Secure Gateway Services for Cloud - Assured access to WAN and Cloud services
Thales specialise in the design, implementation, transition and operation of accredited boundary protection services, providing customers with the capability to allow data up to OFFICIAL SENSITIVE, to flow into and out of their secure network PSN/PSNfP/IPED to external networks of lower security i.e. connections from secure networks to the internet.
Features
- Customer requirements definition e.g. resilience, availability and bandwidth
- Design of accredited Gateway services to OFFICIAL SENSITIVE
- Develop plans and strategies for implementation and transition
- Guidance on security compliance and policy requirements
- Modular Functions (web/email proxy, PSN connectivity, secure DNS, RAS, etc.)
- Connected to Customer Network PSN PSNfP and the Internet
- Fully managed and protectively monitored, including the complete ITIL stack
- Operates within a fully resilient architecture with Disaster Recovery
- Complete end-to-end secure managed solution set-up and in service quickly
- ISO27001, ISO20000 ITIL accredited services and Cyber Essentials
Benefits
- Thales expertise and experience: designs based on tested, accredited solutions
- Maximise cost efficiencies, NCSC cloud security principles design
- Network agility: reduce OpEx, CapEx, and effort required adding locations/devices/apps.
- Cost effective: modular design with flexible hosting options
- Business continuity: intent-based networking automates app assurance and business insights.
- Highly secure, flexible WAN connectivity, PSN optimisation
- End-to-end threat protection and unified access security
- Reliable operations reinforced with pro-active customer support
- Simplified threat prevention with the shortest time to threat detection
- Secure services delivered, managed and monitored from List X facility
Pricing
£999 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
8 4 7 2 6 3 5 2 1 4 7 2 2 0 9
Contact
Thales UK Ltd
Anne Francis
Telephone: 07815636634
Email: fcmo@uk.thalesgroup.com
Service scope
- Service constraints
- Customers will be required to comply with security policies when consuming services at OFFICIAL, OFFICIAL SENSITIVE or PSN PROTECTED levels. Thales offer consultancy for customers to the current status against the compliance required and detail approaches to mitigation against any shortfalls in that compliance.
- System requirements
-
- Customer will maintain PSN Code-of-Connection for their Data Centres
- Customer will support accreditation and assurance activities
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Our Service Desk and Incident Management team are
- available 24x7x365
- accredited to ISO27001 and ISO20000 for Service Management
- all SC and NPPV3 cleared
Response is based on SLAs and service requirements agreed with the client. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Support is provided in line with customer specific SLAs.
Service Delivery Managers are assigned to each client.
Support is available via phone, e-mail or face-to-face meetings when required. Typically, the contract of work shall specify the required frequency of meetings, and further arrangements can be made as appropriate. We work closely with our customers to ensure that they have the support they require throughout the project; the basis of the support will depend on the specific needs of the project, the services procured, and the customer. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Thales provide assistance to customers for the design of their services which provides an assured / accredited and secure way of accessing information over different classifications of networks, and bearers of opportunity.
Thales offers assistance with implementation and transition to new services. This can be provided for green field sites where no previous solution is in place. Thales can:
• Carry out Site Surveys.
• Develop Transition Plans / Strategies.
• Develop Implementation Plans against previously developed designs. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- We will provide an extract of the data held by Thales to the customer in an agreed format.
- End-of-contract process
-
At the end of the contract the data is provided to the customer in an agreed format (CSV or xml) and then deleted from Thales systems.
For an additional fee, Thales can return the data in alternative formats or retain the data for an extended period if required.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Infrastructure is monitored 24x7 for availability and capacity, in line with ISO27001 and ISO20000 and reported on monthly within the service packs. Proactive events, including capacity threshold breaches are also monitored by the Thales NOC, who will initiate playbooks to mitigate the impact of the event before it becomes user impacting or work with the customer where needed to profile the service within SLA.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Other
- Other metrics
-
- Availability metrics and SLA compliance
- Bandwidth utilisation
- AV and anti-malware reports
- Capacity reports
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- Encrypted traffic, authenticated users
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Access restrictions
Availability and resilience
- Guaranteed availability
-
SLAs for availability are agreed with the customer dependant on needs and services procured.
Thales Gateway Services are delivered as a geo-graphically diverse high availability service designed to exceed 99.95% availability. - Approach to resilience
- Available on request
- Outage reporting
-
Thales provides 24x7 monitoring at List-X PASF UK Network Monitoring Centre.
In the event of an outage, a Service Delivery Manager will inform customers, and a Major Incident Manager will be appointed. Outages will also be reported in the Service Delivery Management report.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Access to management interfaces is restricted to appropriately security cleared and authorised Thales staff members. Network segmentation is in place to secure management interfaces, located within secure processing facilities. These configurations are subject to CHECK ITHC. Management interfaces are not exposed to the internet. All event logs are sent to the Thales SOC for protective monitoring and retained for 12 months. Thales systems are also subject to internal and external audit.
Support – No 3rd parties are provided with remote access to the Thales SOC network. Only trusted suppliers are used, with contractual and NDA clauses used to protect information. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- LRQA
- ISO/IEC 27001 accreditation date
- 27/01/2022
- What the ISO/IEC 27001 doesn’t cover
- The Thales UK Information Security Management System (ISMS) incorporates the people, processes and technologies supporting the portfolio of network services.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- PSNSP certifications up to OFFICIAL SENSITIVE
- Police Enhanced Regime
- ISO27001 and ISO20000 Accreditation
- PASF
- List-X
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
ISO 20000
ISO 27001
PSN services at OFFICIAL
Police Enhanced Regime
Cyber Essentials Plus
NCSC CCSC (Certified Cyber Security Consultancy)
NCSC CCP (Certified Cyber Professional)
Sector specific accreditation
List X
PASF
ISO9001 - Information security policies and processes
-
The service is certified to a number of different standards, including ISO 27001:2013. This is based on an ISMS (Information Security Management System) which consists of Thales UK policy, process and procedures in addition to ISO 27001 clauses. The ISMS is audited by independent 3rd parties annually.
