Sentinel Platform Security

Security is paramount. We have years of experience in handling personal and sensitive data. Due to the fact that many of our products are built specifically to enable organisations to support vulnerable people or children, we understand the importance of security and compliance requirements. As standard, all of our products include a full audit trail of user activities and data processing. We use the most robust Azure security features to ensure your data is protected.

Our Data Platform originated in 2011 where it was designed and built in accordance with the ICO Principles of Data Protection by Design. These principles have remained the underlying foundation of our evolving technology throughout the passing of GDPR and the DPA 2018. The key elements of our Data Protection by Design approach are detailed here: we are ISO 27001

Frame 485 (1)

Data protection by design


Data security is of paramount importance, which is why all Sentinel's solutions feature in-built data protection and settings to help organisations comply with the General Data Protection Regulation (GDPR), the Caldicott Principles and other controls relating to the use and sharing of personal or sensitive personal information.

Built using a ‘Data Protection by Design’ approach, all our systems, services, solutions and products safeguard individuals’ privacy and security and ensure compliance by ensuring access is strictly controlled and audited.

The Sentinel Data Platform is designed and built, in accordance with the ICO Principles of Data Protection by Design. These principles have always remained the underlying foundation of our evolving technology through-out the passing of GDPR and the DPA 2018.

The key elements of our Data Protection by Design approach are as follows:

  • All data in transit and data at rest are encrypted as required
  • Sentinel's Data Integrated Platform is made up of two levels: the underlying Data Hub and the Portal Application layer. There are partitions built into the connection between these two levels as part of the in-built Cyber Security controls
  • The Data Platform Hub - which holds the data - can only be accessed through secure and encrypted channels
  • User access to the Data Platform Hub is controlled by the Portal layer and is managed via a User ID, Strong Password and Multi-Factor Authentication
  • User access within the Portal is restricted via a roll-based security model
  • User access within the Portal is subject to a full audit trail, which includes display access as well as creation, maintenance, and deletion
  • User Portals are configured on the strict principle that user can only see what they need to see
  • All automated data processing is subject to configurable and transparent rules
  • There is a full audit trail and exception reporting for each active data rule
  • Data processing through our Data Hub is subject to a strict sequence whereby data must be validated and approved for quality before any attempt is made to match it with other records
  • Role-based access control at database level via username and password plus IP address whitelisting
Security 2

Key features and benefits


Built-in data protection: All data collected by our platform is protected by default and can be fully encrypted.

Controlled access: Standard users never see or gain access to, the central hub. Instead, they view the information they need via individually configured portal screens.

Automated alerts: Portal screens can be set up to issue alerts and warnings, without revealing potentially confidential source data.

Full access history: All data access history is logged enabling clients to track which records have been viewed, any amendments that have been made and when new records have been created.

Data in one place: No data is downloaded or stored on remote devices. Instead, it is held centrally within the Sentinel Data Platform.

Secure hosting: Like all our solutions, the Sentinel Data Platform can easily be integrated, either with existing IT networks or a secure cloud that is hosted remotely.

Fully Accredited: We offer PGA-accredited hosted environments to provide Official (IL2 - IL3) services for personal and sensitive personal solutions, using our G-Cloud framework hosting partners. The data centres we use are accredited to IL3 and appropriate to IL4 for physical security.

Data Residency: Control where the data is stored and processed.

Safe, Secure, Trusted

  • Over 10 Years of experience in security and compliance requirements for handling personal and sensitive data
  • Specialists in providing data solutions to support vulnerable people or children
  • All products and solutions built in accordance with ICO Data Protection By Design
  • ISO 27001, ISO 9001 and Cyber Essentials Plus accredited

Strong Access controls

  • RBAC
  • User ID
  • Strong Password Requirements
  • Multi-Factor Authentication (Phone and Email)
  • Personalised Access, No Generic User, Just-In-Time role-based user access
  • IP Blocking by range or location at Platform level and web infrastructure level (Cloudflare)

Role Based Access Control

Multi-Factor Authentication

IP Blocking

Just-in-time Access

Encrypted at rest and in transit (VPN, BGP)

