Skip to main content

Help us improve the Digital Marketplace - send your feedback

Sitekit Digital Health

NHS ICS 'Region in a Box'

Support to develop, configure, deploy and support NHS digital cloud services. Includes support for ICSs to establish information sharing environments and enable free movement of staff between organisational boundaries using digital staff passports. Provision of digital staff passports that provide a verified record of identity, employment and other relevant credentials.


  • Core interoperability (e.g. Open-APIs, Record-Location, Event-Management, Longitudinal Record, PHR)
  • Digital Staff Passports (Verified Credentials, Decentralised Identity, Self-Sovereign Identity)
  • Data Services (e.g. De-ID/Re-ID, Data Integration, Data Processing)
  • Information Governance & Security (e.g. Patient Choices, Authentication, IG Impementation)
  • Modern cloud-based architecture
  • Scalable
  • Based on open standards
  • Reference Services (e.g. Metadata-Management, Directory of Services, Master Patient-Index)
  • Digital transformation / onboarding services
  • Training and implementation services


  • Improved movement of staff between NHS Trusts
  • Reduce onboarding costs and improve operational efficiency
  • Support for Integrated Care and integrated workforce
  • Improved care coordination for LTCs/complex conditions
  • Overcome interoperability challenges
  • Improved quantity and quality of information available to citizens
  • Right information provided to health professionals at the right time
  • Real-time access to data to support resource management
  • Enable the delivery of personalised services
  • Successfully deliver digital transformation programmes


£5,000 to £7,500,000 an instance

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

4 4 3 7 4 4 8 2 6 1 9 7 1 2 6


Sitekit Digital Health Lesley Erskine
Telephone: 0131 376 2960

Service scope

Service constraints
There are no specific service constraints buyers are required to know about. Sitekit's solutions are underpinned by Microsoft's Azure Cloud platform, an open, flexible, scalable platform that address specific business and technical requirements for security, performance and operational processes. It allows custom implementations to focus on building out scenarios and applications. Azure provides a rapid, low-cost, low-risk and fail-fast platform for organisations and is backed by a cloud platform with the largest compliance portfolio in the industry.
System requirements
Internet connectivity from the commissioning region's networks

User support

Email or online ticketing support
Email or online ticketing
Support response times
The support provided via the Sitekit Service Desk is via both email and phone, Monday to Friday 9am to 5pm excluding UK bank holidays. Out of hours emergencies are ticketed via our emergency email address, which goes directly to our out of hours support.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
The following provided as standard: 1)Very High: A security breach whereby a third party gains access to personal data or an individual’s account may be compromised. A security alert that is categorised as being critical to data security. In the event of a security breach, the technician will take immediate action to limit further unauthorised access to the Infrastructure Applications. Investigative work to provide a resolution will then commence during Service Hours • Response: 30 minutes • Resolution: 8 service hours 2)High - An error that renders the software inoperative or causes the software to fail catastrophically. • Response: 1 service hour • Resolution: 16 service hours 3)Normal - An error that affects performance of the software and significantly degrades the use of the software. A security alert that is categorised as being medium severity. • Response: 1 service hour • Resolution: Best efforts to obtain resolution in 40 service hours 4)Low - An error that affects performance of the Infrastructure Applications but does not significantly degrade the use of the service. A security alert that is categorised as being low severity. • Response: 1 service hour • Resolution: Best efforts to put resolution in the next software release
Support available to third parties

Onboarding and offboarding

Getting started
Requirements workshop + high-level architecture and envisioning
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
No persistant data is stored by ICS Region in a Box components. Health and care data stored by health and care agencies remain the responsibility of those agencies. Personal health and care data stored in a citizen's Personal Health Record (PHR) remains the responsibility of the citizen.
End-of-contract process
Off-boarding the service does not require any data extraction or removal processes. If an agency terminates the ICS region in a box, all server instances and databases will be stopped; an audit log will be provided to the agency.