An annual IA (Information Assurance) schedule ensures that policies are implemented, assessed and effective. This includes internal audits, external audits, Security Working Groups, Security Awareness campaigns.
The reporting structure is defined in the Thales IA Management Plan, along with incident management processes and RACI matrix.
The service assurance is also achieved through additional certifications and accreditations, which include audit reports being submitted to the Cabinet Office, NCSC and the National Police Information Risk Management Team (NPIRMT).
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All Requests for Change (RFC)’s are presented to a Thales’ Change Board (CAB). The CAB is attended by Business, Technical, Service Delivery and Information Assurance stakeholders along with the owner of the RFC’s. On receipt of a request to make changes to the service; an RFC will be generated and submitted to CAB prior to delivery. Changes will be notified to customer CABs where there is a change to the device(s) which may impact service.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
As part of the Thales compliance requirements, Thales has a requirement to be able to adequately respond to Low to Critical level patches and vulnerabilities.
The Thales SOC utilise an IBM vulnerability management module to prioritise vulnerabilities. The SOC also utilise various threat intelligence and vulnerability feeds to stay informed of the latest vulnerabilities. The SOC then advise on recommended activity and mitigations.
Thales Change Management is then used to apply patches in a managed and timely manner – to prevent disruption to customer services. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
The Thales SOC provides protective monitoring and threat intelligence to identify potential compromises, cyber-attacks and non-compliance.
The SOC follow processes and escalation paths in response to potential compromises and security incidents. A severity matrix is used to assign a priority to each incident. The priority determines the response for the incident. Agreed stakeholders and contacts are contacted depending on the severity.
Incidents are responded to within SLA – in accordance with the assigned priority. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Thales operates a 24 hour a day 365 days a year UK Network Operations Centre which utilises a monitoring platform and trouble ticketing platform for Incident and Problem Management. The Service desk is accredited to ISO 20000, ISO27001 and all processes are aligned to ITIL.
Thales adopts a tiered approach to incident management. Tier 1 has the technical knowledge to triage all incidents, and will categorise and prioritise in line with agreed Customer priorities. The team is skilled to offer technical and product knowledge to resolve incidents, respond and deploy remote teams or involve third parties if required.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
-
The environment has been built in line with NCSC security procedures and managed through appropriate policies. It is also subject to annual ITHC in line with maintaining GDS-A accreditation for operation.
Segregation of traffic is achieved using secure tunnels and vlans.
Separate appliances where required.
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Fighting climate change
-
Fighting climate change
Thales UK has a clear focus on fighting climate change. Thales has set itself a target of becoming a Carbon Net Zero company by 2030, powered by cleaner energy used more efficiently at our sites and for our business, with renewable energy supplies.
There are several strategies that Thales and our Cyber offerings implement to fight climate change, including:
1) Sustainable future. Thales has put fighting climate change at the centre of its strategy, highlighted by the fact that tackling climate change is one of the 4 Thales strategic pillars. Thales Cyber security and consultancy offerings have enabled companies to develop secure and sustainable products, prevent product recalls, learn digital lessons and reduce rework that go towards meeting their strategic sustainability objectives and tackle climate change.
2) Travel reduction. Thales has introduced a Smart Working model to reduce the travelling required by the workforce. One pillar of this is arranging virtual meetings with Customers, Stakeholders and interested parties. Thales has also deployed numerous tools to enable Thales UK to effectively operate via remote / smart working. It is expected that meetings under G-Cloud could implement this methodology to offer the same benefits to the customer. Running on managed services means efficient use of shared and common infrastructure, allowing sustainable collaboration from existing infrastructure, where organisations or teams may once have had dedicated infrastructure are now allowed to work remotely, securely.
3) Carbon reduction. Thales strives to implement carbon reduction, through a series of targets to reduce carbon emissions annually. Smart working, championed by our Cyber Security Consultants and offerings has been a key enabler of this strategy. Additionally, services enabling secure collaboration mean that businesses do not need to procure additional new hardware, thereby having a positive environmental impact. - Covid-19 recovery
-
Covid-19 recovery
Thales has put a clear focus on a UK-wide recovery from the Covid-19 Pandemic.
Throughout the pandemic, Thales UK responded as a member of the Ventilator Challenge UK consortium, which brought together companies from the Aerospace, Automotive, Medical and other sectors to deliver more than 13000 ventilators in response to the pandemic. This demonstrated that Thales UK was able and willing to mobilise its capabilities, resources and know-how, to be among the first to respond to the national emergency as an integral part of the UK’s critical national infrastructure and strategic supply chain, was formally recognised by HM government and led to an award for pandemic service.
Throughout and since the Covid-19 pandemic there has been a concerning rise in Cyber security threat with sector specific cyber-attacks being directed towards a number of critical infrastructure sectors. Thales’ cyber security offerings provide protection from these threats and have been provided to key services including the NHS, allowing national recovery from the pandemic. Thales Secure connectivity services and cyber consultants allow these key businesses and Critical National Infrastructure to have secure options in connecting and sharing securely with 3rd parties to recover and grow safely from the COVID 19 Pandemic.
In addition, Thales will continue to provide sustained and additional employment opportunities in high-skilled, high value, aspirational careers critical to national and business security that support future regional and national growth. This includes cyber specialists and consultants in regions across the UK, such as Doncaster and Ebbw Vale.
Pricing
- Price
- £999 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No