HashiCorp Enterprise Suite
HashiCorp offer an ecosystem of tools with the goal of revolutionising datacenter management: application development, delivery, and maintenance.With tools like Consul, Nomad, Vault, Terraform, Packer and Vagrant, HashiCorp offers a complete stack of tools to ensure that you can minimizing the challenges of shipping, rapidly iterating, and securing software applications.
Features
- Provision,secure,and run any infrastructure for any application
- Adopt cloud-agnostic approach to provision infrastructure-across private/public-clouds.
- Centrally secure, store, and control access to secrets
- Quickly&efficiently deploy applications of any type,on any infrastructure
- Write, Plan, and Create Infrastructure as Code
- Create platform specific machine images from single-source
- Create&Configure portable development environments
- Vagrant,Packer,Terraform,Vault,Nomad,Consul
- Flexible hosting options & 24x7 support on urgent issues
- Government-Streamline government IT infrastructure from end to end
Benefits
- Code collaboration,review with control,visibility and automated intelligence.
- Easy workflow,regardless of role-developer, operator,or designer
- Flexible Workloads,Easily Deploy,Simplify Operations,Increase Density,Reduce Cost
- Declarative configuration file describe all software requirements
- Safely&predictably create,change&improve production infrastructure
- Secures,stores&tightly controls access to tokens,passwords,certificates,API-keys,
- Secret Storage,Key Rolling,Audit Logs-Handle leasing
- Service Discovery,Failure Detection,Multi Datacenter,KV Storage
- Support enables running applications on any cloud,public or private
- Government-Streamline government IT infrastructure from end to end.
Pricing
£100 a unit a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 4 3 6 3 9 8 6 2 4 9 6 3 3 8
Contact
NETBUILDER DIGITAL LTD
Maxwell Ashley
Telephone: 07481 758650
Email: maxwell.ashley@netbuilder.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Consul,
Nomad,
Packer,
Serf,
Terraform,
Vagrant,
Vault,
Hashicorp. - Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
- Underlying Infrastructure
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Available on request
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- No
- Support levels
- https://www.hashicorp.com/customer-success/on-prem-support/
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Initiation. In order to best kick start and setup the service, we come on site to meet the team, give an initial overview of the Managed Service and describe the next steps. Discovery. Once the introductions are completed, we run an initial discovery phase in which we review and validate the scope of the service with the business and technical stakeholders, make an inventory of the resources to support, define a service catalogue, lock down the SLA. On-Boarding. Setup the support, networking and monitoring services, put quality controls in place, check integration points, integrate to the customer business process, trial run end-to-end key use cases and live incidents, start preparing initial knowledge base, grant access etc. Transition. Smoothly switch to the new support service and check hands for an official start. Maintenance and Support. Proactively support and maintain your solution as well as regularly report on its performance.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- Customer data can be copied to a secure repository and source data deleted. There is no additional charge for this service.
- End-of-contract process
- A high level exit plan is contained within the Managed Service documentation. The exit plan contains instructions as to whether the service is to be ceased or migrated to another third party.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Hashicorp's API aims to cover all functionality of the product. Users are given the expectation that whatever can be done through the browser should have an API counterpart.Hashicorp's API aims to cover all functionality of the product. Users are given the expectation that whatever can be done through the browser should have an API counterpart.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Other
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- Dedicated tenancies are enforced to ensure customer segregation. Therefore one customer service cannot be affected by another customers service.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- HashiCorp
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be exported in a format of choice.
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
-
Agnostic of security as Hashicorp tools are deployable by the buyer in their chosen network. Hashicorp tools sit in the buyers network and does not have any connectivity into a network provided by us.
All data is encrypted in transit using HTTPS or SSH.
SSL is sufficient to protect the data in transit - Data protection within supplier network
- Other
- Other protection within supplier network
-
Hashicorp has multiple layer of network defences in place, including Border router which also performs stateless traffic filtering, Firewall, and Application proxy.
Logging and monitoring, SIRT investigation, access management, change management, standardised config management.
Availability and resilience
- Guaranteed availability
-
Hashicorp is in full control of the software and therefore availability of Docker is validated and supported to work in specific operating environments as outlined in the support plan.
Hashicorp puts in place rate limiting and DDOS protection technologies and software techniques. As such we apply very rigorous controls around fair usage to guarantee a stable service for everyone - Approach to resilience
- Rigorous controls around fair usage to guarantee a stable service for everyone.
