AWS Platform as a Service (PaaS)
Our AWS PaaS offers robust architecture, agile development, and an integrated Service Desk for seamless application management. Hosted in EU data centres, it ensures compliance, innovation, scalability, and top-notch security, accelerating digital transformation while optimizing performance for businesses of all sizes.
Features
- Use multi-factor authentication and end-to-end encryption.
- Monitor compliance continuously with automatic security updates.
- Allocate resources dynamically for optimized performance and cost.
- Automatically scale to meet real-time application demands.
- Deploy rapidly with integrated CI/CD tools.
- Implement blue-green deployment to minimize downtime.
- Choose data residency options for EU data protection laws.
- Conduct regular data audits for GDPR compliance.
- Monitor application performance in real-time.
- Access customizable dashboards for system insights.
Benefits
- Enhance security to prevent data breaches, ensuring continuity.
- Optimize resources, reducing costs and overprovisioning risks.
- Deploy rapidly, accelerate development, and shorten time-to-market.
- Simplify compliance with automatic updates and data sovereignty assurance.
- Empower developers with efficient tools, focusing on innovation.
- Utilize analytics for informed decisions and strategic planning.
- Scale applications flexibly to meet evolving business requirements.
- Ensure robust disaster recovery for minimal downtime and data backup.
- Receive comprehensive support from certified AWS professionals.
- Offer extensive documentation and training resources for user empowerment.
Pricing
£350 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 9 2 9 6 8 8 1 6 9 2 6 9 8 9
Contact
REPLY LIMITED
Chris Wright
Telephone: 0207 730 6000
Email: glue.frameworks@reply.com
Service scope
- Service constraints
- N/A
- System requirements
-
- Active AWS account to access and manage AWS PaaS resources.
- Internet connectivity with sufficient bandwidth for cloud interactions.
- Modern web browser for accessing AWS management console and dashboards.
- Compatible development environments for preferred programming languages.
- API access enabled for integration with existing business applications.
- Compliance with minimum security standards for encryption and authentication.
- System capability for multi-factor authentication setup and management.
- Pre-existing CI/CD tools integration or readiness for deployment automation.
- Organizational readiness for adopting blue-green deployment strategies.
- GDPR compliance infrastructure for data protection and privacy audits.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Based on SLA Agreement.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- Web chat testing protocol will be agreed with the client as part of our service design process.
- Onsite support
- Yes, at extra cost
- Support levels
- We adapt our support to the needs of the users and can offer most support levels requested by clients. We have provided all combinations of first, second, and third line support to our clients; we have provided all combinations of UK business hours, UK extended business hours, US business hours and 24/7 support facilities to our clients. We have provided both real-time telephone support, email support, and on-call support. The costs of each of these models is tailored to the specific needs of our clients to ensure the right level of support is provided to the service in question. In all of our client engagements there will be a dedicated account manager – and typically a cloud support engineer or technical account manager depending on the needs of the client.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide various resources to help users start using our service. This includes comprehensive online documentation with guides and FAQs, interactive webinars for live learning sessions, and personalized onsite training for organizations. Our goal is to offer users the support they need to confidently utilize our service, whether through self-paced learning or personalized assistance.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
- Confluence
- End-of-contract data extraction
- When the contract ends, users can extract their data through our service's export functionality. They initiate the process via our web interface or API, selecting the desired data sets. We offer guidance and support throughout, ensuring a smooth transition.
- End-of-contract process
- When the contract ends, users can extract their data through our service's export functionality. They initiate the process via our web interface or API, selecting the desired data sets. We offer guidance and support throughout, ensuring a smooth transition.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Reply's platform as a service (PaaS) offers customers a personalized platform designed to meet their specific needs. The web interface is adaptable to meet various requirements, with common functionalities including environment creation and deletion, scaling, and software deployment through pipelines. The extent of customization is subject to the technical capabilities of the services necessary for the platform's operation.
- Web interface accessibility standard
- WCAG 2.1 A
- Web interface accessibility testing
- We ensure web interface accessibility by employing accessibility testing tools. These tools help us evaluate the usability and inclusivity of our interfaces for users utilizing assistive technologies such as screen readers or voice recognition software. Through these assessments, we identify and address any potential accessibility barriers, ensuring that our web interfaces are user-friendly and accessible to all individuals, regardless of their abilities.
- API
- Yes
- What users can and can't do using the API
-
Through our API, users can seamlessly set up and configure our service according to their needs. Initially, users can utilize the API to provision accounts, configure settings, and integrate our service into their existing workflows. This includes tasks such as creating user profiles, defining access permissions, and configuring various service features.
Additionally, users can make changes to their setup and configuration dynamically through the API. They have the flexibility to update user profiles, adjust access permissions, and modify service configurations in real-time.
