Skip to main content

Help us improve the Digital Marketplace - send your feedback

BAE Systems Applied Intelligence Limited

BAE Systems Collaborative Cloud Development Environment

BAE Systems Collaborative Cloud Development Environment is a rapidly deployable platform-in-a-box accelerator, optimising productivity for modern software teams. Developers write code in a cloud-hosted developer desktop without the distractions of infrastructure provisioning. Our environment includes a pre-configured development toolset enabling rapid implementation of DevOps practices and delivering better applications faster.

Features

  • Secure Cloud hosted development environment (remotely accessed)
  • Automated deployment of development platform
  • Pre-configured Toolset, including single sign on and code repository
  • Collaboration tooling such as issue tracking and Wikis
  • Automated Continuous Integration and Continuous Delivery (CI/CD)
  • Artefact Repository Manager
  • Data Import and Backup & Restore capabilities
  • Identity & Access Management
  • System Orchestration and Optimisation
  • Mission Application Hosting

Benefits

  • Rapid Deployment: Quickly spun up development environment, saving time/resources.
  • Automation: Ability to build pipelines and deploy artefacts rapidly
  • Increased Productivity: Focus on coding with automated toolset deployment.
  • Driving Innovation: managed  infrastructure, enables experts to thrive
  • Consistency and Standardisation: Automated processes ensure uniformity across projects/teams.
  • Seamless Collaboration: Remote access enables effective teamwork, regardless of location.
  • Secure: locked away and, can't be access from private domain
  • Industry-standard dev toolkit: essential tools for comprehensive development workflows.
  • Elevated Collaboration: Streamlined dev environment fosters teamwork, enhancing performance.
  • Effective Recovery: Data is backed up and restored, instilling confidence.

Pricing

£15,000 a licence a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at government.tenders@baesystems.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 2 3 2 9 9 5 9 5 4 6 5 9 4 3

Contact

BAE Systems Applied Intelligence Limited Jules Fraser
Telephone: 03301 580 051
Email: government.tenders@baesystems.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
The service needs to be deployed into a new Azure subscription in a customer's Azure tenant.
System requirements
  • Customer to provide a new Azure subscription with necessary permissions
  • Users have access to the subscription from their existing devices
  • Supplier administrators require ongoing admin access within the new subscription
  • Customer to provide and maintain necessary clearances for supplier admins

User support

Email or online ticketing support
Email or online ticketing
Support response times
Refer to T&Cs for priority definition

Priority 1 - 4 Business Hours
Priority 2 - 8 Business Hours
Priority 3 - 2 Business Days

Business hours are UK working days 0900 - 1700
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide security patching as part as our mandatory service

These remote support levels are not included in the cost of the license.

On-site support would be an additional cost. It would be on a T&M basis as per the standard rate card.

Cloud Support Engineers are available upon request. Arrangements will be determined with the customer as required.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide onboarding and offboarding as a service. Optional training is available if required.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
A data extract will be made available as part of the decommissioning process.
End-of-contract process
We provide a decommissioning process included in the price of the contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
Users access the service using a browser via a VM on their work computer.
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
The service utilises and inherits the comprehensive and effective features developed by Microsoft, as this underpins our service. Microsoft has undertaken comprehensive testing to evaluate the compatibility and effectiveness of Azure with assistive technology, ensuring inclusivity and accessibility for users with disabilities.
API
No
Customisation available
Yes
Description of customisation
Customisations of the service as a whole are available upon request at additional cost on a per request basis.

Users of the service will be able to access a pre-defined list of COTS Apps.

Customisation of the service's existing COTS Apps provided as standard within COTS Apps.

User permissions/roles will determine who can customise within COTS Apps.

Scaling

Independence of resources
CCDE inherits all of Azure's features and functions. This includes autoscaling. 

As part of commissioning we understand how many users may be required to use the service.

Our pricing is based on expectation of there being no more than 30 users.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can extract their data using File transfer on their environment.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Any type of file can be transferred from the service.
  • Extracts will be in formats that the service's components allow
  • Note that the service does not manipulate files
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Any type of file can be uploaded to the service.
  • The service's COTS components have their own supported import formats.
  • Note that the service will not manipulate any such uploads.

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We have a range of availability options which are dependant on specific customer requirements.
Approach to resilience
The service's resilience inherits and utilises the resilience of Microsoft Azure.
Outage reporting
The project team will receive automatic alerts notifying them of any outages.

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
There are a small number of roles (and responsibilities) for the service.

These are:

The deployment, install and setup of the service
The administration of the service
1st line support
2nd line support
3rd line support
Service cloud platform administration
General users
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Lloyd's Register
ISO/IEC 27001 accreditation date
24/11/2022
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
NCSC Certified Incident Provider

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Details to be provided upon implementation.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Details to be provided upon implementation.
Vulnerability management type
Undisclosed
Vulnerability management approach
Details to be provided upon implementation.
Protective monitoring type
Undisclosed
Protective monitoring approach
Details to be provided upon implementation.
Incident management type
Undisclosed
Incident management approach
Details to be provided upon implementation.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

For information on our Environment and Climate Change response please see https://www.baesystems.com/en/sustainability/environment-and-climate-change

Covid-19 recovery

For information on our COVID-19 response please see our website https://www.baesystems.com/en/covid-19-our-response

Tackling economic inequality

For information on our contribution to the UK and its regions please see https://www.baesystems.com/en-uk/our-contribution-to-the-uk-and-its-regions

Equal opportunity

For information on our processes in creating Equal Opportunities please see https://www.baesystems.com/en-uk/careers/careers-in-the-uk/diversity-and-inclusion-in-the-uk

Wellbeing

For information on on how we support Wellbeing in the workplace please see https://www.baesystems.com/en/sustainability/safety-and-wellbeing/wellbeing

Pricing

Price
£15,000 a licence a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at government.tenders@baesystems.com. Tell them what format you need. It will help if you say what assistive technology you use.