Infosys Cloud Environment Build Service
Infosys Public Cloud Environment Build Service is structured in a modular way to navigate digital transformation with cloud. It enables faster cloud adoption empowering the developers to build and run cloud applications through our cloud platform and help accelerate the client's cloud journey.
Features
- Strategy & Incubation
- Transformation (Build and Migrate)
- Cloud Journey accelerator tools
- Cloud Automation
- Cloud Operation optimisation
- Center of Excellence
- Cloud Migration assessment framework
- Flexible Delivery Model
Benefits
- Delivering Secured Cloud Platform
- Delivering value through Cost Optimisation
- Faster COTS product upgrades using CI/CD pipeline
- Setup of Cloud Foundation helps in scalability and MultiAccount Management
- TCO reduction through various levers
- Single Point of Accountability
- Leverage OPEX commercial model
- On demand infrastructure scalability
Pricing
£157 to £1,021 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 5 6 1 2 8 0 2 4 4 8 2 1 8 3
Contact
Infosys Limited
Peter Gill
Telephone: +44 7391393866
Email: ukps@infosys.com
Service scope
- Service constraints
- None
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We do the analysis of the ticket and based on the complexity of the system, we work on the SLAs along with the client .
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
L1 L2 and L3 Support
At high level, L1, L2 & L3 can be mapped to
L1 Support -> Application operations and monitoring, Categorization and logging of tickets, Fixing known/commonly occurring issues, Escalating issues to next level within SLA timelines in absence of a known resolution.
L2 Support -> Application production support, Problem Management, configuration Management, Escalated Incident Management for tickets escalated from L1 team
L3 Support - > change and release management, SLA management, Escalated Incident Management for tickets escalated from L2 team, Minor Enhancements < 40 hours (typically), Bug fixes . - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Training and enablement services are provided along with documentation
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Ppt, word
- End-of-contract data extraction
-
If Infosys owns the Cloud account, at the end of contract we either
1. Take the backup of the data and share in the format requested by the buyer or
2. Migrate the data to the next service provider and provide the transition - End-of-contract process
- End of the contract is subject to terms and conditions of the contract with the respective customer
Using the service
- Web browser interface
- Yes
- Using the web interface
- 1. Cloud provider web Console is used e.g. AWS webconsole for AWS services, Users can manage all services using Web interface
- Web interface accessibility standard
- WCAG 2.1 AAA
- Web interface accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
Cloud Service provider offered APIs. Example: AWS API.
we can access, manage and change all the services using API - API automation tools
-
- Ansible
- Chef
- OpenStack
- Terraform
- Puppet
- Other
- Other API automation tools
-
- Java
- Python
- .net framework
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- We can access, manage and change all the services using API
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Auto Scaling of the resources as the demand increase
- Usage notifications
- Yes
- Usage reporting
-
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- AWS, Microsoft Azure, Google Cloud, Oracle Cloud
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual Machines
- Storage- EBS, S3
- Databases
- Backup controls
- Backup is scheduled as per the buyers backup policies
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- We will implement site-site VPN between buyer's and our/Cloud provide network.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Encrypt data in-transit and data at rest
Availability and resilience
- Guaranteed availability
- Availability can be in terms of 99.99% systems are available in Public cloud. SLA interms of response and resolution time are defined for P1( High priority), P2, P3 and P4(Low priority tickets. Contract can be made for penalty and reward mechanism.
- Approach to resilience
- Infosys focuses on Cloud disaster recovery (cloud DR) which focus on backup data, application to be reslient and help in data recovery. Infosys have BCP based on Disaster Recovery Mechanism
- Outage reporting
- Public dashboard and Email Alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
We follow least Privilege Policies. Local database - Username, password in their user record in the instance database.
Multifactor - Username, password in the database and a passcode sent to the user's mobile device - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Bureau Veritas Holding SAS - UK
- ISO/IEC 27001 accreditation date
- 18/03/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO27001:2022, ISO 27701:ISO 9001:2015, ISO 20000:2018, ISO 14001:2015
- ISO 45001:2018, ISO 13485:2016, CMMI 2.0
- SSAE 18/ISAE 3402 SOC 1 Type II,ISO 22301:2019
- ISO 42001:2023, ISO 27701:2019
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- ISO/IEC 27001:2013 Stage 2 and Service Organisation Control (SOC) 1, 2 and 3
- Information security policies and processes
- Infosys' Information Security policies, processes and reporting structure are confidential in nature and are explained in detail in a separate Infosys document. However, arrangements can be made to brief the client via WebEx conference or during campus visit.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Provides systematic approach to control life cycle of all changes, facilitating beneficial changes to be made with minimum disruption to IT services. Change Management offers ITIL-aligned processes for normal, standard, and emergency change types.