However, there are some limitations to the actions users can perform through the API. Certain administrative tasks or sensitive operations may be restricted to prevent unauthorized access or unintended modifications. - API automation tools
-
- Ansible
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Command line interface
- Yes
- Command line interface compatibility
- Linux or Unix
- Using the command line interface
-
Users can leverage our command line interface (CLI), such as the "Reply CLI", to perform various tasks efficiently. Initially, users can set up the service through the CLI by executing commands to provision accounts, configure settings, and initialize the service within their environment. This includes tasks like creating user profiles, defining access permissions, and configuring service features, all accomplished via command line commands.
Moreover, users can make changes to their setup and configuration seamlessly through the CLI. They can update user profiles, adjust access permissions, and modify service configurations in real-time by executing appropriate CLI commands.
However, there may be some limitations to the actions users can perform through the CLI. Certain administrative tasks or sensitive operations might be restricted to prevent unauthorized access or unintended modifications.
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
-
We ensure user experience by implementing robust infrastructure and resource management strategies:
Scalability: Our service scales to meet demand, dynamically allocating resources.
Resource Isolation: We segregate resources to prevent one user's activities from affecting others.
Load Balancing: Traffic is evenly distributed across multiple servers, ensuring optimal performance.
Performance Monitoring: We continuously monitor and address performance issues proactively.
SLAs: Our SLAs guarantee consistent service levels, regardless of demand fluctuations. - Usage notifications
- Yes
- Usage reporting
-
- API
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Other
- Other metrics
-
- CPU
- Disk
- Memory
- Network
- Number of Instances
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual Machines: Complete snapshots of virtualized computing environments.
- Databases: Structured data from relational or NoSQL database management systems.
- Applications: Configuration settings, user preferences, and application data files.
- System Settings: Operating system configurations, registry settings, and preferences.
- Cloud Storage: Data stored in cloud-based storage platforms and services.
- Backup controls
- Users have granular control over backup schedules and configurations through our service's flexible settings. They can specify which items to back up and define individual schedules based on their priorities and requirements.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- SLA's negotiated on a client by client basis
- Approach to resilience
- Our service is designed with resilience at its core, featuring redundancy to eliminate single points of failure and maintain continuity in the face of hardware failures or outages. Load balancing technologies evenly distribute incoming traffic across multiple resources, preventing overload and ensuring optimal performance. Robust disaster recovery plans, including regular backups and failover mechanisms, swiftly restore operations in the event of catastrophic events. Geographic diversity across multiple data centers provides redundancy, ensuring service availability even during regional disruptions. Automated monitoring and response systems continuously monitor performance, triggering rapid responses to anomalies to minimize downtime. Additionally, our service scales seamlessly to accommodate fluctuations in demand, ensuring consistent performance under varying load conditions. Through these resilience features, we guarantee our users high availability, reliability, and uninterrupted service operations.
- Outage reporting
- Our service reports outages promptly through multiple channels to ensure users are promptly informed and updated. Users receive notifications on the service dashboard and via email alerts, providing real-time updates on the status of the service and any ongoing issues. Additionally, we maintain a dedicated status page where users can check the current status of the service and receive updates on outages or scheduled maintenance. Furthermore, users can reach out to our support team through various channels for assistance, ensuring that they receive prompt support and updates on outage resolution efforts.
Identity and authentication
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- When users access our service, we employ a robust authentication mechanism to ensure security. Firstly, we implement Single Sign-On (SSO) solutions, allowing users to authenticate once and gain access to multiple systems and applications within our service ecosystem. This not only streamlines the login process but also reduces the risk associated with managing multiple passwords. Furthermore, we enforce Multi-Factor Authentication (MFA) to add an extra layer of security. Users are required to provide additional forms of verification beyond just a password, such as a one-time code sent to their registered mobile device or email.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Identity federation with existing provider (for example Google Apps)
- Devices users manage the service through
- Dedicated device on a government network (for example PSN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International
- ISO/IEC 27001 accreditation date
- 23/06/2017
- What the ISO/IEC 27001 doesn’t cover
- Covers: IT & Business Consultancy
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- SOC2, GDPR
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- When changes are proposed, they undergo stringent assessment for potential security impact before implementation. Our change management board, comprising security experts and stakeholders, meticulously reviews proposed changes. These changes are evaluated based on their potential to introduce security vulnerabilities or impact our services' overall security posture. Additionally, we conduct risk assessments to identify and mitigate any potential security risks associated with the proposed changes. Only after these assessments and necessary mitigations are completed do we approve changes for implementation. This diligent approach guarantees that our services remain secure and resilient in the face of evolving threats and changing requirements.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Our vulnerability management process, aligned with CSA CCM v3.0.1, involves ongoing threat assessment through internal scans, external tests, and monitoring industry threat intelligence. Prioritising vulnerabilities by severity, we deploy patches promptly after rigorous testing. Our information sources include vendor advisories, industry feeds, and collaborative initiatives, ensuring proactive threat mitigation and service security.