Data Solutions
Providing a flexible approach to data management solutions, helping our clients take control and become data driven.
Security is paramount. We have years of experience in handling personal and sensitive data. Due to the fact that many of our products are built specifically to enable organisations to support vulnerable people or children, we understand the importance of security and compliance requirements. As standard, all of our products include a full audit trail of user activities and data processing. We use the most robust Azure security features to ensure your data is protected.
Our Data Platform originated in 2011 where it was designed and built in accordance with the ICO Principles of Data Protection by Design. These principles have remained the underlying foundation of our evolving technology throughout the passing of GDPR and the DPA 2018. The key elements of our Data Protection by Design approach are detailed here: we are ISO 27001
Data security is of paramount importance, which is why all Sentinel's solutions feature in-built data protection and settings to help organisations comply with the General Data Protection Regulation (GDPR), the Caldicott Principles and other controls relating to the use and sharing of personal or sensitive personal information.
Built using a ‘Data Protection by Design’ approach, all our systems, services, solutions and products safeguard individuals’ privacy and security and ensure compliance by ensuring access is strictly controlled and audited.
The Sentinel Data Platform is designed and built, in accordance with the ICO Principles of Data Protection by Design. These principles have always remained the underlying foundation of our evolving technology through-out the passing of GDPR and the DPA 2018.
All data collected by our platform is protected by default and can be fully encrypted.
Control where the data is stored and processed.
Standard users never see or gain access to, the central hub. Instead, they view the information they need via individually configured portal screens.
No data is downloaded or stored on remote devices. Instead, it is held centrally within the Sentinel Data Platform.
Portal screens can be set up to issue alerts and warnings, without revealing potentially confidential source data.
Like all our solutions, the Sentinel Data Platform can easily be integrated, either with existing IT networks or a secure cloud that is hosted remotely.
All data access history is logged enabling clients to track which records have been viewed, any amendments that have been made and when new records have been created.
We offer PGA-accredited hosted environments to provide Official (IL2 - IL3) services for personal and sensitive personal solutions, using our G-Cloud framework hosting partners. The data centres we use are accredited to IL3 and appropriate to IL4 for physical security.
Implements multi-factor authenicatioin to prevent unauthorised access. SMS, Email and Active Directory access available.
IP Blocking by range or location at Platform level and web infrastructure level (Cloudflare)
Role-Based Access Control (RBAC) to control user permissons across the platform
Personalised Access, No Generic User, Just-In-Time role-based user access
All data in Azure irrespective of the type or storage location is associated with a subscription. A subscription is a resource isolated within a tenant.
A cloud tenant can be viewed as a dedicated instance of Azure Active Directory (Azure AD) that your organization receives and owns when you sign up for a Microsoft cloud service. The identity and access stack helps enforce isolation among subscriptions, including limiting access to resources within a subscription only to authorized users.
Azure provides both logical and physical compute isolation for processing. Logical isolation is implemented via:
Azure Virtual Network (VNet) helps ensure private network traffic is logically isolated from traffic belonging to other customers. Services can communicate using public IPs or private (VNet) IPs. Communication between VMs remains private within a VNet. VNets can connect via VNet peering or VPN gateways, depending on project connectivity options, including bandwidth, latency, and encryption requirements. We can also use Azure network security groups (NSGs) to achieve network isolation and protect resources from the Internet while accessing Azure services that have public endpoints. Azure offers Virtual Network service tags to define network access controls on network security groups or Azure Firewall. A service tag represents a group of IP address prefixes from a given Azure service. Microsoft manages the address prefixes encompassed by the service tag and automatically updates the service tag as addresses change, thereby reducing the complexity of frequent updates to network security rules. Azure also offers Private Link to access Azure PaaS services over a private endpoint within a VNet, ensuring that traffic between VNet and the service travels across the Microsoft global backbone network – this eliminates the need to expose the service to the public Internet. Finally, Azure also provides options to encrypt data in transit, including Transport Layer Security (TLS) end-to-end encryption of network traffic with TLS termination using Key Vault certificates, VPN encryption using IPsec, and Azure ExpressRoute encryption using MACsec with customer-managed keys (CMK) support.
To ensure cryptographic certainty of logical data isolation, Azure Storage uses data encryption at rest using advanced algorithms with multiple ciphers. This process relies on multiple encryption keys and services such as Azure Key Vault and Azure AD to ensure secure key access and centralized key management. Azure Storage service encryption ensures data is automatically encrypted before persisting it to Azure Storage and decrypted before retrieval. All data written to Azure Storage is encrypted through FIPS 140 validated 256-bit AES encryption and can use Key Vault for customer-managed keys (CMK). Azure Storage service encryption encrypts the page blobs that store Azure Virtual Machine disks. Additionally, Azure Disk encryption may optionally be used to encrypt Azure Windows and Linux IaaS Virtual Machine disks to increase storage isolation and assure cryptographic certainty of any data stored in Azure. This encryption includes managed disks.
Azure isolation assurance is further enforced by Microsoft’s internal use of the Security Development Lifecycle (SDL) and other strong security assurance processes to protect attack surfaces and mitigate threats.
Book your free data assessment today, and find out how much of an impact Sentinel's Master Data Management tools can have on your business.
Take the hassle out of data management. Call us on +44(0)800 612 2116 or email us [email protected].