Insight - SADA Google Cloud Platform Services
Google Cloud Platform (GCP) is a suite of cloud computing services offered by Google, providing organisations with access to scalable and reliable infrastructure, data storage, machine learning, and application development tools. It enables businesses to build, deploy, and manage applications and services efficiently and securely in the cloud.
Features
- (PaaS): Managed platform, application development, deployment.
- Virtual machines for running applications flexibly
- Container Service: Managed Kubernetes for container orchestration.
- Relational Database: Managed SQL database services, scalable.
- Data Warehousing: Large-scale data analysis, reporting and AI/ML capabilities
- Networking: Scalable, global network infrastructure services.
- Logging and Analysis: Capture, store, analyze log data efficiently.
- Infrastructure and Platform Security: Secure infrastructure, applications, data management.
- Intrusion detection - Planet scale evaluation, monitoring and protection threats
- Object Storage: Scalable storage for data archiving, online access.
Benefits
- (PaaS): Rapid development, deployment, no infrastructure management.
- Flexible scaling, cost-effective, broad OS and software support.
- Container Service: Easy Kubernetes management, portability, automatic scaling.
- Relational Database: High availability, strong consistency, automated backups.
- Data Warehousing: Fast analytics, scalability, integration with machine learning tools.
- Networking: Global reach, private connectivity, highly secure, low latency.
- Logging and Analysis: Real-time monitoring, troubleshooting, operational efficiency.
- Infrastructure and Platform Security: Comprehensive compliance, data protection, secure access.
- Intrusion detection - Planet scale evaluation, monitoring and protection threats
- Object Storage: Unlimited scalability, worldwide access, low-cost archiving.
Pricing
£0.01 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 5 4 1 7 5 4 9 2 5 4 9 0 6 0
Contact
Insight
Public Sector Tender Team
Telephone: 0344 846 3333
Email: pstenderteam@insight.com
Service scope
- Service constraints
-
These GCP services generally face constraints related to region-specific availability, varying performance levels depending on configuration, and potential downtime due to maintenance. Support for specific hardware, particularly for older or less common types, might be limited, impacting integration and performance. Additionally, data transfer speeds and costs can vary, and scalability might introduce complexities in management and costs. Security and compliance needs may also dictate particular configurations that could limit service flexibility.
To mitigate against these infrastructure constraints, various architectural mitigations can and should always be put in place to meet appropriate requirements for availability, resilience and performance. - System requirements
-
- GCP users must only have a supported operating system
- And current version of a web browser to access GCP
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Our standard SLAs/SLOs are as follows:
Priority 1 - 15 minute response
Priority 2 - 2 business hours
Priority 3 - 4 business hours
Priority 4 - 8 business hours - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- None
- Onsite support
- Onsite support
- Support levels
-
Support can be provided using customer systems such as Google Meet, Slack or Microsoft Teams as required by the project.
Additional information is provided as part of the 'Google Cloud Services - Enterprise support services' submission"
SADA's user support services for Google Cloud are outlined in the 'Google Cloud Services - Enterprise support services' submission - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
GCP provides online training (Qwiklabs/Codelabs), Documentation and in console tutorials.
SADA provide in depth onboarding assistance to any new customers, and can also advise on and build best practice foundation / landing zone environments as part of the SADA managed services offering. For more details please see the appropriate submissions. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Google Cloud provides data migration tooling for each service for customers to extract their data at the end of a term
- End-of-contract process
- At the end of a contract, any discounts expire and customers pay list price on a monthly rolling basis for each service should they choose not to extend. The majority of services are utility billed by storage volume / hour / utilisation based, although committed use discounts and SKUs are also available which will be billed until the end of the appropriate term.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Roles determine the actions users can perform. Such that only network users may be permitted to access the GCP Network account, and only security may be permitted to access the Audit Logging account etc.
Typical users would have individual Roles allocated based on job function, and would generally access GCP workload accounts and may be further restricted on what services they can deploy or access within those accounts.
All access would be determined as part of a Role Based Access Control (RBAC) process. - Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- Please refer to Google Cloud's accessibility documentation available at https://cloud.google.com/docs/accessibility
- API
- Yes
- What users can and can't do using the API
- Each Service in Google Cloud has its own API. Users can interact with API's through command lines or SDK's provided by Google Cloud. Each API has its own functionality, quota and limitations which is set by Google. Please refer to documentation available at https://cloud.google.com/apis?hl=en
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- Other
- Other API automation tools
-
- Pulumi
- GCP CDK (Python, typescript, javascript, C# etc)
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
-
The latest GCP CLI and software SDK is available at:
https://cloud.google.com/sdk/gcloud
Once done the Buyer would then configure the CLI : https://cloud.google.com/sdk/docs/initializing
SADA can provide support on best practice initial configuration and usage including role based access control and security recommendations.
