Skip to main content

Help us improve the Digital Marketplace - send your feedback

NETBUILDER DIGITAL LTD

HashiCorp Enterprise Suite

HashiCorp offer an ecosystem of tools with the goal of revolutionising datacenter management: application development, delivery, and maintenance.With tools like Consul, Nomad, Vault, Terraform, Packer and Vagrant, HashiCorp offers a complete stack of tools to ensure that you can minimizing the challenges of shipping, rapidly iterating, and securing software applications.

Features

  • Provision,secure,and run any infrastructure for any application
  • Adopt cloud-agnostic approach to provision infrastructure-across private/public-clouds.
  • Centrally secure, store, and control access to secrets
  • Quickly&efficiently deploy applications of any type,on any infrastructure
  • Write, Plan, and Create Infrastructure as Code
  • Create platform specific machine images from single-source
  • Create&Configure portable development environments
  • Vagrant,Packer,Terraform,Vault,Nomad,Consul
  • Flexible hosting options & 24x7 support on urgent issues
  • Government-Streamline government IT infrastructure from end to end

Benefits

  • Code collaboration,review with control,visibility and automated intelligence.
  • Easy workflow,regardless of role-developer, operator,or designer
  • Flexible Workloads,Easily Deploy,Simplify Operations,Increase Density,Reduce Cost
  • Declarative configuration file describe all software requirements
  • Safely&predictably create,change&improve production infrastructure
  • Secures,stores&tightly controls access to tokens,passwords,certificates,API-keys,
  • Secret Storage,Key Rolling,Audit Logs-Handle leasing
  • Service Discovery,Failure Detection,Multi Datacenter,KV Storage
  • Support enables running applications on any cloud,public or private
  • Government-Streamline government IT infrastructure from end to end.

Pricing

£100 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at maxwell.ashley@netbuilder.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 4 3 6 3 9 8 6 2 4 9 6 3 3 8

Contact

NETBUILDER DIGITAL LTD Maxwell Ashley
Telephone: 07481 758650
Email: maxwell.ashley@netbuilder.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Consul,
Nomad,
Packer,
Serf,
Terraform,
Vagrant,
Vault,
Hashicorp.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No
System requirements
Underlying Infrastructure

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Available on request
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
No
Support levels
https://www.hashicorp.com/customer-success/on-prem-support/
Support available to third parties
No

Onboarding and offboarding

Getting started
Initiation. In order to best kick start and setup the service, we come on site to meet the team, give an initial overview of the Managed Service and describe the next steps. Discovery. Once the introductions are completed, we run an initial discovery phase in which we review and validate the scope of the service with the business and technical stakeholders, make an inventory of the resources to support, define a service catalogue, lock down the SLA. On-Boarding. Setup the support, networking and monitoring services, put quality controls in place, check integration points, integrate to the customer business process, trial run end-to-end key use cases and live incidents, start preparing initial knowledge base, grant access etc. Transition. Smoothly switch to the new support service and check hands for an official start. Maintenance and Support. Proactively support and maintain your solution as well as regularly report on its performance.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
Customer data can be copied to a secure repository and source data deleted. There is no additional charge for this service.
End-of-contract process
A high level exit plan is contained within the Managed Service documentation. The exit plan contains instructions as to whether the service is to be ceased or migrated to another third party.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Hashicorp's API aims to cover all functionality of the product. Users are given the expectation that whatever can be done through the browser should have an API counterpart.Hashicorp's API aims to cover all functionality of the product. Users are given the expectation that whatever can be done through the browser should have an API counterpart.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
  • Other
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
Dedicated tenancies are enforced to ensure customer segregation. Therefore one customer service cannot be affected by another customers service.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
HashiCorp

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data can be exported in a format of choice.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
Agnostic of security as Hashicorp tools are deployable by the buyer in their chosen network. Hashicorp tools sit in the buyers network and does not have any connectivity into a network provided by us.
All data is encrypted in transit using HTTPS or SSH.
SSL is sufficient to protect the data in transit
Data protection within supplier network
Other
Other protection within supplier network
Hashicorp has multiple layer of network defences in place, including Border router which also performs stateless traffic filtering, Firewall, and Application proxy.
Logging and monitoring, SIRT investigation, access management, change management, standardised config management.

