Skip to main content

Help us improve the Digital Marketplace - send your feedback

Axis12 Limited

Local Authority Council Website Package

An easy way for councils to provide citizens with information and self-service functionality across their services. Designed for Local Authority and Councils, our open-source CMS/digital platform is based on Drupal 8 and backed by our ISO 27001 certification. Device responsive, it includes forms, multiple integration plug ins, and devolved publishing.


  • Open source CMS platform. Includes hosting, deployment and configuration
  • Local Authority on-boarding advice, migration and transition planning
  • ISO 27001 certified and GDPR compliant
  • Templates customisable by non-technical staff that are responsive/accessible
  • Mobile responsive, cross browser compatible and accessible to WCAG2.1 AA
  • Pre-integrated with most back end systems used by local authorities
  • Microsite feature to spin up events etc
  • ISO 27001 certified hosting based in UK ex-nuclear bunkers
  • Devolved publishing and customisable workflow


  • Choose from a list of plug and play features
  • Open source framework means its highly customisable to your needs
  • Multilingual ready
  • UK based


£1,300 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

3 7 3 8 5 1 9 0 0 7 8 7 1 4 9


Axis12 Limited Luke Harrop
Telephone: +44 (0) 203 397 8514

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
24/7 - 365 days a year. Response times within 15 minutes
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Validation from web chat SaaS provider.
Onsite support
Yes, at extra cost
Support levels
Support available to third parties

Onboarding and offboarding

Getting started
A series of onsite discovery sessions to ascertain exact feature set required (can be carried out remotely due to COVID)
User documentation
Online videos of commonly used functionality
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Deliver Code and DB to enable full access to the data contained in the solution for export purposes
End-of-contract process
We will assist in the transfer of your DB to a new hosting provider by delivering a zipped DB
We will also deliver all files and code associated with the solution.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Layout is responsive and optimised for viewing on mobile devices.
Service interface
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Browser based
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Engaged with Shawtrust
What users can and can't do using the API
See for all api's available
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • ODF
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
Open source nature means customisation is unlimited using our development services

Further customisation can be done by non technical client side users and include:
custom layouts
custom data retrieval queries
custom reporting
Custom digital form creation


Independence of resources
Hosted on dedicated cloud-based virtual machine. No sharing of resources or software between clients.


Service usage metrics
Metrics types
Google Analytics 360 Suite
Google Analytics
Google Tag Manager
Google Optimize
Google Data Studio
But can integrate with most analytics packages
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
- a copy of the database is provided
- RSS feeds can be setup
- CSV downloads
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.95% uptime. Support for Level 1 issues and planned Support Requests (Levels 2-5) where agreed in advance. An out-of-hours telephone number is provided for The Customer to escalate any Level 1 issues. The Supplier will respond to and action any Level 1 issues in accordance with the response targets. Hosting and infrastructure issues will be actioned within the resolution targets. Level 1 issues caused by an application or content change made within non-Core hours will be actioned on a best efforts basis. Outages caused by these issues will be exempt from the uptime measurements and Service Level Credit calculations, and the support services may be chargeable.
Approach to resilience
Service resilience is available on request
Outage reporting
Email alerts. Incident reports. Phone calls to clients.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Two factor authentication. IP white list. VPN.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Scope Statement Axis12 ISMS encompasses all aspects of the organisation’s business and operations in support of discharging their obligations as defined in the Service Agreements with their clients from their London site, with hosting services provided in UK based datacentres and Amazon Cloud Services based in EA. This includes software development, hosting, support and training, the provision of consultancy and all other defined service offerings together with the associated supporting business processes. Exclusions Recruitment services are not currently in scope as they are not relevant to our certification.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications
Any other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Axis12 follow ISO27001 information security standards, processes and procedures are audited internally twice yearly per department and once a year externally by the BSI.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Change Control Steps: 1. Documenting the Change Request through Axis12 Change Control system. 2. Formal assessment of change looking at risks, benefits and security impact of making the change evaluated by the Change Approver. 3. The team responsible for the change creates a detailed plan for its design and implementation. 4. The implementation team designs a program for the software change and tests it. If successful a release date is requested. 5. The team implements the program and stakeholders review the change. 6. Final assessment involves requestor and change approver confirming the implementation success/failure and Change Request is closed/reopened.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Axis12 are constantly monitoring the various major alert/information channels for threats to our system. Each threat is classified Critical, High, Low with expected implementation times as follow. - 'Critical’ patches should be deployed within hours - 'High’ patches should be deployed within 2 weeks of a patch becoming available - ‘Low’ patches deployed within 8 weeks of a patch becoming available
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Axis12 have a range of automated and manual approaches to protective monitoring that are constantly being reviewed as new threats are identified within the industry. We work closely with our hosting partners and other industry experts. The exact process is available on request. Incident responses are reviewed and classified in our ‘Security Incident (System)’ and assigned to the appropriate Service Level to the incident with the appropriate level of technical resources to resolve the issue.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Axis12 follow our ISO 27001 policy to incident management. Incidents are recorded in logged in Jira which is then triaged. Once resolved incident reports are provided to the client, providing a summary, analysis, any corrective actions and improvement plans required.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