- Outage reporting
-
API and
Email Alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access is only granted to within the boundaries that a user, manager or administrator is permitted to operate in.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus
- ISO/IEC 27001 accreditation date
- 18/07/2023
- What the ISO/IEC 27001 doesn’t cover
- -
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We align with ISO 27K1
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- • Customer requests change to service or solution: affected systems, possible risks, security risks, and expected implementation to qualified brief. • Service Delivery Manager escalates the request to the engagement team who determines if the change is valid. • Team plans the change. Details recorded about: the expected outcomes, effort estimates, resource profile, timeline, testing, ways to roll back the change, risks including security risks, dependencies and assumptions. • Change approval board (CAB) may need to review the plan. • Team implements the change, documenting procedures and results. • Service Delivery Manager reviews and closes the implemented change.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- All vulnerability management is performed in-line with ISO270001 controls.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- All vulnerability management is performed in-line with ISO270001 controls.
- Incident management type
- Supplier-defined controls
- Incident management approach
- End users (via portal, phone or email), monitoring systems, or service desk describes and logs the incident. Service desk records at a minimum the date and time, reporter name, and a unique ID. Agent labels the incidents with appropriate categorisation. Service desk prioritizes incident based on business impact and urgency. Team diagnoses the incident, services effected, possible solutions. Agents communicate with incident reporters. Service desk team can escalate the incident to the second or third line support. The service desk resolves the service interruption and verifies that the fix is successful. Resolution is fully documented. Service desk closes the incident.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
Fighting climate change
NETbuilder set a public target set up with SBTi (Science Based Targets) and report on EcoVadis and CDP. We also have ISO 14001 confirming our commitment to improving the environment.Tackling economic inequality
NETbuilder recruit, employ and train our permanent technical staff per client engagement, often in regional area’s with limited industry. We assess based on attitude and aptitude of the individual, not education alone, which opens up career opportunities to people moving into Digital At a high level we provide:
• Paid full time training so employees do not need to work outside of training hours to support themselves
• Accessible training programmes that are designed to be inclusive, and adopting and utilising different styles, approach and media to support a wide audience and learning styles.
• Objective recruitment processes taking away any potential for unconscious bias. This is managed, tracked and auditable in the SkillsNow platform.
• Localised recruitment to support with local sustainability creating communities and preserving personal and local infrastructure.
• All employees empowered to actively contribute in our journey towards achieving net zero. Sustainability principles are being integrated into our corporate culture and governance procedures.
Uniquely we provide transfer options for our staff to move to customer permanent employment on project handover, or after agreed timelines have been met. This promotes in region investment and increases in skills over time, as well as addressing digital skills gaps in critical technologies, as well as supporting maintenance of legacy applications where necessary.
NETbuilder also provide upskilling and reskilling programmes to support non technical staff cross department/ directorate/ agency transition into CDIO, supporting and aligned to Government Digital and Data Profession Capability Framework . This can be provided as a value add during training of our own staff pre-project deployment, combining customer employees into bootcamps, or as a parallel service and stand-alone initiative.Equal opportunity
NETbuilder recruit, employ and train our permanent technical staff per client engagement, often in regional area’s with limited industry. We assess based on attitude and aptitude of the individual, not education alone, which opens up career opportunities to people moving into Digital At a high level we provide:
• Paid full time training so employees do not need to work outside of training hours to support themselves
• Accessible training programmes that are designed to be inclusive, and adopting and utilising different styles, approach and media to support a wide audience and learning styles.
• Objective recruitment processes taking away any potential for unconscious bias. This is managed, tracked and auditable in the SkillsNow platform.
• Localised recruitment to support with local sustainability creating communities and preserving personal and local infrastructure.
• All employees empowered to actively contribute in our journey towards achieving net zero. Sustainability principles are being integrated into our corporate culture and governance procedures.
Uniquely we provide transfer options for our staff to move to customer permanent employment on project handover, or after agreed timelines have been met. This promotes in region investment and increases in skills over time, as well as addressing digital skills gaps in critical technologies, as well as supporting maintenance of legacy applications where necessary.
NETbuilder also provide upskilling and reskilling programmes to support non technical staff cross department/ directorate/ agency transition into CDIO, supporting and aligned to Government Digital and Data Profession Capability Framework . This can be provided as a value add during training of our own staff pre-project deployment, combining customer employees into bootcamps, or as a parallel service and stand-alone initiative.
Pricing
- Price
- £100 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Free trial version for Vault, Terraform, Consul and Nomad.
Yes, for more information, please get in contact. - Link to free trial
- https://www.hashicorp.com/products/vault/trial