS/HIV, genetic characteristics, pregnancy, sexual orientation, veteran status, or any other consideration made unlawful by federal, state, or local laws.
This policy includes the prohibition against discrimination against any individual who is perceived to have any of the protected characteristics or is associated with a person who has or is perceived as having any of those characteristics. All such discrimination is unlawful. NetApp adheres to legal requirements by offering reasonable adjustments for individuals with disabilities, enabling them to fulfil their job responsibilities, provided there is no undue hardship. An interactive effort is made to discover and mitigate obstacles, ensuring workplace success. Possible adjustments are identified in collaboration with the person to mitigate any limitations. When an accommodation is feasible and does not cause undue hardship, NetApp will implement it to support an accessible work environment. NetApp is committed to compliance with all applicable laws providing equal employment opportunities. This commitment applies to all persons involved in Company operations and prohibits unlawful discrimination by any NetApp employee.Wellbeing
NetApp are committed to helping employees manage their health and wellbeing. One way we do this is by taking intentional breaks as a company to ensure we come back refreshed and healthy. We have a global Company shutdown at year end (between Christmas & New Year) and three global wellness days during the year to give employees space and time to focus on wellbeing. In addition to this we have a ‘No Meeting Friday’ once per month to allow for uninterrupted focused, productivity time to get work done or to take advantage of the many opportunities NetApp offers for continued career development and growth. We encourage employees not to hold internal meetings (Zoom/Teams, in-person or otherwise) on these days if possible and to use their best judgement for external-facing meetings on these days. NetApp also offers a variety of financial benefits to support financial wellbeing. Employees are eligible for income protection, life assurance and a contributory pension plan.
In the UK, employees have the opportunity to avail of Eyecare tests, dental insurance, private medical insurance and a monthly contribution towards gym membership. Employees also have access to our Employee Assistance Program which supports all aspects of life – physical, financial, emotional and social – through our partnership with Workplace Options, employees can access a variety of resources and confidential support. A Health, Wellbeing & Community Impact team has been set up to creating a supportive environment where we come together to promote physical and mental wellness, foster connections and forge a sense of UK team spirit by connecting employees through health and wellbeing activities and certified ‘mental health first aid’ training.
Pricing
- Price
- £0.03 to £0.13 a licence a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- A 30 day Free trial is available of the CVO product for up to 500GB
- Link to free trial
- https://www.netapp.com/cloud-services/cloud-volumes-ontap/free-trial/