Skip to main content

Help us improve the Digital Marketplace - send your feedback

Unisys Limited

Unisys Public Sector Secure Cloud

The Unisys UK Public Sector Secure Cloud(UKPSC) service is an IaaS offering designed to provide a private secure virtual hosting capability for public sector customer applications and services that are required to meet the OFFICIAL protective marking. We also comply with any extra handling controls required for the 'SENSITIVE’ descriptor.

Features

  • Multiple datacentres providing HA and DR
  • Customer management of virtual computing and storage capacity
  • Full compute isolation from other tenants
  • Access to Common Services, NTP, DNS, Patching, AV
  • Ability to provide service onto PSN-A and LECN
  • Use, cost, capacity and performance SLA and management reporting
  • Monitoring and backup of the environment to agreed SLA's
  • Vulnerability Management
  • Network Load Balancing
  • Security Services, Annual Pen-Test, IDS, SIEM, Malware protection

Benefits

  • Scalable and flexible service
  • Multiple Data Centres located in the UK
  • Shared Resource pool
  • Enterprise ready
  • aaS model
  • Utility based pricing
  • Community or Private Secure Cloud
  • Broad Network access
  • UK Government Accredited and ISO27001 certified
  • Vulnerability scanning and management

Pricing

£385 a virtual machine a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at cloudstore@unisys.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 7 3 5 8 7 9 8 8 6 0 9 8 7 5

Contact

Unisys Limited Simon Arnold
Telephone: +44(0)7808391153
Email: cloudstore@unisys.com

Service scope

Service constraints
The fully operational service is delivered from two datacenters.
The solution offering is based on Intel chip set.
System requirements
  • Connectivity via WAN or LECN for Network access
  • Client workstations must have supported levels of software
  • Client workstations must have up-to-date anti-virus signatures
  • The hypervisor layer is provided by HyperV
  • Tenant IP scheme is based on IPV4

User support

Email or online ticketing support
Email or online ticketing
Support response times
Restore service within:
4 hours for Severity 1 outage;
24 hours for Severity 2; and
72 hours for Severity 3
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Level 1: 24x7 operations and monitoring.
Level 2: Network, OS, storage & backup support with OOH on call support.
Application Support available on request.
Incident escalation process available and tailored to suit Tenant's requirements
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Work with the Tenant to develop, agree and execute an on-boarding plan,
• Key contacts and points of escalation
• The expected payload and services being considered for deployment onto UKPSC
• Details of expected/required VMs and Storage capacity and considerations of whether it’s a ‘vanilla’ implementation or migration of existing services or a mixture of a combination of transition scenarios.
• Assist the Tenant develop the HLD and the transition plan
• Required and expected network design including how the Tenant and their clients will consume the service. Considerations need to be given to:
Requirement for a dedicated WAN link or are the services being delivered/consumed on the LECN
The level of VLAN separation required
Is there a requirement for Network Load Balancing
What IP Scheme will be used;
What firewall rules are likely to be needed;
Assist the Tenant security consultant to develop and agreed the accreditation scope and requirements

• Assisting with any specific Accreditation and ITHC obligations
• Capturing the details of the administrators for initial account creation
• Develop and agree Engagement Management that captures all aspects of PMO running a Cloud based engagement, of reporting, commercials, contractual and SLA management.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
At service commencement, Unisys will work with the Tenant to build an off-boarding plan. This will include:
• Migration Plan – what Storage and/or VMs need to be moved and to where? What technical and personal security measures will be followed to transition or transport the data.
• Return of any Tenant specific documentation and certification
• Secure Information Destruction plan. Removal of Virtual Machine images and backups; Secure disposal of Tenant data
• Termination and decommissioning of any VPN or dedicated network lines.
End-of-contract process
When leaving the service, Unisys will work with the Tenant to review update and execute the off-boarding plan that was created at contract start. Unisys will appoint a Service Transition Lead (STL) who will be responsible for seamless and secure transition of service.

Parallel work streams will be commenced , including

• Technical Migration Stream – covering seamless migration of tenant data, storage and server estate. this includes the creation of Operational Working agreement with the tenant's new supplier.

• Security & Audit Stream – what needs to be done to ensure accreditation and security requirements are maintained during service transition. This stream will document the agreed process for secure destruction of tenant environment as well as how removable media and current archived backups are to be managed and transitioned.

• Commercial and Contractual stream: Contract Termination and decommissioning of the service including secure removal of dedicated tenant networks and VPN links that may have been setup during contract term.

Costs for STL is included in the contract; however, any tenant specific secure destruction and data and VM transition activity is subject to Change Control.

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
No
Independence of resources
Tenant Architecture is delivered via a N+1 design whereby each tenant's environment is hosted on their own dedicated Cluster controlled by resource reservation.
This strategy eliminates noisy neighbour situation while guaranteeing resource availability to tenant VMs.