Normal change: Follows complete change lifecycle including peer or technical approval, management, Change Advisory Board (CAB) authorization before being implemented, reviewed, closed.
Standard change: Frequently implemented, repeatable implementation steps, low risk, proven history of success.
Emergency change: Covers fix on fail or retroactive situations where impact to service has been experienced or fail situations where the impact to service is imminent if action is not taken. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- ServiceNow/Qualys/Infosys CyberNext Platforms uses the Vulnerability Response module to compare security data pulled from internal and external sources, such as National Vulnerability Database, to vulnerable CIs ,software identified in the Asset Management module. If CIs or software are found to be affected by a vulnerability, Client can create changes, problems, and security incidents from those vulnerable items. It also views common weakness enumeration records from the NVD to understand how they relate to the vulnerabilities identified in Vulnerability Response. As needed, Client can update your system from the vulnerability databases on an on-demand basis or by running user-configured scheduled jobs.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Infosys provides services that enable monitoring of resources and service usage to help identify attacks against applications. Attacks may come from either external or internal sources and may be malicious or accidental. Protective monitoring using different tools such as AWS Shield, Guardduty etc. helps in identifying potential compromises and also fixes those in time.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Different ITSM Tools like Service now will be intergration using e-bonding with clients ITSM Tools and from service now tickets are raised and priortised.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- XEN Hypervisor
- How shared infrastructure is kept separate
-
AWS, Azure and GCP (Leading Public Cloud Service Provider) implements the virtualisation technology for Virtual Machines.
Bare metal servers provide further isolation for different organisations by separating the infrastructure if we go with dedicated Host configuration
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Workloads will be hosted on Public Cloud Infrastructure(AWS, Azure and GCP)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Infosys’ balanced approach to environmental, social, and governance (ESG) enabled the company to become carbon neutral as of 2023. The same approach will be taken with GCloud14, with a strong emphasis on governance and transparency.
Coupled with our strong governance approach and the environmentally sympathetic design of our delivery model, we can:
• Achieve Net Zero by 2028,
• Adopt UN Climate Neutral Now definition of Net Zero: “where a balance between anthropogenic greenhouse gas (GHG) emissions and removals is achieved”
• Identify 100% of emissions, from design to implementation, prioritising the elimination of emissions
• Offset emissions that cannot be eliminated
• Offsets assured by an external environmental consultancy
• Have our suppliers present an action plan to move from offset to elimination by 2029, setting course for a carbon negative future
In compliance with PPN 06/21, Infosys publishes its Carbon Reduction Plan which is available at Crown Commercial Website as well as Infosys’ own website: https://www.infosys.com/about/corporate-responsibility/documents/carbon-reduction-plan.pdf
For Call-Off Contracts, a baseline emissions level set prior to contract commencement will be created using data supplied by the incumbent supplier, Contracting Authority, and Environmental Contractor. This allows environmental performance to be measured against the previous approach. While the commitment to establishing carbon neutrality is set at 2028, granular targets depend upon consultation with the Contracting Authority, as reflected in the timeline.
Supply chain emissions management will be in place prior to contract commencement through the Contracting Partners’ procurement methodology. The reporting design on emissions will be supplied to the Contracting Authority, with aggregated subcontractor emission provided within an integrated biannual report. A sustainability manager will be aligned to the initiative, who will, working with the client, develop a project plan during the first month identifying, each obligation, associated event/activity and required resources (people, venue, collateral, rollout).Covid-19 recovery
Infosys will invest in the local communities and in partnership through this contract will help create opportunities to tackle economic inequality, increase supply chain resilience and capacity thereby helping support COVID-19 recovery. Infosys has announced it will create 1,000 new Digital Jobs in the UK to support post -Pandemic Growth (Infosys to Create 1,000 Digital Jobs in the UK to Fuel Post-Pandemic Growth): https://www.infosys.com/newsroom/press-releases/2021/create-digital-jobs-uk.htmlTackling economic inequality
Infosys’ plan for GCloud14 contracts include addressing economic and aspirational inequality, ensuring end-users can forge a meaningful career and follow curated, individualised development paths toward success.
