Local Authority Council Website Package
An easy way for councils to provide citizens with information and self-service functionality across their services. Designed for Local Authority and Councils, our open-source CMS/digital platform is based on Drupal 8 and backed by our ISO 27001 certification. Device responsive, it includes forms, multiple integration plug ins, and devolved publishing.
Features
- Open source CMS platform. Includes hosting, deployment and configuration
- Local Authority on-boarding advice, migration and transition planning
- ISO 27001 certified and GDPR compliant
- Templates customisable by non-technical staff that are responsive/accessible
- Mobile responsive, cross browser compatible and accessible to WCAG2.1 AA
- Pre-integrated with most back end systems used by local authorities
- Microsite feature to spin up events etc
- ISO 27001 certified hosting based in UK ex-nuclear bunkers
- Devolved publishing and customisable workflow
Benefits
- Choose from a list of plug and play features
- Open source framework means its highly customisable to your needs
- Multilingual ready
- UK based
Pricing
£1,300 a unit
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 3 9 9 9 1 9 5 8 0 6 3 4 5 3
Contact
Axis12 Limited
Luke Harrop
Telephone: +44 (0) 203 397 8514
Email: tenders@axistwelve.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- None
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 24/7 - 365 days a year. Response times within 15 minutes
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Validation from web chat SaaS provider.
- Onsite support
- Yes, at extra cost
- Support levels
- TBD
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
A series of onsite discovery sessions to ascertain exact feature set required (can be carried out remotely due to COVID)
User documentation
Online videos of commonly used functionality - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Deliver Code and DB to enable full access to the data contained in the solution for export purposes
- End-of-contract process
-
We will assist in the transfer of your DB to a new hosting provider by delivering a zipped DB
We will also deliver all files and code associated with the solution.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Layout is responsive and optimised for viewing on mobile devices.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Browser based
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Engaged with Shawtrust
- API
- Yes
- What users can and can't do using the API
- See https://www.drupal.org/docs/8/api for all api's available
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- ODF
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Open source nature means customisation is unlimited using our development services
Further customisation can be done by non technical client side users and include:
custom layouts
custom data retrieval queries
custom reporting
Custom digital form creation
Scaling
- Independence of resources
- Hosted on dedicated cloud-based virtual machine. No sharing of resources or software between clients.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Typically:
Google Analytics 360 Suite
Google Analytics
Google Tag Manager
Google Optimize
Google Data Studio
But can integrate with most analytics packages - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
- a copy of the database is provided
- RSS feeds can be setup
- CSV downloads - Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.95% uptime. Support for Level 1 issues and planned Support Requests (Levels 2-5) where agreed in advance. An out-of-hours telephone number is provided for The Customer to escalate any Level 1 issues. The Supplier will respond to and action any Level 1 issues in accordance with the response targets. Hosting and infrastructure issues will be actioned within the resolution targets. Level 1 issues caused by an application or content change made within non-Core hours will be actioned on a best efforts basis. Outages caused by these issues will be exempt from the uptime measurements and Service Level Credit calculations, and the support services may be chargeable.
- Approach to resilience
- Service resilience is available on request
- Outage reporting
- Email alerts. Incident reports. Phone calls to clients.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Two factor authentication. IP white list. VPN.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 02/03/2020
- What the ISO/IEC 27001 doesn’t cover
- Scope Statement Axis12 ISMS encompasses all aspects of the organisation’s business and operations in support of discharging their obligations as defined in the Service Agreements with their clients from their London site, with hosting services provided in UK based datacentres and Amazon Cloud Services based in EA. This includes software development, hosting, support and training, the provision of consultancy and all other defined service offerings together with the associated supporting business processes. Exclusions Recruitment services are not currently in scope as they are not relevant to our certification.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- ISO27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Axis12 follow ISO27001 information security standards, processes and procedures are audited internally twice yearly per department and once a year externally by the BSI.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Change Control Steps: 1. Documenting the Change Request through Axis12 Change Control system. 2. Formal assessment of change looking at risks, benefits and security impact of making the change evaluated by the Change Approver. 3. The team responsible for the change creates a detailed plan for its design and implementation. 4. The implementation team designs a program for the software change and tests it. If successful a release date is requested. 5. The team implements the program and stakeholders review the change. 6. Final assessment involves requestor and change approver confirming the implementation success/failure and Change Request is closed/reopened.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Axis12 are constantly monitoring the various major alert/information channels for threats to our system. Each threat is classified Critical, High, Low with expected implementation times as follow. - 'Critical’ patches should be deployed within hours - 'High’ patches should be deployed within 2 weeks of a patch becoming available - ‘Low’ patches deployed within 8 weeks of a patch becoming available
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Axis12 have a range of automated and manual approaches to protective monitoring that are constantly being reviewed as new threats are identified within the industry. We work closely with our hosting partners and other industry experts. The exact process is available on request. Incident responses are reviewed and classified in our ‘Security Incident (System)’ and assigned to the appropriate Service Level to the incident with the appropriate level of technical resources to resolve the issue.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Axis12 follow our ISO 27001 policy to incident management. Incidents are recorded in logged in Jira which is then triaged. Once resolved incident reports are provided to the client, providing a summary, analysis, any corrective actions and improvement plans required.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Axis12 is fully committed to being Carbon Neutral by 2030 and are on track to reach that target much sooner. All our data centres are powered by 100% renewable energy. Completed Carbon Reduction Initiatives • In the UK we are driving down business travel emissions through virtual collaboration, underpinned by employee training and the roll-out of collaboration tools across the Company • We will move our offices to renewable energy in the UK bringing the total proportion of renewable electricity to 100% by 2023. • We have implemented energy efficiency measures across our UK data centres with Ashbury DC running on 100% renewable electricity and Newbury at 30% with the target of 100% by 2030. Future Carbon Reduction Initiatives • Look to implement an Energy and Environmental Management System (EMS) which is certified under IS014001 and ISO5001 by 2027.
Pricing
- Price
- £1,300 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No