NHS ICS 'Region in a Box'
Support to develop, configure, deploy and support NHS digital cloud services. Includes support for ICSs to establish information sharing environments and enable free movement of staff between organisational boundaries using digital staff passports. Provision of digital staff passports that provide a verified record of identity, employment and other relevant credentials.
Features
- Core interoperability (e.g. Open-APIs, Record-Location, Event-Management, Longitudinal Record, PHR)
- Digital Staff Passports (Verified Credentials, Decentralised Identity, Self-Sovereign Identity)
- Data Services (e.g. De-ID/Re-ID, Data Integration, Data Processing)
- Information Governance & Security (e.g. Patient Choices, Authentication, IG Impementation)
- Modern cloud-based architecture
- Scalable
- Based on open standards
- Reference Services (e.g. Metadata-Management, Directory of Services, Master Patient-Index)
- Digital transformation / onboarding services
- Training and implementation services
Benefits
- Improved movement of staff between NHS Trusts
- Reduce onboarding costs and improve operational efficiency
- Support for Integrated Care and integrated workforce
- Improved care coordination for LTCs/complex conditions
- Overcome interoperability challenges
- Improved quantity and quality of information available to citizens
- Right information provided to health professionals at the right time
- Real-time access to data to support resource management
- Enable the delivery of personalised services
- Successfully deliver digital transformation programmes
Pricing
£5,000 to £7,500,000 an instance
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 4 3 7 4 4 8 2 6 1 9 7 1 2 6
Contact
Sitekit Digital Health
Lesley Erskine
Telephone: 0131 376 2960
Email: lesley.erskine@sitekit.co.uk
Service scope
- Service constraints
- There are no specific service constraints buyers are required to know about. Sitekit's solutions are underpinned by Microsoft's Azure Cloud platform, an open, flexible, scalable platform that address specific business and technical requirements for security, performance and operational processes. It allows custom implementations to focus on building out scenarios and applications. Azure provides a rapid, low-cost, low-risk and fail-fast platform for organisations and is backed by a cloud platform with the largest compliance portfolio in the industry.
- System requirements
- Internet connectivity from the commissioning region's networks
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- The support provided via the Sitekit Service Desk is via both email and phone, Monday to Friday 9am to 5pm excluding UK bank holidays. Out of hours emergencies are ticketed via our emergency email address, which goes directly to our out of hours support.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- The following provided as standard: 1)Very High: A security breach whereby a third party gains access to personal data or an individual’s account may be compromised. A security alert that is categorised as being critical to data security. In the event of a security breach, the technician will take immediate action to limit further unauthorised access to the Infrastructure Applications. Investigative work to provide a resolution will then commence during Service Hours • Response: 30 minutes • Resolution: 8 service hours 2)High - An error that renders the software inoperative or causes the software to fail catastrophically. • Response: 1 service hour • Resolution: 16 service hours 3)Normal - An error that affects performance of the software and significantly degrades the use of the software. A security alert that is categorised as being medium severity. • Response: 1 service hour • Resolution: Best efforts to obtain resolution in 40 service hours 4)Low - An error that affects performance of the Infrastructure Applications but does not significantly degrade the use of the service. A security alert that is categorised as being low severity. • Response: 1 service hour • Resolution: Best efforts to put resolution in the next software release
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Requirements workshop + high-level architecture and envisioning
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- No persistant data is stored by ICS Region in a Box components. Health and care data stored by health and care agencies remain the responsibility of those agencies. Personal health and care data stored in a citizen's Personal Health Record (PHR) remains the responsibility of the citizen.