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Our protective monitoring processes swiftly identify potential compromises through automated tools and real-time analysis of system logs and user behavior. When a compromise is detected, our incident response team immediately initiates predefined procedures, including isolating affected systems and escalating the incident as needed. We prioritize rapid response to incidents, guided by predefined service level agreements (SLAs) to minimize impact and ensure the security of our systems and data.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We have pre-defined processes in place for common events, which are documented in our incident management framework. Users can report incidents through various channels, including dedicated incident reporting forms on our platform, email, or through our customer support channels. Once an incident is reported, our incident response team assesses the severity and initiates the appropriate response procedures based on predefined criteria, such as impact on service availability or data integrity. Throughout, we provide regular updates to affected users, keeping them informed of progress and resolution times. After resolution, we conduct post-incident analysis to identify root causes and implement preventive measures.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- AWS Virtualisation
- How shared infrastructure is kept separate
- Different organizations sharing resources are kept apart through virtualization, network isolation, access controls, encryption, and monitoring. AWS uses virtualization technologies to create isolated environments, ensuring that each organization's data and applications remain separate. Network segmentation is through Virtual Private Clouds and subnetting. Access controls, including IAM policies and resource-based policies, restrict access to authorized personnel only. Encryption is enforced for data in transit and at rest using services like AWS Key Management Service (KMS) and SSL/TLS. Continuous auditing and monitoring through services like AWS CloudTrail and Amazon GuardDuty help detect and respond to any unauthorized access or security incidents.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
Our data centers strictly adhere to the EU Code of Conduct for Energy Efficient Data Centres, ensuring optimal energy efficiency and sustainability practices. We employ advanced energy efficiency measures such as optimized cooling systems, server configurations, and renewable energy integration to minimize our environmental impact. Additionally, we prioritize waste heat recovery and provide comprehensive employee training to promote energy-saving initiatives. Regular reporting and benchmarking against industry standards help us track our progress and identify areas for improvement.
For further details on our commitment to energy efficiency in the cloud, please visit Amazon's Sustainability page.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our commitment to social value is integral to our values as a business built on an ethical approach demonstrating Glue Reply’s reliability, transparency and honesty.
We can support the buyer to deliver against the Social Value Model Theme of Fighting Climate Change through delivering additional environmental benefits enabling effective stewardship of the environment.
We are ISO14001:2015 certified and since 2012 we have reported our environmental credentials to the Carbon Disclosure Project (CDP.net). We have achieved Carbon Neutral as a whole business since 2023 and aim to produce Net Zero GHG emissions by 2030. We have a clear set of policies and action plan towards these targets.
Our certified environmental sustainability programme includes annual measurement and reporting of document printing, materials recycling, energy saving, energy efficiency, transport and energy consumption. Our KWH consumption per employee is calculated and our transition to renewables including percentage of renewables as a proportion of our total kWH consumption is reported. We complete an annual environmental policy and assessment for our supply chain partners. All our core systems are run in green cloud environments managed by certified providers.
Our cloud services are provided in a carbon-neutral manner including our direct supply chain. A proportion of this is achieved through carbon offsetting and we provide measurements on emissions that demonstrate offsetting ensures our contracts are carbon positive. Our preferred scheme is Forest Carbon (https://www.forestcarbon.co.uk).
At the start of the engagement we will agree the initiatives to implement, incorporate the agreed social value milestones into the wider programme and manage them alongside all other deliverables. A detailed project plan will be prepared and key performance measurements agreed to monitor the progress of the social value initiatives. We incorporate social value implementation and monitoring into the role of the Client Director.Covid-19 recovery
Our commitment to social value is integral to our values as a business built on an ethical approach demonstrating Glue Reply’s reliability, transparency and honesty.
We can support the buyer to deliver against the Social Value Model Theme of COVID-19 recovery through provision of employment opportunities and implementation of people health initiatives to help local communities manage and recover from COVID-19.
We have implemented initiatives to promote opportunities for those who face barriers to employment;
- Enrolled into the Nuffield Research Placement scheme (funded by Nuffield Foundation) to provide placements to disadvantaged and deprived year 12 students providing research opportunities. Individuals who perform well are offered a Degree Apprenticeship place.
- Run a Degree Apprenticeship scheme where we use Generation (a not-for-profit) to cross-train individuals from deprived backgrounds, without necessarily STEM backgrounds in technology. We partnered with Google who commit to provide engineering engagements and training and development on Google Cloud Platform related technologies.
As a responsible employer we have implemented the 6 standards of the Mental Health at Work Commitment, we support our employees no matter what situation they face and have appropriate structures for them to speak to neutral experts 24x7. Both employees and managers are trained on mental health. Post-COVID we actively promote physical activities and have revised working practices to inspire each employee to make their own choices to find their ideal work-life balance.