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Google Cloud Platform (GCP) ensures users are not affected by others' demand through resource isolation, scalable infrastructure, and load balancing technologies. Each user's environment is isolated to prevent interference. GCP dynamically allocates resources to handle increased load, ensuring consistent performance. Additionally, advanced load balancing distributes traffic across global data centers to manage sudden spikes and maintain service availability. These measures, combined with proactive monitoring and capacity planning, uphold performance standards regardless of fluctuating demands.
- Usage notifications
- Yes
- Usage reporting
-
- API
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Other
- Other metrics
-
- Latency: Measures the response time of services
- IOPS: Tracks performance of storage devices
- Error Rates: Captures the rate of failed requests or operations
- Read/Write Throughput: Measures data processed by storage or network
- GPU Utilisation: Monitors the usage and efficiency of GPU resources
- Billing: Tracks cloud spending and usage for cost management
- Custom Metrics: Allows creation of user-defined metrics specific to applications
- Quota: Monitors usage against set quotas to avoid service interruptions
- Load Balancing: Provides metrics on request handling and distribution efficiency
- Downtime and Uptime: Records service availability and incident durations
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- SADA
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
-
Encryption: Data is automatically encrypted using AES-256 algorithms.
Key Management: Google manages encryption keys, with options for user management.
Physical Security: Multiple layers of security include biometrics and surveillance.
Access Controls: Strict policies restrict data access to authorised personnel.
Redundancy: Data is stored redundantly across multiple locations for reliability. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- PaaS: Automate backups, use managed version control
- Compute and Application Hosting: Regular snapshots, image backups of VMs
- Container Service: Export configurations, snapshot persistent volumes
- Relational Database: Enable automated, scheduled database backups
- Data Warehousing: Export data periodically, snapshot storage
- Networking: Backup network configurations, rules
- Logging and Analysis: Store logs externally, use durable storage
- Infrastructure and Platform Security: Backup security policies, configurations
- Block Storage: Use volume snapshots, replicate across zones
- Object Storage: Enable versioning, replicate data across regions
- Backup controls
- Users control backups in GCP by setting specific policies and schedules via the management console or scripting tools like the Google Cloud SDK. They can configure different backup frequencies, retention periods, and specific data sets for each service. For instance, automated daily backups for databases and weekly snapshots for virtual machine instances are possible. Additionally, users can utilise services like Cloud Scheduler to automate backup tasks at customised intervals, ensuring flexibility and adherence to unique business needs and compliance requirements.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- Dedicated bonded WAN connection
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
Encryption: Data is encrypted at rest and in transit within Google's network.
Network Segmentation and Firewalls: Google's network is tightly segmented with strong firewall protections to control data flows and prevent unauthorised access.
Access Controls: Strict access controls ensure only authorised personnel access data, using the principle of least privilege.
Monitoring and Logging: Continuous monitoring and sophisticated anomaly detection are used to detect security threats.
Physical Security: Google data centers employ multiple security measures including biometrics and perimeter fencing.
Redundancy and Resilience: Data is replicated across multiple geographic locations for resilience and data availability.
Availability and resilience
- Guaranteed availability
-
Google Cloud Platform (GCP) offers service level agreements (SLAs) for its various services, which typically guarantee a certain level of uptime and service availability. If these commitments are not met, customers are often eligible for credits against their service usage. The SLAs detail the performance you can expect from each service and outline the remedies if Google fails to meet these performance levels.
For detailed and specific information on the SLAs for various Google Cloud services, you can view them directly on Google's official documentation. Here's a link to access all Google Cloud Platform SLAs: Google Cloud SLAs.
https://cloud.google.com/terms/sla/ - Approach to resilience
-
Global Infrastructure: GCP operates a vast network of data centers globally, distributed across multiple geographic regions and zones. This geographic distribution allows for redundancy and failover, minimising the impact of local failures.
Redundancy: Services and data are redundantly stored across multiple physical locations within each region to protect against data loss and service interruptions.
Fault Tolerant Design: GCP's services are built to be fault tolerant, often with no single point of failure. This design includes automatic and transparent failover to minimise downtime.
Live Migration of VMs: Compute Engine offers live migration of Virtual Machines, which helps in maintaining service continuity during maintenance and upgrades without disrupting the running instances.
