Local Authority Council Website Package
An easy way for councils to provide citizens with information and self-service functionality across their services. Designed for Local Authority and Councils, our open-source CMS/digital platform is based on Drupal 8 and backed by our ISO 27001 certification. Device responsive, it includes forms, multiple integration plug ins, and devolved publishing.
Features
- Open source CMS platform. Includes hosting, deployment and configuration
- Local Authority on-boarding advice, migration and transition planning
- ISO 27001 certified and GDPR compliant
- Templates customisable by non-technical staff that are responsive/accessible
- Mobile responsive, cross browser compatible and accessible to WCAG2.1 AA
- Pre-integrated with most back end systems used by local authorities
- Microsite feature to spin up events etc
- ISO 27001 certified hosting based in UK ex-nuclear bunkers
- Devolved publishing and customisable workflow
Benefits
- Choose from a list of plug and play features
- Open source framework means its highly customisable to your needs
- Multilingual ready
- UK based
Pricing
£1,300 a unit
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
3 7 3 8 5 1 9 0 0 7 8 7 1 4 9
Contact
Axis12 Limited
Luke Harrop
Telephone: +44 (0) 203 397 8514
Email: tenders@axistwelve.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- None
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 24/7 - 365 days a year. Response times within 15 minutes
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Validation from web chat SaaS provider.
- Onsite support
- Yes, at extra cost
- Support levels
- TBD
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
A series of onsite discovery sessions to ascertain exact feature set required (can be carried out remotely due to COVID)
User documentation
Online videos of commonly used functionality - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Deliver Code and DB to enable full access to the data contained in the solution for export purposes
- End-of-contract process
-
We will assist in the transfer of your DB to a new hosting provider by delivering a zipped DB
We will also deliver all files and code associated with the solution.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Layout is responsive and optimised for viewing on mobile devices.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Browser based
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Engaged with Shawtrust
- API
- Yes
- What users can and can't do using the API
- See https://www.drupal.org/docs/8/api for all api's available
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- ODF
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Open source nature means customisation is unlimited using our development services
Further customisation can be done by non technical client side users and include:
custom layouts
custom data retrieval queries
custom reporting
Custom digital form creation
Scaling
- Independence of resources
- Hosted on dedicated cloud-based virtual machine. No sharing of resources or software between clients.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Typically:
Google Analytics 360 Suite
Google Analytics
Google Tag Manager
Google Optimize
Google Data Studio
But can integrate with most analytics packages - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
- a copy of the database is provided
- RSS feeds can be setup
- CSV downloads - Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.95% uptime. Support for Level 1 issues and planned Support Requests (Levels 2-5) where agreed in advance. An out-of-hours telephone number is provided for The Customer to escalate any Level 1 issues. The Supplier will respond to and action any Level 1 issues in accordance with the response targets. Hosting and infrastructure issues will be actioned within the resolution targets. Level 1 issues caused by an application or content change made within non-Core hours will be actioned on a best efforts basis. Outages caused by these issues will be exempt from the uptime measurements and Service Level Credit calculations, and the support services may be chargeable.
- Approach to resilience
- Service resilience is available on request
- Outage reporting
- Email alerts. Incident reports. Phone calls to clients.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Two factor authentication. IP white list. VPN.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 02/03/2020
- What the ISO/IEC 27001 doesn’t cover
- Scope Statement Axis12 ISMS encompasses all aspects of the organisation’s business and operations in support of discharging their obligations as defined in the Service Agreements with their clients from their London site, with hosting services provided in UK based datacentres and Amazon Cloud Services based in EA. This includes software development, hosting, support and training, the provision of consultancy and all other defined service offerings together with the associated supporting business processes. Exclusions Recruitment services are not currently in scope as they are not relevant to our certification.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- ISO27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Axis12 follow ISO27001 information security standards, processes and procedures are audited internally twice yearly per department and once a year externally by the BSI.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Change Control Steps: 1. Documenting the Change Request through Axis12 Change Control system. 2. Formal assessment of change looking at risks, benefits and security impact of making the change evaluated by the Change Approver. 3. The team responsible for the change creates a detailed plan for its design and implementation. 4. The implementation team designs a program for the software change and tests it. If successful a release date is requested. 5. The team implements the program and stakeholders review the change. 6. Final assessment involves requestor and change approver confirming the implementation success/failure and Change Request is closed/reopened.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Axis12 are constantly monitoring the various major alert/information channels for threats to our system. Each threat is classified Critical, High, Low with expected implementation times as follow. - 'Critical’ patches should be deployed within hours - 'High’ patches should be deployed within 2 weeks of a patch becoming available - ‘Low’ patches deployed within 8 weeks of a patch becoming available