At the start of the engagement we will agree the initiatives to implement, incorporate the agreed social value milestones into the wider programme and manage them alongside all other deliverables. A detailed project plan will be prepared and key performance measurements agreed to monitor the progress of the social value initiatives. We incorporate social value implementation and monitoring into the role of the Client Director.Tackling economic inequality
Our commitment to social value is integral to our values as a business built on an ethical approach demonstrating Glue Reply’s reliability, transparency and honesty.
We can support the buyer to deliver against the Social Value Model Theme of Tackling Economic Inequality through provision of new business, new jobs and skills and incresaing supply chain resilience and capacity.
We have implemented initiatives to promote opportunities for those who face barriers to employment;
- Enrolled into the Nuffield Research Placement scheme (funded by Nuffield Foundation) to provide placements to disadvantaged and deprived year 12 students providing research opportunities. Individuals who perform well are offered a Degree Apprenticeship place.
- Run a Degree Apprenticeship scheme where we use Generation (a not-for-profit) to cross-train individuals from deprived backgrounds, without necessarily STEM backgrounds in technology. We partnered with Google who commit to provide engineering engagements and training and development on Google Cloud Platform related technologies.
- Run a Code for Kids initiative where we work with schools to teach over 3,000 children across a broad range of schools how to program.
We have a Supplier Code of Conduct and all our suppliers must comply in the areas of labour law and human rights, worker safety and environmental sustainability. Reply operates as set of SME type companies and we understand the benefits that this these organisations can bring and we often select SME’s as part of our supply chain
At the start of the engagement we will agree the initiatives to implement, incorporate the agreed social value milestones into the wider programme and manage them alongside all other deliverables. A detailed project plan will be prepared and key performance measurements agreed to monitor the progress of the social value initiatives. We incorporate social value implementation and monitoring into the role of the Client Director.Equal opportunity
Our commitment to social value is integral to our values as a business built on an ethical approach demonstrating Glue Reply’s reliability, transparency and honesty.
We can support the buyer to deliver against the Social Value Model Theme of Equal Opportunity through tackling workforce inequality, identifying and managing the risks of modern slavery and increasing representation of disabled people.
Glue Reply is committed to promoting equality and diversity and promoting a culture where we actively value difference and recognise people from different backgrounds and experiences bring valuable workplace insights and enhance the way we work. Making everyone feel equally involved and supported results in rewarding work experiences and fuels innovation.
We make employment decisions based on merit, qualifications and competence. Our workforce has high cultural diversity, above industry standards, and has higher levels of gender diversity than industry averages. We have a strong equality ethos and run a genuine meritocracy where individuals are assessed solely on their performance and how their contribution has helped further the organisation.
We are committed to preventing modern slavery in our corporate activities and supply chains.
We have implemented initiatives to promote opportunities to identify and tackle inequality in employment, skills and pay in the workforce.;
• Founding signatory of the Tech Talent Charter
• Women in Technology social network organises events and has an active community.
• Donated some of our BCS Corporate Membership places to Coding Black Females
At the start of the engagement we will agree the initiatives to implement, incorporate the agreed social value milestones into the wider programme and manage them alongside all other deliverables. A detailed project plan will be prepared and key performance measurements agreed to monitor the progress of the social value initiatives. We incorporate social value implementation and monitoring into the role of the Client Director.Wellbeing
Our commitment to social value is integral to our values as a business built on an ethical approach demonstrating Glue Reply’s reliability, transparency and honesty.
We can support the buyer to deliver against the Social Value Model Theme of Wellbeing through supporting the physical and mental health of the rowkforce and community.
As a responsible employer we have implemented the 6 standards of the Mental Health at Work Commitment, we support our employees no matter what situation they face and have appropriate structures for them to speak to neutral experts 24x7. Both employees and managers are trained on mental health.
We perform assessments on wellbeing regularly and our significant annual report on this covers a wide range of dimensions across the business. We present the findings to all employees whilst keeping individual information 100% confidential. We then have our focus group working on these results to drive a culture of continuous improvement
Post-COVID we actively promote physical activities and have revised working practices to inspire each employee to make their own choices to find their ideal work-life balance.
• Our active challenge on Strava rewards employees for taking breaks. For every mile they walk or run we give £1 to charity, with an extra £5 every time during work hours. #WorkLifeBalance has driven an active work-life balance culture with >70% peak uptake.
• Our staff also have access to on-line yoga and fitness programmes.
At the start of the engagement we will agree the initiatives to implement, incorporate the agreed social value milestones into the wider programme and manage them alongside all other deliverables. A detailed project plan will be prepared and key performance measurements agreed to monitor the progress of the social value initiatives. We incorporate social value implementation and monitoring into the role of the Client Director.
Pricing
- Price
- £350 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No