Availability and resilience

Guaranteed availability
Hashicorp is in full control of the software and therefore availability of Docker is validated and supported to work in specific operating environments as outlined in the support plan.
Hashicorp puts in place rate limiting and DDOS protection technologies and software techniques. As such we apply very rigorous controls around fair usage to guarantee a stable service for everyone
Approach to resilience
Rigorous controls around fair usage to guarantee a stable service for everyone.
Outage reporting
API and
Email Alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access is only granted to within the boundaries that a user, manager or administrator is permitted to operate in.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Alcumus
ISO/IEC 27001 accreditation date
18/07/2023
What the ISO/IEC 27001 doesn’t cover
-
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We align with ISO 27K1

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
• Customer requests change to service or solution: affected systems, possible risks, security risks, and expected implementation to qualified brief. • Service Delivery Manager escalates the request to the engagement team who determines if the change is valid. • Team plans the change. Details recorded about: the expected outcomes, effort estimates, resource profile, timeline, testing, ways to roll back the change, risks including security risks, dependencies and assumptions. • Change approval board (CAB) may need to review the plan. • Team implements the change, documenting procedures and results. • Service Delivery Manager reviews and closes the implemented change.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All vulnerability management is performed in-line with ISO270001 controls.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All vulnerability management is performed in-line with ISO270001 controls.
Incident management type
Supplier-defined controls
Incident management approach
End users (via portal, phone or email), monitoring systems, or service desk describes and logs the incident. Service desk records at a minimum the date and time, reporter name, and a unique ID. Agent labels the incidents with appropriate categorisation. Service desk prioritizes incident based on business impact and urgency. Team diagnoses the incident, services effected, possible solutions. Agents communicate with incident reporters. Service desk team can escalate the incident to the second or third line support. The service desk resolves the service interruption and verifies that the fix is successful. Resolution is fully documented. Service desk closes the incident.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity

Fighting climate change

NETbuilder set a public target set up with SBTi (Science Based Targets) and report on EcoVadis and CDP. We also have ISO 14001 confirming our commitment to improving the environment.

Tackling economic inequality

NETbuilder recruit, employ and train our permanent technical staff per client engagement, often in regional area’s with limited industry. We assess based on attitude and aptitude of the individual, not education alone, which opens up career opportunities to people moving into Digital At a high level we provide:
• Paid full time training so employees do not need to work outside of training hours to support themselves
• Accessible training programmes that are designed to be inclusive, and adopting and utilising different styles, approach and media to support a wide audience and learning styles.
• Objective recruitment processes taking away any potential for unconscious bias. This is managed, tracked and auditable in the SkillsNow platform.
• Localised recruitment to support with local sustainability creating communities and preserving personal and local infrastructure.
• All employees empowered to actively contribute in our journey towards achieving net zero. Sustainability principles are being integrated into our corporate culture and governance procedures.
Uniquely we provide transfer options for our staff to move to customer permanent employment on project handover, or after agreed timelines have been met. This promotes in region investment and increases in skills over time, as well as addressing digital skills gaps in critical technologies, as well as supporting maintenance of legacy applications where necessary.

NETbuilder also provide upskilling and reskilling programmes to support non technical staff cross department/ directorate/ agency transition into CDIO, supporting and aligned to Government Digital and Data Profession Capability Framework . This can be provided as a value add during training of our own staff pre-project deployment, combining customer employees into bootcamps, or as a parallel service and stand-alone initiative.

Equal opportunity

NETbuilder recruit, employ and train our permanent technical staff per client engagement, often in regional area’s with limited industry. We assess based on attitude and aptitude of the individual, not education alone, which opens up career opportunities to people moving into Digital At a high level we provide:
• Paid full time training so employees do not need to work outside of training hours to support themselves
• Accessible training programmes that are designed to be inclusive, and adopting and utilising different styles, approach and media to support a wide audience and learning styles.
• Objective recruitment processes taking away any potential for unconscious bias. This is managed, tracked and auditable in the SkillsNow platform.
• Localised recruitment to support with local sustainability creating communities and preserving personal and local infrastructure.
• All employees empowered to actively contribute in our journey towards achieving net zero. Sustainability principles are being integrated into our corporate culture and governance procedures.
Uniquely we provide transfer options for our staff to move to customer permanent employment on project handover, or after agreed timelines have been met. This promotes in region investment and increases in skills over time, as well as addressing digital skills gaps in critical technologies, as well as supporting maintenance of legacy applications where necessary.

NETbuilder also provide upskilling and reskilling programmes to support non technical staff cross department/ directorate/ agency transition into CDIO, supporting and aligned to Government Digital and Data Profession Capability Framework . This can be provided as a value add during training of our own staff pre-project deployment, combining customer employees into bootcamps, or as a parallel service and stand-alone initiative.

Pricing

Price
£100 a unit a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free trial version for Vault, Terraform, Consul and Nomad.
Yes, for more information, please get in contact.
Link to free trial
https://www.hashicorp.com/products/vault/trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at maxwell.ashley@netbuilder.com. Tell them what format you need. It will help if you say what assistive technology you use.