Infosys creates opportunities for personal growth through training and career development. Increased online training opens a wide range of options to those looking to enhance their skills or grow into a new field, particularly among under-represented demographics where classroom learning is unsuitable. This democratisation of knowledge will revolutionise how people of all backgrounds develop their career. The data on uptake of such training can ensure all demographics are reached and, where proven to be less effective, steps can be taken to identify why.
Infosys has long recognised the importance of tackling inequality; it is essential to creating a workplace where professional growth faces as few barriers as possible. We are adamant that what barriers remain are determined only by aptitude and hard work – never by background or physical characteristics.
This is evidenced by Infosys’ approach to Corporate Social Responsibility (CSR), with its global foundation investing £30 million last year on education in deprived communities, alongside its community-focussed Springboard learning platform and other philanthropic efforts. We have the commitment and expertise to deliver a transformation that has a meaningful impact on economic inequality.
Working with Local Authorities, including Brent and Sandwell Borough Councils, Infosys has made over 220 vocational courses available to the public free of charge. Local Authorities have adopted the technology as their skills platform of choice and are driving citizens towards the tool.
This will result in high-quality training reaching those in need, doubling the reach of the Infosys Springboard deployment in the UK. Furthermore, it will ensure that the co-morbidities of poor educational and health outcomes linked to economic inequality are addressed through a single tool.Equal opportunity
Infosys supports businesses to create their modern slavery policy, helping them to map their supply chain and create robust procedures. This methodology ensures a proactive, compliant approach to modern slavery whereby action planning is reviewed and renewed to adapt to the changing practices.
The UK proudly boasts the highest ranking on Global Slavery Index as the most active country in the world fighting the practice. This achievement is the perfect expression of the values at the core of Britain’s democratic traditions; its global leadership in this area is a source of pride for colleagues working on this engagement.
We will contribute to this under-celebrated achievement by ensuring the Gcloud14 contracts result in net reduction of Modern Slavery. We will achieve this by keeping the practice out of our supply chain while taking targeted action to improve the lives of people most at risk of exploitation. We will build our approach with close reference to the UK Government guidance on modern slavery.
To ensure a clear understanding of the risks of modern slavery and human trafficking across our organisations, we conduct training with relevant members of the supply chain on staffing benefits and appropriate anti-sexual harassment policies. In line with the policies that apply to our own staff, we require our human resource suppliers to provide training to their employees on their rights, wages policy, benefits, and grievance redressal forums; this is periodically and randomly audited. We have also circulated to our supply chain management employees a training module to improve awareness on modern slavery and human trafficking –a core responsibility of their role.
The programme will be governed by the overall social value governance model under the Social Value Manager’s accountability, who will share a narrative report every six months with the contracting authority on supplier performance.Wellbeing
At Infosys, employee’s health and wellbeing drives a culture of wellness.
Through our efforts, our employee well-being rates reached an all-time high of 91% among employees across locations, even with the virtual setup. The sense of connectedness stands at 88% because of the ability of different teams to come together and collaborate with each other emotionally. We successfully touched the lives of 150,000+ employees through 431+ initiatives, witnessing a three-fold increase in employee participation virtually.
We created three aspects essential to shaping employee experience:
1. Self-Help: Emphasises providing our employees the right tools and resources for them to take charge of their wellbeing.
2. Micro-Environment: Our objective is to create an environment that is conducive for individuals to work together, seamlessly.
3. Macro Environment: The focus here is on driving the programs centrally, conceptualising policies keeping the user at the centre.
Great Place to Work® and Fortune have recognised Infosys as one of the Best Big Companies to Work For™. In alignment with the organisations’ social value themes to ensure Employee wellbeing and health improvement, Infosys invests in following engagements:
• New approaches to focus on prevention, resilience supported by internal policies. For instance, digital platforms for scientifically validated therapies such as cognitive behavioural therapy (CBT) to improve access to care options.
• Infosys Employee Assistance Programme, powered by LifeWorks via Generali, a 24/7 service for our employees or eligible dependents.
• Infosys, in collaboration with Virgin Pulse are committed to augment health and wellness agenda of UK by providing free/subsidised memberships.
To monitor the effectiveness of these programmes our HR team conduct regular surveys, and as part of town halls take direct feedback. Data collected is used to ensure that the programmes are reaching the right people and are adjusted to meet the changing needs of our employees.
Pricing
- Price
- £157 to £1,021 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No