Digital Transformation, Cloud Infrastructure provisioning and platform security
InfoHash provides hosting infrastructure in AWS managed through Terraform IaC. Provisioning the cloud infrastructure. Embedding security in the cloud infrastructure. Automated security checks in the cloud infrastructure. Automated compliance checks in the cloud infrastructure. Automated report generation, and auto-remediation.
Features
- Terraform IaC
- Ansible Configuration Management
- Continuous integration, Continuous delivery, and Continuous deployment
- Automated Security Testing
- Automated Compliance checks
- Automated Infrastructure Testing
- Sustainable infrastructure provisioning with less carbon emission
- Test driven development
- Agile delivery
Benefits
- You can efficiently mange infrastructure as code.
- You get a seamless flow of software
- You get an early feedback loops on the software flow
- Shift left to attain early security testing & compliance check
- Intuitive design, and implementation
- Cost effective infrastructure provisioning
- You get a trackable velocity based agile delivery
- You get monitoring capability from mobile devices
- You get BAU activities supported by us.
- You get a resilient, scalable, available, and secure system.
Pricing
£395 to £695 a user a day
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 9 9 3 8 3 4 6 1 3 9 1 9 8 8
Contact
INFOHASH LTD
Harish Kamugakudi Marimuthu
Telephone: 07903896490
Email: harish@infohash.co.uk
Service scope
- Service constraints
- N/A
- System requirements
- N/A
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Response times during weekends are as per the project's need and as agreed.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- There will be a technical account manager with who the customer can engage for their ongoing technical needs.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Code, Documentation, and Training provided.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- As a best practice, we tend to store everything in a customer-owned environment. In case of need demands and when we use any system, we will plan and share the user data in the way they expect it, by engaging and agreeing with the customer.
- End-of-contract process
-
The cost is per engineer per day rate.
In case the engineer needs to travel to a remote location to meet the customer's needs, then the cost will be agreed upon with the customer.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Testing the scalability in an early software life cycle.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Infrastructure components
- Virtual machines
- Databases
- Network configurations
- Object stores
- Backup controls
- Yes. As per customer needs, we can tailor the backup on a different schedule through automation.
- Datacentre setup
- Single datacentre with multiple copies
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
The level of availability which we can guarantee is the cloud infrastructure's availability.
In case we do not meet the availability expectation, the refund is paid as agreed upon with the customer. - Approach to resilience
-
Self-heal infrastructure, auto-recovery infrastructure, redundancy in multiple available zones for fault tolerance.
The details can be available on request. - Outage reporting
-
Public dashboard
email
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Role based access controls will be provided.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- About to get the CyberEssential Plus certification.
- Information security policies and processes
- About to get ISO 27001 certification for the company.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
A streamlined configuration managed workflow with frequent early testing.
Any changes to the defined environment are managed via a configuration management tool. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Through scheduled automated security testing, and vulnerability assessment of infrastructure and services through various tools.
Once identified the patches are applied in a lower environment first to gain the confidence of rolling out the patches to production.
There is a dashboard that gets generated out of the scheduled vulnerability assessment. That dashboard gives information about the potential threats. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Proactive frequent scheduled monitoring of security can identify any potential threats to the infrastructure.
There are certain tools and techniques which can auto-fix the potential threats. There are occasions when the change record is created automatically and addressed immediately based on the severity of the threat. - Incident management type
- Supplier-defined controls
- Incident management approach
- Using incident management tools & processes for this. Preferably the tool the user already has or if needed we can recommend the tool and process as per the customers' need.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- AWS
- How shared infrastructure is kept separate
- AWS managed infrastructure. When a customer needs stringent network isolation, then bare-metal installation can be provided in the cloud.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- https://aws.amazon.com/energy/sustainability/
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We design and deliver software to cater the environmental benefits by working towards net-zero greenhouse gas emissions.Covid-19 recovery
We give the opportunity in employing the people affected during the COVID-19 crisis, then give them enough training to serve the customer need.Tackling economic inequality
We strive to create employment and training opportunities, particularly for people in industries with known skills shortages or in high growth sectors.Equal opportunity
Social Justice is a key principle for InfoHash. We support in-work progression to help people, including those from disadvantaged or minority groups, to move into higher paid work by developing new skills relevant to the contract.Wellbeing
We demonstrate action to support health and wellbeing, including physical and mental health, in the contract workforce.
Pricing
- Price
- £395 to £695 a user a day
- Discount for educational organisations
- Yes
- Free trial available
- No