Data Replication: Critical data is automatically replicated, both within the same region and across multiple regions, to ensure data durability and availability.
Disaster Recovery: GCP provides robust disaster recovery solutions that allow for quick recovery of applications and data with minimal downtime, tailored to varying business needs. - Outage reporting
-
Google Cloud Status Dashboard: This online dashboard is updated in real-time and provides the current status of various GCP services. It includes detailed reports on incidents, their impact, ongoing updates, and the resolution status.
Email Notifications: Users can subscribe to receive email alerts for incidents affecting the services they use. These notifications provide updates as the situation progresses from detection to resolution.
RSS Feeds: The Google Cloud Status Dashboard offers RSS feeds that users can subscribe to for automatic updates in their RSS reader applications.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- N/A
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- MSECB
- ISO/IEC 27001 accreditation date
- 06/24/2022
- What the ISO/IEC 27001 doesn’t cover
- Backoffice functions, including finance and sales.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- SOC 2 Type 2 Audit
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The purpose of the Information Security Policy and Objectives document is to provide an executive level directive to the organisation to establish, maintain and continually improve the Information Security Management System. A fully functioning and effective Information Security Program enables SADA to innovate and build its business while simultaneously protecting critical assets. SADA’s Information Security Program reinforces the Trust and Good Will created with stakeholders including employees, contractors, partners, prospective and current customers, and the general public. The Information Security Program builds a framework for SADA to remain compliant with the various Privacy and Security Regulations affecting its operations as well as requirements included in Customer and Partner contracts.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
"Identification and Recording: Thorough identification and documentation of proposed changes.
Planning and Review: Comprehensive planning for the change and review by appropriate parties.
Impact Assessment: Meticulous evaluation of potential consequences on information security and any dependencies.
Authorisation: Formal approval of changes by designated personnel.
Testing: Rigorous testing of changes in a controlled environment before implementation.
Implementation: Careful and controlled implementation of the authorised change.
Documentation and Communication: Accurate logging and records of the change process, alongside clear communication with affected stakeholders.
Emergency Changes: Defined procedures for immediate changes necessitated by security incidents or urgent needs.
Review and Evaluation - Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
Identifying vulnerabilities: In systems, software, applications, networks, and processes that could be exploited by threats.
Evaluating risk: Analyze the potential impact and likelihood of those vulnerabilities being exploited.
Mitigating vulnerabilities: Take actions to reduce the risk posed by vulnerabilities through remediation activities like patching, reconfigurations, or compensating controls.
Monitoring: Continuously observe systems for new or resurfacing vulnerabilities. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Vulnerability Management : scanning for technical vulnerabilities, up-to-date with vendor patches and assessing exploitability risks.
Threat Intelligence: Tracking emerging threats and attack patterns
Security Monitoring: Implementing SIEM to detect anomalous activity, intrusion attempts, or signs of exfiltration
Awareness and Reporting: Train employees to recognise suspicious behaviour, social engineering attempts, potential security compromises.
Penetration Testing : Conduct periodic simulated attacks to identify vulnerabilities
Incident Response: Develop and test escalation procedures, and communication protocols.
Incident Response : Define steps for containing breaches, collecting evidence, eradicating the threat, and recovering systems.
Forensics and Analysis : conduct root cause analysis to identify vulnerabilities - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
This incident response plan describes the actions that SADA employees are to follow after a security incident. A security incident is any unauthorised computer, application, data access and/or use of such systems in violation of SADA’s acceptable use policy. A security incident may originate from, be directed towards, or transit SADA controlled computer or network resources. Examples of reportable security incidents include suspected virus or worm infections, local account compromise, application or computer performance degradation, presence of unexpected programs or files and/or unexpected application response.
security issues must be reported by either calling SADA IT Ops at 818.208.1603
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- Google uses a custom built virtualisation technology based on, but heavily customised, KVM
- How shared infrastructure is kept separate
- Different organisations sharing the same infrastructure on Google Cloud Platform (GCP) are kept apart through robust isolation mechanisms. These include virtualisation technology, software-defined networking, and strict access controls. Each organisation's resources are logically separated, ensuring that they cannot access each other's data or interfere with each other's operations. Additionally, GCP employs encryption, authentication, and authorisation protocols to enforce security boundaries and protect the privacy and integrity of each organisation's data and workloads.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Please refer to the Google Cloud sustainability overview and statements via the following link: https://cloud.google.com/sustainability/region-carbon
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
SADA uses Saas technologies in the cloud to reduce the need for hardware and energy dependent servers. This cuts down on energy use throughout the company and reduces our carbon footprint.