- End-of-contract process
- Off-boarding the service does not require any data extraction or removal processes. If an agency terminates the ICS region in a box, all server instances and databases will be stopped; an audit log will be provided to the agency.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Services are managed via Microsoft's Azure Portal (https://azure.microsoft.com/en-gb/features/azure-portal/) This portal gives sufficiently skilled and appropriately authorised users complete control over all aspects of platform set-up and management.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- None, not applicable - check MS azure portal accessibility
- API
- Yes
- What users can and can't do using the API
- Core interoperability services contain a number of APIs which provide standardised access to reference data and IG / security services
- API automation tools
- Other
- Other API automation tools
-
- Automated deployment
- Automated real-time monitoring
- Automated testing (e.g. Sprinkler for FHIR testing)
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- ICS region in a box is built on Microsoft's Azure - platform services designed to serve business-critical applications for many millions of users. Uptime is guaranteed by Microsoft SLAs.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
- Regular reports
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft Azure Cloud Services
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- Backup controls
- According to Microsoft Azure Cloud Backup functionality: https://azure.microsoft.com/en-gb/services/backup/
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.9% Service credits if Sitekit does not meet this level. Azure services according to Microsoft Azure SLAs:https://azure.microsoft.com/en-gb/support/legal/sla/
- Approach to resilience
- Available on request
- Outage reporting
- Via Microsoft Azure status portal: https://azure.microsoft.com/en-gb/status/ Or additional tooling (e.g., Application Insights: https://azure.microsoft.com/en-gb/services/application-insights/) An agency may commission Sitekit to monitor and report outages on its behalf.
Identity and authentication
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access to management interfaces and support channels is restricted via username and password.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Centre for Assessment Ltd
- ISO/IEC 27001 accreditation date
- 24/10/2018
- What the ISO/IEC 27001 doesn’t cover
- Our statement of applicability covers all the controls defined by ISO27001 with the exception of 14.2.7 Outsourced development and 11.1.6 Delivery and Loading Areas because they do not apply to us.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Sitekit implements an ISO27001 compliant ISMS (Information Security Management System).
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Sitekit maintains an ISO27001 certified configuration and change management process, available on request. As part of Sitekit's SDL (Secure Development Lifecycle) software components / tooling are assessed for suitability - this is recorded in Sitekit's Application Lifecyle Tool Records Report.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Sitekit maintains an ISO27001 certified vulnerability management process, available on request. Sitekit carries out threat-modelling as part of software design under the company's SDL (Secure Development Lifecycle); mitigation actions are then put in place. Sitekit will deploy patches either as part of scheduled software maintenance or immediately when Sitekit becomes aware of a Critical vulnerability. Sitekit runs frequent training sessions on emerging internet security threats.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Sitekit maintains an ISO27001 certified protective monitoring process, available on request. Potential compromises are assigned the highest priority under Sitekit's SLA (Critical) and immediately investigated.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Sitekit maintains an ISO27001 certified incident management process, available on request. Users would raise a support request with Sitekit's support desk; Sitekit will investigate the support requests and categorise as an incident if appropriate to do so. Sitekit maintains an ISO27001 compliant incident report template, available on request.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- Microsoft Azure
- How shared infrastructure is kept separate
- Each organisation organisation occupies its own 'tenant' on the Azure platform
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- See https://www.microsoft.com/en-us/legal/compliance/energy
Social Value
- Fighting climate change
-
Fighting climate change
As a digital solutions company Sitekit is fundamentally committed to efforts to fight climate change through the reduction of carbon consumption and waste. Sitekit’s technology solutions are geared towards enabling the digitalization of society and the reduction of paper-based business practices that generate waste and unnecessary carbon emissions. For example: • Sitekit’s flagship PHR application, the eRedbook, is designed to digitize the paper-based red book that is given to all new mothers at birth. There are 681,560 live births in the United Kingdom each year, representing a significant reduction in paper waste annually and the associated carbon footprint of the production and distribution chain for the paper red book once the system has been fully scaled nationally. • Sitekit’s system integration solutions for the NHS enables the digital sharing of and access to patient records, allowing for the removal of paper-based workflows and a transition to remote working where possible, with associated carbon footprint and waste reduction benefits. Sitekit takes a cloud-first approach and does not develop or recommend on-premises software solutions except where strictly required. Internet-first cloud-based solutions enable the pooling of resources in data centers and a consolidation of the resources utilised to maintain digital infrastructure.
Pricing
- Price
- £5,000 to £7,500,000 an instance
- Discount for educational organisations
- No
- Free trial available
- No