BAE Systems Collaborative Cloud Development Environment
BAE Systems Collaborative Cloud Development Environment is a rapidly deployable platform-in-a-box accelerator, optimising productivity for modern software teams. Developers write code in a cloud-hosted developer desktop without the distractions of infrastructure provisioning. Our environment includes a pre-configured development toolset enabling rapid implementation of DevOps practices and delivering better applications faster.
Features
- Secure Cloud hosted development environment (remotely accessed)
- Automated deployment of development platform
- Pre-configured Toolset, including single sign on and code repository
- Collaboration tooling such as issue tracking and Wikis
- Automated Continuous Integration and Continuous Delivery (CI/CD)
- Artefact Repository Manager
- Data Import and Backup & Restore capabilities
- Identity & Access Management
- System Orchestration and Optimisation
- Mission Application Hosting
Benefits
- Rapid Deployment: Quickly spun up development environment, saving time/resources.
- Automation: Ability to build pipelines and deploy artefacts rapidly
- Increased Productivity: Focus on coding with automated toolset deployment.
- Driving Innovation: managed infrastructure, enables experts to thrive
- Consistency and Standardisation: Automated processes ensure uniformity across projects/teams.
- Seamless Collaboration: Remote access enables effective teamwork, regardless of location.
- Secure: locked away and, can't be access from private domain
- Industry-standard dev toolkit: essential tools for comprehensive development workflows.
- Elevated Collaboration: Streamlined dev environment fosters teamwork, enhancing performance.
- Effective Recovery: Data is backed up and restored, instilling confidence.
Pricing
£15,000 a licence a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 2 3 2 9 9 5 9 5 4 6 5 9 4 3
Contact
BAE Systems Applied Intelligence Limited
Jules Fraser
Telephone: 03301 580 051
Email: government.tenders@baesystems.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- The service needs to be deployed into a new Azure subscription in a customer's Azure tenant.
- System requirements
-
- Customer to provide a new Azure subscription with necessary permissions
- Users have access to the subscription from their existing devices
- Supplier administrators require ongoing admin access within the new subscription
- Customer to provide and maintain necessary clearances for supplier admins
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Refer to T&Cs for priority definition
Priority 1 - 4 Business Hours
Priority 2 - 8 Business Hours
Priority 3 - 2 Business Days
Business hours are UK working days 0900 - 1700 - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide security patching as part as our mandatory service
These remote support levels are not included in the cost of the license.
On-site support would be an additional cost. It would be on a T&M basis as per the standard rate card.
Cloud Support Engineers are available upon request. Arrangements will be determined with the customer as required. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide onboarding and offboarding as a service. Optional training is available if required.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- A data extract will be made available as part of the decommissioning process.
- End-of-contract process
- We provide a decommissioning process included in the price of the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Users access the service using a browser via a VM on their work computer.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- The service utilises and inherits the comprehensive and effective features developed by Microsoft, as this underpins our service. Microsoft has undertaken comprehensive testing to evaluate the compatibility and effectiveness of Azure with assistive technology, ensuring inclusivity and accessibility for users with disabilities.
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Customisations of the service as a whole are available upon request at additional cost on a per request basis.
Users of the service will be able to access a pre-defined list of COTS Apps.
Customisation of the service's existing COTS Apps provided as standard within COTS Apps.
User permissions/roles will determine who can customise within COTS Apps.
Scaling
- Independence of resources
-
CCDE inherits all of Azure's features and functions. This includes autoscaling.
As part of commissioning we understand how many users may be required to use the service.
Our pricing is based on expectation of there being no more than 30 users.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users can extract their data using File transfer on their environment.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Any type of file can be transferred from the service.
- Extracts will be in formats that the service's components allow
- Note that the service does not manipulate files
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- Any type of file can be uploaded to the service.
- The service's COTS components have their own supported import formats.
- Note that the service will not manipulate any such uploads.
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We have a range of availability options which are dependant on specific customer requirements.
- Approach to resilience
- The service's resilience inherits and utilises the resilience of Microsoft Azure.
- Outage reporting
- The project team will receive automatic alerts notifying them of any outages.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
There are a small number of roles (and responsibilities) for the service.
These are:
The deployment, install and setup of the service
The administration of the service
1st line support
2nd line support
3rd line support
Service cloud platform administration
General users - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Lloyd's Register
- ISO/IEC 27001 accreditation date
- 24/11/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- NCSC Certified Incident Provider
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Details to be provided upon implementation.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Details to be provided upon implementation.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Details to be provided upon implementation.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Details to be provided upon implementation.
- Incident management type
- Undisclosed
- Incident management approach
- Details to be provided upon implementation.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
For information on our Environment and Climate Change response please see https://www.baesystems.com/en/sustainability/environment-and-climate-changeCovid-19 recovery
For information on our COVID-19 response please see our website https://www.baesystems.com/en/covid-19-our-responseTackling economic inequality
For information on our contribution to the UK and its regions please see https://www.baesystems.com/en-uk/our-contribution-to-the-uk-and-its-regionsEqual opportunity
For information on our processes in creating Equal Opportunities please see https://www.baesystems.com/en-uk/careers/careers-in-the-uk/diversity-and-inclusion-in-the-ukWellbeing
For information on on how we support Wellbeing in the workplace please see https://www.baesystems.com/en/sustainability/safety-and-wellbeing/wellbeing
Pricing
- Price
- £15,000 a licence a month
- Discount for educational organisations
- No
- Free trial available
- No