As an Insight company, we are committed to reducing its impact on the environment. We strive to lessen our environmental impact over time and to initiate projects and activities that will reduce our impacts on the environment.
Insight supports the UN’s 17 Sustainable Development Goals (SDGs). Since its inception in 2015, governments and international and local organisations have taken innovative steps to support the SDG charter, which recognises “that ending poverty and other deprivations must go hand-in-hand with strategies that improve health and education, reduce inequality and spur economic growth — all while tackling climate change and working to preserve our oceans and forests.” We strive to implement our own good practices with how we establish greater harmony within our workplace, along with our collaboration with our partners and clients.Covid-19 recovery
SADA transitioned to a remote workforce during the pandemic and have continued this practice as an effective means to hire global talent. SADA is a SaaS company and has increased our productivity or customer outcomes by offering flexible scheduling and work/life balance to meet employee and customer needs. The software and collaboration tools used by all SADAians which increases communication and working productively in all regions.Tackling economic inequality
SADA invests in education and skills development by offering training to support employees on personal & professional development. We further offer learning opportunities on DEI throughout the year including Understanding Unconscious Bias, Building Resilience, Inclusive Leadership, and #IamRemarkable (a Google initiative). SADA also provides LinkedIn Learning to all employees so they can deepen their knowledge and explore any other personal or professional topics of interest.
Diversity and inclusion play a key role in SADA’s company culture-we strive for a workplace where SADAians can bring their whole self to work and employees feel represented and heard. DEI is not a one time thing or a check off on a checklist-- it is a systematic effort that we are committed to enacting at every stage of the company from talent acquisition to onboarding processes to career pathing to internal communications, benefits, and more. There are countless efforts we have put forth to continue to foster this culture, including partnerships with job boards or conferences focused on supporting historically underrepresented groups, bringing in speakers for seminars and training around bias and inclusion, and empowering our own Employee Resource Groups such as SADA Sexuality and Gender Alliance, Women of SADA, and SPONK (SADA Parents of Neurodiverse Kids).Equal opportunity
SADA is an equal opportunity employer and accept our responsibility to make employment decisions without regard to an individual's age (40 and over); ancestry; national origin; citizenship; race; color; marital or parental status; political affiliation; pregnancy and perceived pregnancy (including breastfeeding or medical conditions related to breastfeeding); religion (including religious dress practices and religious grooming practices); sex; sexual orientation; gender (including perceived sex / gender, gender identity and gender expression; LGBTQ+); an individual's reproductive health decisions which includes, but isn't limited to, a decision to use or access a particular drug, device, product, or medical service for reproductive health; military or veterans' status; registered domestic partner status; genetic information or characteristics (with respect to the applicant, team member, or a family member); physical or mental disability (including intellectual disabilities); medical condition unrelated to the person's ability to perform the job, or the perception that a person is associated with a person who has or is perceived to have any of these characteristics; or any other basis protected by law, ordinance, or regulation.
SADA is committed to developing a rich culture, a diverse workforce and a healthy work environment in which every employee is treated fairly, is respected and has the opportunity to contribute to the success of the company, while having the opportunity to achieve their full potential as individuals.Wellbeing
At SADA, we truly value our people and recognise that the wellbeing of an individual speaks to the lasting health and success of the company as a whole. As such, we take special care to maintain a culture that speaks directly to employees’ needs-- promoting connectedness and community, stressing the importance of physical and mental health, and creating a safe, inclusive workplace. We began sending out monthly surveys to gauge the pulse of our employees- some of whom had never worked remotely before. We tracked and reviewed the results, using data directly from employees to innovate our virtual team events, write blogs on solutions to common issues, and provide requests like standing desks for new home offices. To counteract these issues, SADA has implemented multiple initiatives to keep the community engaged, connected, and most importantly-- healthy.
SADAian Employee Assistance Program (EAP) - The SADAian Employee Assistance Program provides support & guidance for matters that range from personal issues you might be facing to providing information on everyday topics that affect your life. Support topics range from general mental health counselling, education, dependent care & caregiving, legal & financial, work life balance, and lifestyle & fitness management. SADAians have unlimited access to phone counselling and a free initial 30 minute phone consultation for legal and financial matters.
Pricing
- Price
- £0.01 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- New organisations signing up to Google Cloud can be offered trial credits for the platform as a whole, and additional trial terms are available for certain products.
- Link to free trial
- https://cloud.google.com/free/