Using the service

Web browser interface
Using the web interface
Services are managed via Microsoft's Azure Portal ( This portal gives sufficiently skilled and appropriately authorised users complete control over all aspects of platform set-up and management.
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
None, not applicable - check MS azure portal accessibility
What users can and can't do using the API
Core interoperability services contain a number of APIs which provide standardised access to reference data and IG / security services
API automation tools
Other API automation tools
  • Automated deployment
  • Automated real-time monitoring
  • Automated testing (e.g. Sprinkler for FHIR testing)
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
Command line interface


Scaling available
Scaling type
Independence of resources
ICS region in a box is built on Microsoft's Azure - platform services designed to serve business-critical applications for many millions of users. Uptime is guaranteed by Microsoft SLAs.
Usage notifications
Usage reporting


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
Regular reports


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft Azure Cloud Services

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup controls
According to Microsoft Azure Cloud Backup functionality:
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9% Service credits if Sitekit does not meet this level. Azure services according to Microsoft Azure SLAs:
Approach to resilience
Available on request
Outage reporting
Via Microsoft Azure status portal: Or additional tooling (e.g., Application Insights: An agency may commission Sitekit to monitor and report outages on its behalf.

Identity and authentication

User authentication
Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces and support channels is restricted via username and password.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Centre for Assessment Ltd
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Our statement of applicability covers all the controls defined by ISO27001 with the exception of 14.2.7 Outsourced development and 11.1.6 Delivery and Loading Areas because they do not apply to us.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Sitekit implements an ISO27001 compliant ISMS (Information Security Management System).

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Sitekit maintains an ISO27001 certified configuration and change management process, available on request. As part of Sitekit's SDL (Secure Development Lifecycle) software components / tooling are assessed for suitability - this is recorded in Sitekit's Application Lifecyle Tool Records Report.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Sitekit maintains an ISO27001 certified vulnerability management process, available on request. Sitekit carries out threat-modelling as part of software design under the company's SDL (Secure Development Lifecycle); mitigation actions are then put in place. Sitekit will deploy patches either as part of scheduled software maintenance or immediately when Sitekit becomes aware of a Critical vulnerability. Sitekit runs frequent training sessions on emerging internet security threats.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Sitekit maintains an ISO27001 certified protective monitoring process, available on request. Potential compromises are assigned the highest priority under Sitekit's SLA (Critical) and immediately investigated.
Incident management type
Supplier-defined controls
Incident management approach
Sitekit maintains an ISO27001 certified incident management process, available on request. Users would raise a support request with Sitekit's support desk; Sitekit will investigate the support requests and categorise as an incident if appropriate to do so. Sitekit maintains an ISO27001 compliant incident report template, available on request.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Third-party virtualisation provider
Microsoft Azure
How shared infrastructure is kept separate
Each organisation organisation occupies its own 'tenant' on the Azure platform

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres

Social Value

Fighting climate change

Fighting climate change

As a digital solutions company Sitekit is fundamentally committed to efforts to fight climate change through the reduction of carbon consumption and waste. Sitekit’s technology solutions are geared towards enabling the digitalization of society and the reduction of paper-based business practices that generate waste and unnecessary carbon emissions. For example: • Sitekit’s flagship PHR application, the eRedbook, is designed to digitize the paper-based red book that is given to all new mothers at birth. There are 681,560 live births in the United Kingdom each year, representing a significant reduction in paper waste annually and the associated carbon footprint of the production and distribution chain for the paper red book once the system has been fully scaled nationally. • Sitekit’s system integration solutions for the NHS enables the digital sharing of and access to patient records, allowing for the removal of paper-based workflows and a transition to remote working where possible, with associated carbon footprint and waste reduction benefits. Sitekit takes a cloud-first approach and does not develop or recommend on-premises software solutions except where strictly required. Internet-first cloud-based solutions enable the pooling of resources in data centers and a consolidation of the resources utilised to maintain digital infrastructure.


£5,000 to £7,500,000 an instance
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.