At the Storage layer LUNs provide the tenants storage needs on a tiered SAN that automatically repurposes workloads depending on I/O demand and utilization.

All of the UKPSC offerings are monitored 24x7 by an operational team who escalate to wider support teams.
Usage notifications
Yes
Usage reporting
  • Email
  • Other
Other usage reporting
Users will be sent email notification at least a month prior to nearing the service limits.
If available they will be also contacted by phone to notify them of the nearing service limit

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • CommVault technology provides backups
  • The Virtual Server iDataAgent delivers protection
  • IDataAgent provides granular backup/restore options
  • Tenant manages Application or Database specific backups
  • Daily full or incremental backup is optional
  • Option to perform Ad hoc backups is available
  • Optional service to backup to Public Cloud or Tape
  • Restores requested via a service request VM target instance
  • Tenant specific backups - copying files to target VM
  • Standard VM backup service is daily incremental and weekly full
Backup controls
Daily backups of the infrastructure elements are written to backup storage array and are replicated to a secondary site to provide additional protection.

The following optional services are also available and managed by the Unisys support team:
- An architecture to deliver the required RTO & RPO that meets the Tenants DR/BCP obligations.
- Tertiary copy Secure Cloud based backups
- Tape based backups ready to be shipped to external 3rd party secure location
- Backup-as-a-service for additional protection of non-standard payloads.
- A high availability option capable of running in Active/Active configuration.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks
Some buyers may opt to deploy secure dedicated WAN links into Unisys datacentres by presenting their network connectivity at the perimeter boundary of the Unisys PS Cloud.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
1. InterDC traffic is encrypted
2. All backups are de-duped and encrypted
3. All external user communications are over HTTPS using TLS1.2 or above
4. Tenant environments are segregated via VLANs with default gateway being the cloud firewall.
5. All storage is encrypted for data at rest

Availability and resilience

Guaranteed availability
• To provide availability of 99.9%.
• Measure availability based on system/VM uptime
• Restore service within 4 hours for a Severity 1 outage, within 24 hours for Severity 2 outage, and within 72 hours for a Severity 3 outage.
Approach to resilience
At the external network layer there are two resilient and redundant, diversely routed links into LECN from each of the Unisys DCs providing PS Cloud services.

Within the DCs all perimeter switches, NLBs and firewalls are paired in active/passive mode.

The remainder of the infrastructure also has redundancy and resiliency built into the design.

Detailed design can be made available on request
Outage reporting
Nagios tool provide Service Management via dashboards that are operated by the Operations team.

Critical alerts and threshold warnings are displayed using RAG status as well as relayed to service desk as email alerts.

Tenants have the option of utilizing this setup or developing their own monitoring services for their PaaS and SaaS implementations.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
Access is via a bastion host with username, password and TOTP MFA
Access restrictions in management interfaces and support channels
Cloud Management Environment (CME) separation is achieved at Management, Network, Hypervisor and Storage Layers.

The CME does not have access to the tenant’s environment within the platform.

CME is responsible for monitoring and managing the cloud platform, but does not monitor guest OSs.

At network layer, data is separated by VLANs from virtual machines to the physical network switching infrastructure.

Inter VLAN traffic flow is protected by a firewall.

Management of Hypervisor Layer hosts and the VMs are separated; traffic to the hypervisor host is physically separated by using different network adaptors and switches to those serving tenant VM traffic.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
14/10/21
What the ISO/IEC 27001 doesn’t cover
All controls identified in ISO 27001 annex A are implemented across Unisys domains covered by global certificate number IS 58442. This includes the UK entity for this framework, Unisys Limited. The Statement of Applicability covers Unisys Managed Security Services, Cloud and Infrastructure Services, Application Services, Unisys Facilities and Administration, and IT Operations.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • Police Assured Secure Facility
  • NPIRMT accreditation to OFFICIAL for the UK Home Office
  • PSN Code of Connection
  • PSNfP Compliance Certificate

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
CESG Security marking scheme
Information security policies and processes
PS Cloud Information Security (IS) incorporates Unisys Corporate IS policy.

Adherence and compliance to both of these policies, for delegates engaged in providing PS Cloud services, is a mandatory requirement for all delegates joining the team.

All delegates are security vetted to NPVV3 and are provided with annual Security briefings.

Compliance renewals and Joiners & leavers registers are reviewed, monitored and reported on quarterly bases.

Ad-hoc unannounced spot checks are also carried out by the Security Authority who is responsible for managing and reporting on all PS Cloud related Information Security incidents.

Further, delegates are also presented with the PS Cloud SyOps as well as the individual tenants’ SyOps that detail how the system meets and delivers the G Cloud Security Principles.

