DevSecOps/Secure Cloud Software Development
We are data exploitation, national security and law enforcement experts who leverage public cloud through DevSecOps services. We operate from a List X facility. We help clients move from legacy ways of working, to secure, automated and DevSecOps enabled capabilities for cloud access and development. We create accredited DevSecOps environments.
Features
- Assessment & implementation of public cloud features and benefits
- Cloud migration, legacy applications to cloud. Product and Technology Selection
- DevSecOps (GDS Alpha, Beta to Live) and DevOps Service Definition
- Security Consultancy - Software Development - Open Source Intelligence OSINT
- Data engineering, rapid innovation sprints and PoCs
- Agile delivery methods. Deploy services rapidly, providing value at pace.
- Data intelligence search capability utilising DevSecOps Elasticsearch expertise (Elastic partner).
- Secure by design - RBAC/IAM deployment and integration across services.
- Data intelligence services development including Search and Analytics.
- Service Support integrated with ITL systems ensuring reliability and resilience.
Benefits
- Improved operational efficiency through use of public cloud
- Increased automation of development reducing errors
- Expert knowledge and experience of cloud offering and workings
- Accelerated discovery, pilots and innovation
- Improved collaboration and data insights through cloud based solutions
- Agile adoption and best-practice through coaching and client support.
- Integrated applications across operational, policy and technology landscape
- Secure by default utilising DevSecOps and Cloud Architecture best practices.
- Improved client ability & resilience post engagement through Knowledge Transfer.
- Operational benefits and reduced risk through user-led feedback & engagement.
Pricing
£285 to £1,317.00 a user a day
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 7 9 9 4 7 2 4 2 2 1 0 4 5 7
Contact
Naimuri
Simon Wilcox
Telephone: 07799228430
Email: business@naimuri.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
- N/A
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- This will be contract dependent.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Contract dependent
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Collaboration and agile delivery methods
- Service documentation
- No
- End-of-contract data extraction
- Contract dependent
- End-of-contract process
- Time and Materials contract
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
- We provide an agile delivery capability that can be developed in line with our customer's ways of working. Our approach to providing support is based on the needs of the customer. We use the SRE (Site Reliability Engineering) Approach to maximise our support and development activities. Beyond this, we will aim to deliver a support service that fits the needs of the customer - This can include in person, telephone, email or web support.
Scaling
- Independence of resources
- This is a software delivery service - the users will have a Time and Materials contract guaranteeing access to our service 'the people'
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Other
- Other data at rest protection approach
- Bespoke services for our customers can be developed that will address customer's key challenges
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Contract dependent - we can develop bespoke services to suit the customer
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- JSON
- XML
- Data import formats
- Other
- Other data import formats
-
- CSV
- XML
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Contract dependent
- Approach to resilience
- Contract dependent
- Outage reporting
- Contract dependent
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- Contract dependent
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Other
- Description of management access authentication
- Contract dependent
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS
- ISO/IEC 27001 accreditation date
- Working towards 27001, will be in place prior to G Cloud13 going live
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- HMG Accreditation for specific system(s)
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Contract dependent
- Information security policies and processes
-
Contract dependent and
SPF (Security Protective Framework),
HMG Information Assurance Standards (IS1, etc.)
,OWASP
,10 Steps to Cybersecurity
,EUD Security Principles
,Cloud Security Principles
, Different types of accreditation/certification, i.e. ISO27001, Cyber Essentials, etc
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Contract dependent to meet customer requirements
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Contract dependent to meet customer requirements, including Cyber Essentials & ISO27001, IT Health Checks supported by various threat intelligence reports.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Contract dependent - platform specific requirements and tools for the management approach.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Contract dependent, both customer defined and Naimuri incident management processes followed
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Naimuri has a Environmental Impact Power Group responsible for coordinating the firm wide approach to sustainability and environmental impact.
Key approaches include:
Set up recording and monitoring of our Scope 1, 2 and 3 carbon emissions.
Created a carbon reduction plan - committed to achieving Net Zero emissions by 2050 or sooner.
We are establishing carbon literacy workshops for colleagues and partners to improve understanding and encourage more sustainable operations and behaviours.
Engaging with other customers and suppliers to look into more sustainable upstream and downstream results. - Equal opportunity
-
Equal opportunity
At Naimuri we actively promote a diverse and inclusive environment. We have partnerships with Manchester Digital (promoting women in IT), Coding Black Females, NorthCoders (An IT Bootcamp for people who are cross training or reskilling), and other initiatives.
We actively seek to recruit people from various backgrounds to build diversity in our teams, making sure we don’t just recruit degree qualified individuals. Each year we take on Apprenticeships, Graduates and early careers (people swapping careers or returning to work), and invest in their growth and progression thorough our early careers progression framework.
Our approach to recruitment is centred on our values and culture. We provide benefits to promote flexible working patterns including part time working, which allows many people who have found this a barrier to entering tech roles, the opportunity to join us and pursue their career. Our culture promotes a flat delivery structure on projects, giving everyone an equal voice in how the team operates and delivers. - Wellbeing
-
Wellbeing
We encourage, invest and enable our people to develop what’s important to them, resulting in company initiatives (we call them Power Groups). These promote people's wellbeing and improve our environmental impact. This in turn has led to people becoming training mental health first aiders or skilled to perform environment audits.
The Naimuri Mental Health Wellbeing Group has established multiple measures, including investment in time and funding, to support MH & Wellbeing. Regular wellbeing support and activities are established as BAU. There are regular monthly updates to firm wide briefings to maintain a strong leadership approach for values and messaging relating to MH & Wellbeing and the enablers required to support this (e.g., appropriate resourcing of projects).
Pricing
- Price
- £285 to £1,317.00 a user a day
- Discount for educational organisations
- No
- Free trial available
- No