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Axis12 have a range of automated and manual approaches to protective monitoring that are constantly being reviewed as new threats are identified within the industry. We work closely with our hosting partners and other industry experts. The exact process is available on request. Incident responses are reviewed and classified in our ‘Security Incident (System)’ and assigned to the appropriate Service Level to the incident with the appropriate level of technical resources to resolve the issue.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Axis12 follow our ISO 27001 policy to incident management. Incidents are recorded in logged in Jira which is then triaged. Once resolved incident reports are provided to the client, providing a summary, analysis, any corrective actions and improvement plans required.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Our Datacentre partners, Cyberfort Group Limited are committed to promoting sustainable development by reducing, as far as practical, their environmental impacts from business activities. An Environmental Management System (EMS) has been implemented which meets the requirements of BS EN ISO 14001:2015. Our primary emphasis is on improving performance and the prevention of adverse environmental impacts, rather than treatment after occurrence. Priority is given to areas where the environment is most at risk. This policy covers our datacentres and operations including all aspects specific to these activities to ensure our business processes are carefully monitored, measured, and controlled to promote continual improvement whilst enhancing environmental performance. The Environmental Management System helps us protect the environment and response to changing environmental conditions in balance with socio-economic needs. We have adopted a systematic approach to enable us to contribute to sustainable development and have made the following commitments. - Protect the environment by preventing or mitigating adverse effects caused by our activities, products, and services. - Ensuring we fulfil our compliance obligations meeting statutory and regulatory requirements relevant to the environment. - Adopt risk-based thinking and a process approach, reviewing risks and opportunities to help us continually improve and enhance environmental performance. - Promote a sustainable approach in our business, with our suppliers, employees, clients, neighbours, and other stakeholders. - Becoming a net-zero and environmentally conscious company by conserving energy, minimising consumption, reducing, and preferring low pollution materials, maximising environmental efficiency, whilst ensuring waste is managed and controlled. - Controlling or influencing our activities and how our Product and Services are implemented by integrating sustainability considerations into our business decisions. - To adopt management practices and environmental control procedures which comply with the latest version of ISO 14001. - Set documented environmental objectives based on our significant environmental aspects and compliance obligations. - Covid-19 recovery
-
Covid-19 recovery
Axis12 has policies in place that: - Support our employees in recovering from the impacts of COVID-19, including those worst affected or who are shielding. - Support the physical and mental health of any of our staff affected by COVID-19, including reducing the demand on health and care services. - Improve workplace conditions that support the COVID-19 recovery effort including social distancing, remote working, and sustainable travel solutions. - Tackling economic inequality
-
Tackling economic inequality
Since our inception, Axis12 has been contributing to local charities tackling economic inequality and hardship through direct action. We are proud sponsors of Camden's streets kitchen initiative donating products and services (like food, sleeping bags, gloves, socks, warm weather gear etc) which is then distributed directly to homeless people during London's worst weather. Our efforts have helped 100's of homeless people over the years with their immediate needs of warmth, food, and clothing. - Equal opportunity
-
Equal opportunity
Axis12 is committed to the principle of equality among its employees and embraces diversity. We aim to provide equal opportunities for all, regardless of whether individuals are employees, customers, suppliers, agents or otherwise. We firmly believe all employees and job applicants have the right to be protected from unfair treatment and we will only differentiate on merit and the ability to do the job. We aim to provide an equal and fair working environment, which is free from all forms of discrimination. Accordingly, all employees will be treated fairly in respect of any protected characteristics they may have. Protected characteristics are; race, religion and belief, pregnancy and maternity, sex, marriage and civil partnership, disability, gender-reassignment, age and sexual orientation. This policy applies to all areas of employment at Axis12 including; recruitment, promotion, training and development, secondments, transfers, performance management, remuneration, grievance and disciplinary procedures, selection for redundancy and dismissal. Our policy also applies to temporary staff, contractors and consultants and all third parties that we engage with. Unless otherwise stated, all reference to employees includes potential employees, former employees, as well as agency workers, temporary workers and contractors. Our managers are responsible for implementing our Equal Opportunities Policy and for applying the policy as part of their day to day management. All Axis12 employees have a responsibility not to discriminate against fellow employees and to report any such behaviour of which they become aware. - Wellbeing
-
Wellbeing
All of our employees are offered a free Vitality package supporting their physical and mental wellbeing as well as free private medical insurance. We are members of the Governments ride to work scheme which subsidises the purchase of aBicycle, and also offer generous maternity and child care packages to our employees well in excess of government mandated pay. We host an annual summer house working opportunity in Europe each year and financially support all employees working from home with additional top up expenses.
Pricing
- Price
- £1,300 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No