Delegates roles and responsibilities are defined by the processes and procedures outlined in the accompanying SOPS documentation.

PS Cloud Service Catalogue details the Security Risk and Emergency Security Incident management procedures.

The PS Cloud Security Authority has a dotted line into the Unisys UK CIO and has a seat on the Corporate Security Governance board

Unisys operates an anonymous incident and dispute reporting scheme.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Dedicated Cloud SDM role owns and manages the governance and ITIL based BAU Service Management function.

The Change Management process is governed by the Change Advisory Board (CAB), who convene once a week to review and authorizes all changes and problem reports raised.

The SDM also provide monthly report on all aspects of the service, including high priority faults, security incidents and changes implemented.

They also develop and present the Capacity Management report that details growth and projection of any future (6 month view) capacity issues to the cloud as well as on any tenant systems.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All VMs are protected by perimeter security provided by a combination of Physical and Virtual Firewalls;

Intrusion Detection System (IDS) Security Onion provides perimeter security.

SIEM – provided by ELK – available to Tenants as option service

Regular Vulnerability Scans are performed on all UKPSC hosted Tenants
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The service utilises a network IDS (Security Onion) to monitor and analyse network traffic for malicious activity.

Protective Monitoring is performed by security information and event management software from ELK which collates and analyses the log files of all servers, machines and network equipment.

These tools have been configured to analyse and alert on all 12 Protective Monitoring Controls described in the UK Governments Good Practice Guide 13 document.

Unisys BAU Ops team monitor the service 24 x 7 x52 using Nagios.
Incident management type
Supplier-defined controls
Incident management approach
PS Cloud SDM owns and manages the Cloud Incident Management (IM) process.

During on-boarding stage, tenants are introduced to Unisys IM process that details how incidents are logged with the service desk, how to allocate priority and how incident flow takes place from being received by the appropriate resolver-groups until its resolution.

The Incident severity levels are defined by the incident characteristic that are defined in the Cloud Service Manual, which also details the process flow between Incidents and Problem record and how Incident and Problem Management tracking and reporting is performed.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Hyper-V
How shared infrastructure is kept separate
Separation between tenants is achieved at all layers of CME; which does not have access to the tenant’s environments or guest OSs.

Data is separated by VLANs from virtual machines to the physical network switching infrastructure.

Inter VLAN traffic flow is protected by firewalls.

Traffic to the hypervisor host is physically separated using different network adaptors and switches.

All storage is hosted on a fibre channel SAN, with each tenant being allocated separate cluster shared volumes for their virtual machines and data.

Backup is performed at the platform level and does not have direct access to the tenants’ internal environments.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Our primary and secondary data centres adhere to the code. They are modern datacentres with a Power Use Effectiveness (PUE) of at least 1.2, which is very good.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our plan over the contract duration includes: (1) Using resources in an environmentally responsible manner. We will continue to invest to minimise energy usage across our buildings, the largest contributor to our UK carbon footprint. Our flexible working policy reduces both our real estate footprint and associated corporate travel. We increasingly source energy from renewable sources, and this now accounts for 30% of purchased electricity (2) Working with sustainable partners in the supply chain. We assess key partners in our supply chain using several measures including independent sustainability ratings from EcoVadis. We seek to grow relationships with suppliers with formal ESG policies and those who are building out their ESG programs. (3) Fostering environmental responsibility among our employees (4) Reducing or eliminating the use of hazardous substances (5) Sustaining effective product recycling and reclamation programs, and (6) Continual improvement of our environmental performance. We set a 20-year target in 2006 to reduce our Scope 1 and Scope 2 Greenhouse Gas (GHG) emissions by 75%, and achieved that goal in 2021, 5 years ahead of schedule. Current objectives are to reach net zero GHG emissions for Scope 1 and Scope 2 sources by 2030 and to explore viable options to address residual, harder to abate Scope 1 and Scope 2 emissions. These include potential technological developments or tools such as renewable energy credits to address Scope 2 emissions and carbon credits to support climate mitigation activities beyond our value. The services enable workloads to be migrated from dedicated client-site IT infrastructure to more energy efficient cloud-based platforms, reducing carbon footprint by improving energy efficiency. Highly energy efficient hosting includes innovative direct air evaporative cooling which saves up to 50kW in energy consumption per rack per year.

Covid-19 recovery

Unisys is an equal opportunities employer, focused on building a diverse workforce that represents the communities we live in and serve. Our flexible working policy supports the COVID-19 recovery effort, enabling effective social distancing, and supporting remote working. We support and have equitable processes for retraining and career development. Our Employee Development Plan features annual goal and performance reviews, training, and career development to give employees opportunities to achieve personal and professional goals. All Unisys associates have access to the Unisys University, which has over 50,000 training artefacts covering technical and soft skills development. Technology courses include in-demand areas such as cloud-based technologies and cybersecurity. We also care about supporting the physical and emotional wellbeing of our employees and provide a highly flexible benefits package with a wide range of leisure, lifestyle and wellbeing benefits for employees and their families. Awareness of these benefits are promoted by assigned wellness officers, who encourage employees to use the resources available. The wellness team also set regular challenges to promote fitness and the benefit of connecting with the environment.