Our Datacentre partners, Cyberfort Group Limited are committed to promoting sustainable development by reducing, as far as practical, their environmental impacts from business activities. An Environmental Management System (EMS) has been implemented which meets the requirements of BS EN ISO 14001:2015. Our primary emphasis is on improving performance and the prevention of adverse environmental impacts, rather than treatment after occurrence. Priority is given to areas where the environment is most at risk. This policy covers our datacentres and operations including all aspects specific to these activities to ensure our business processes are carefully monitored, measured, and controlled to promote continual improvement whilst enhancing environmental performance. The Environmental Management System helps us protect the environment and response to changing environmental conditions in balance with socio-economic needs. We have adopted a systematic approach to enable us to contribute to sustainable development and have made the following commitments. - Protect the environment by preventing or mitigating adverse effects caused by our activities, products, and services. - Ensuring we fulfil our compliance obligations meeting statutory and regulatory requirements relevant to the environment. - Adopt risk-based thinking and a process approach, reviewing risks and opportunities to help us continually improve and enhance environmental performance. - Promote a sustainable approach in our business, with our suppliers, employees, clients, neighbours, and other stakeholders. - Becoming a net-zero and environmentally conscious company by conserving energy, minimising consumption, reducing, and preferring low pollution materials, maximising environmental efficiency, whilst ensuring waste is managed and controlled. - Controlling or influencing our activities and how our Product and Services are implemented by integrating sustainability considerations into our business decisions. - To adopt management practices and environmental control procedures which comply with the latest version of ISO 14001. - Set documented environmental objectives based on our significant environmental aspects and compliance obligations.
Covid-19 recovery

Covid-19 recovery

Axis12 has policies in place that: - Support our employees in recovering from the impacts of COVID-19, including those worst affected or who are shielding. - Support the physical and mental health of any of our staff affected by COVID-19, including reducing the demand on health and care services. - Improve workplace conditions that support the COVID-19 recovery effort including social distancing, remote working, and sustainable travel solutions.
Tackling economic inequality

Tackling economic inequality

Since our inception, Axis12 has been contributing to local charities tackling economic inequality and hardship through direct action. We are proud sponsors of Camden's streets kitchen initiative donating products and services (like food, sleeping bags, gloves, socks, warm weather gear etc) which is then distributed directly to homeless people during London's worst weather. Our efforts have helped 100's of homeless people over the years with their immediate needs of warmth, food, and clothing.
Equal opportunity

Equal opportunity

Axis12 is committed to the principle of equality among its employees and embraces diversity. We aim to provide equal opportunities for all, regardless of whether individuals are employees, customers, suppliers, agents or otherwise. We firmly believe all employees and job applicants have the right to be protected from unfair treatment and we will only differentiate on merit and the ability to do the job. We aim to provide an equal and fair working environment, which is free from all forms of discrimination. Accordingly, all employees will be treated fairly in respect of any protected characteristics they may have. Protected characteristics are; race, religion and belief, pregnancy and maternity, sex, marriage and civil partnership, disability, gender-reassignment, age and sexual orientation. This policy applies to all areas of employment at Axis12 including; recruitment, promotion, training and development, secondments, transfers, performance management, remuneration, grievance and disciplinary procedures, selection for redundancy and dismissal. Our policy also applies to temporary staff, contractors and consultants and all third parties that we engage with. Unless otherwise stated, all reference to employees includes potential employees, former employees, as well as agency workers, temporary workers and contractors. Our managers are responsible for implementing our Equal Opportunities Policy and for applying the policy as part of their day to day management. All Axis12 employees have a responsibility not to discriminate against fellow employees and to report any such behaviour of which they become aware.


All of our employees are offered a free Vitality package supporting their physical and mental wellbeing as well as free private medical insurance. We are members of the Governments ride to work scheme which subsidises the purchase of aBicycle, and also offer generous maternity and child care packages to our employees well in excess of government mandated pay. We host an annual summer house working opportunity in Europe each year and financially support all employees working from home with additional top up expenses.


£1,300 a unit
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.