  • We apply all standard Azure security features including Multi-layer Firewall, Encryption at Rest and dedicated VPN connection
  • Data transfer is only conducted through dedicated VPN (IPSEC) and SFTP connections
  • As a standard for all user portal connections and any on-line service calls and require the use of SSL certificates (online encryption)

All of our Azure hosted client tenancies include:

  • Secure network design
  • Services completely separated by client (Each client exists within their own Azure tenant)
  • Production and Non-production completely separated

Microsoft Azure Security

User access controls – All data in Azure irrespective of the type or storage location is associated with a subscription. A subscription is a resource isolated within a tenant.
A cloud tenant can be viewed as a dedicated instance of Azure Active Directory (Azure AD) that your organization receives and owns when you sign up for a Microsoft cloud service. The identity and access stack helps enforce isolation among subscriptions, including limiting access to resources within a subscription only to authorized users.

Compute isolation – Azure provides both logical and physical compute isolation for processing. Logical isolation is implemented via:

  • Hypervisor isolation for services that provide cryptographically certain isolation by using separate virtual machines and using Azure Hypervisor isolation
  • Drawbridge isolation inside a virtual machine (VM) for services that provide cryptographically certain isolation for workloads running on the same virtual machine by using isolation provided by Drawbridge. These services provide small units of processing using customer code
  • User context-based isolation for services that are composed solely of Microsoft-controlled code and customer code is not allowed to run. In addition to robust logical compute isolation available by design for all Azure-based tenants, if a solution needs physical compute isolation, Azure offers Dedicated Host or Isolated Virtual Machines which can be deployed on server hardware dedicated to a single customer


Networking isolation – Azure Virtual Network (VNet) helps ensure private network traffic is logically isolated from traffic belonging to other customers. Services can communicate using public IPs or private (VNet) IPs. Communication between VMs remains private within a VNet. VNets can connect via VNet peering or VPN gateways, depending on project connectivity options, including bandwidth, latency, and encryption requirements. We can also use Azure network security groups (NSGs) to achieve network isolation and protect resources from the Internet while accessing Azure services that have public endpoints. Azure offers Virtual Network service tags to define network access controls on network security groups or Azure Firewall. A service tag represents a group of IP address prefixes from a given Azure service. Microsoft manages the address prefixes encompassed by the service tag and automatically updates the service tag as addresses change, thereby reducing the complexity of frequent updates to network security rules. Azure also offers Private Link to access Azure PaaS services over a private endpoint within a VNet, ensuring that traffic between VNet and the service travels across the Microsoft global backbone network – this eliminates the need to expose the service to the public Internet. Finally, Azure also provides options to encrypt data in transit, including Transport Layer Security (TLS) end-to-end encryption of network traffic with TLS termination using Key Vault certificates, VPN encryption using IPsec, and Azure ExpressRoute encryption using MACsec with customer-managed keys (CMK) support.

Storage isolation – To ensure cryptographic certainty of logical data isolation, Azure Storage uses data encryption at rest using advanced algorithms with multiple ciphers. This process relies on multiple encryption keys and services such as Azure Key Vault and Azure AD to ensure secure key access and centralized key management. Azure Storage service encryption ensures data is automatically encrypted before persisting it to Azure Storage and decrypted before retrieval. All data written to Azure Storage is encrypted through FIPS 140 validated 256-bit AES encryption and can use Key Vault for customer-managed keys (CMK). Azure Storage service encryption encrypts the page blobs that store Azure Virtual Machine disks. Additionally, Azure Disk encryption may optionally be used to encrypt Azure Windows and Linux IaaS Virtual Machine disks to increase storage isolation and assure cryptographic certainty of any data stored in Azure. This encryption includes managed disks.

Security assurance processes and practices – Azure isolation assurance is further enforced by Microsoft’s internal use of the Security Development Lifecycle (SDL) and other strong security assurance processes to protect attack surfaces and mitigate threats. 

Transform data use in your organisation

Book your free data assessment today, and find out how much of an impact Sentinel's Master Data Management tools can have on your business.

  • Strict control and monitoring of data quality
    and completeness
  • Built using the ICO's "data protection by design"
  • Trusted by public sector organisations and local authorities
  • Experienced, dedicated team of data integration and data sharing specialists

Take the hassle out of data management. Call us on +44(0)800 612 2116 or email us [email protected].