Tackling economic inequality

Our flexible working policy supports the creation of employment opportunities particularly for those who face barriers to employment and/or who are located in deprived areas. Our ability to offer home-based roles opens up job opportunities to suitable candidates in all locations, and not just those in commuting distance of a Unisys office. The cloud and security services in scope of this contract cover in demand and high growth technologies. Throughout the duration of this contract, Unisys associates will gain practical experience and highly desirable and transferable skills in the design and delivery of services these high-demand and high growth sectors. This will enhance their opportunity for career development and advancement within or outside Unisys. Career and skills development is supported by an Employee Development Plan features annual goal and performance reviews, training, and career development to give employees opportunities to achieve their personal and professional goals. All Unisys associates have access to the Unisys University, which has over 50,000 training artefacts covering technical and soft skills development. Technology courses include in-demand areas such as cloud-based technologies and cybersecurity. We also have alliances with (but not limited to) Google; Apple; Oracle; Cisco; Dell; EMC; Intel; Motorola; Micro Focus; Red Hat; Symantec and VMware and have access to alliance training and certification programs to further expand the range of career development opportunities for our staff.

Equal opportunity

Unisys views inclusion and diversity as not only the right thing to do, but a business imperative. We welcome associates of all abilities and are recognised as an employer of choice for people with disabilities, achieving a score of 100% on the Disability Equality Index for the third consecutive year in 2023. To measure and increase the representation of disabled people, we ask all associates to provide various statuses on a voluntary basis via our HR system. The data helps us understand the needs of our population and develop recommendations and action plans for improvement. As of April 2024, 9% of our workforce self-identifies as having a disability. Our Talent Acquisition team works with business leaders to help recruit and develop ways to increase this representation. An example is an initiative launched in 2020 to increase our neurodiverse population. The Neurodiversity at Work Programme gives neurodivergent people equal access to employment opportunities. In 2021 we joined the Valuable 500, a network of 500 global CEOs committed to diversity and transforming disability inclusion through business leadership and opportunity. Initiatives to support associates with disabilities include the Global Group for People with Diverse Abilities, an associate-led internal community group that provides a welcoming and inclusive space for individuals with different abilities and their allies. In terms of skills development, Unisys supports all associates in developing relevant new skills with personalised career development plans. This includes training courses offered via the Unisys University, many of which result in recognised qualifications. Technology courses include in-demand areas such as cloud-based technologies and cybersecurity. Our alliances with (but not limited to) Google; Apple; Oracle; Cisco; Dell; EMC; Intel; Motorola; Micro Focus; Red Hat; Symantec and VMware provide access to alliance training and certification programs to support career development.

Wellbeing

We care about supporting the physical and emotional wellbeing of our employees and provide a highly flexible benefits package with a wide range of leisure, lifestyle, protection and wellbeing benefits for employees and their families. Details of the benefits are published on the intranet. A helpdesk is also provided to answer any questions. The package of benefits is designed to support the physical, emotional and financial wellbeing of our associates. As everyone is different, the benefits options are flexible, to enable associates to choose the best options to help achieve the perfect work-life balance. Benefits cover: (1) Leisure: Annual Gym Membership (2) Lifestyle: with childcare vouchers, holiday trading and cycle to work protection (3) Financial: with Life Assurance, Critical Illness Insurance and Group Income Protection and (4) Wellbeing: with Travel Insurance, Dental Insurance, Healthcare Plan and annual Healthcare Screen. Awareness of these benefits are promoted by local wellness officers, who encourage employees to use the resources available. These wellness teams also set regular challenges to promote fitness and the benefit of connecting with the environment. Recent examples include the annual UK Charity Hike. The 2022 event, a 27km hike in the Chiltern Hills, raised over £5,000 for mental health charity Mind UK. The 2023 25km hike in the Peak District raised £2,700 for Cancer Research UK, Mental Health Foundation and the Alzheimer’s Society. To support mental wellbeing, the Mindfulness program has daily live and recorded meditation sessions to help reduce stress and increase productivity through meditation. In addition the online Unisys University contains a number of free training courses, available to all associates, including Working Well with Others; Optimising your Workplace Wellbeing; Making the Most of Organisational Change, Forging Relationships with External Stakeholders and Difficult People: Why They Act That Way and How to Deal with Them.

Pricing

Price
£385 a virtual machine a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at cloudstore@unisys.com. Tell them what format you need. It will help if you say what assistive technology you use.