Schemelink - NCSC Cloud Security Principles Compliance Statement

Detailed statement of how Schemelink aligns to the UK National Cyber Security Centre (NCSC) Cloud Security Principles.

Version: 1.0 Last Reviewed: 05/01/2026 Owner: Schemelink Security & Operations

Scope Of This Statement

This public statement describes the technical, operational and governance controls used by Schemelink to meet the intent of the NCSC Cloud Security Principles for services handling operationally sensitive scheme data, communication records and membership administration information.

Schemelink applies layered controls across hosting, application security, identity access, monitoring, incident response and secure operating procedures. Control effectiveness is reviewed regularly and improved through ongoing risk assessment, testing and operational feedback.

Source reference: NCSC - The Cloud Security Principles

This is an alignment statement for customer transparency. Formal assurance artefacts, evidence packs and control records are provided through onboarding, procurement or due diligence channels.

Executive Summary

Data ProtectionEncryption in transit, restricted processing paths, and controlled retention practices.
Service ResilienceHosted cloud infrastructure with managed continuity, backup and operational recovery procedures.
Access ControlRole-based privileges, authenticated user access, and administration segregation.
Operational SecurityLogging, incident workflows, anti-abuse controls and active service monitoring.
Secure DevelopmentControlled release practices, patching discipline and security-focused code updates.
AuditabilityRecorded transaction, administration and billing events for accountability and investigation.
Principle 1

Data In Transit Protection

Schemelink encrypts user and administrator traffic between client devices and platform endpoints using modern TLS configurations. Insecure HTTP transport is redirected to HTTPS to reduce downgrade risk. Communication channels carrying operational information, user credentials and portal actions are handled through encrypted web sessions.

Principle 2

Asset Protection And Resilience

Schemelink is operated on managed cloud infrastructure designed for service continuity and controlled data hosting. Core service assets are protected through platform-level hardening, controlled application deployment, backup processes and documented recovery approaches. Operational processes are designed to support restoration and continuity in the event of service disruption.

Principle 3

Separation Between Customers

Customer scheme data is logically separated through application-level tenancy controls, role scoping and permission checks. Access to records is constrained by scheme membership and account privileges. Administrative functions and sensitive records are protected by authenticated access paths and explicit authorisation logic.

Principle 4

Governance Framework

Schemelink maintains defined operational ownership for security, platform administration and service continuity. Security-related updates, policy changes and platform controls are maintained through managed workflows. Governance responsibilities include legal compliance obligations, incident handling and accountability for service risk decisions.

Principle 5

Operational Security

Operational security controls include event logging, account-level actions tracking, alerting workflows and abuse-response procedures. Security-relevant transactions such as payments, account changes and key user actions are captured in audit records. Platform operations include routine updates and controlled handling of suspicious activity.

Principle 6

Personnel Security

Administrative access is restricted to authorised personnel with defined responsibilities. Privileged activities are constrained by role and operational need. Access to customer or service administration functions is controlled and reviewed in line with least-privilege expectations for cloud service operations.

Principle 7

Secure Development

Schemelink applies secure coding practices and controlled deployment discipline across platform updates. Security defects and operational issues are triaged and remediated as part of maintenance cycles. Input validation, access control checks, payment integrity verification and defensive handling of transaction flows are embedded into key service components.

Principle 8

Supply Chain Security

Schemelink relies on vetted third-party service components where required (for example payment processing and hosting infrastructure), with clear integration boundaries and scoped use. Third-party dependencies are selected for operational reliability and security posture, and integrated in a way that minimises exposure of customer data.

Principle 9

Secure User Management

User lifecycle controls include managed account creation, role assignment, membership-state enforcement and account-level permission updates. Service behaviour reflects account state, so entitlement to protected features is tied to valid status and authorised profile context. Administration workflows support ongoing user access governance.

Principle 10

Identity And Authentication

Authenticated sessions are required for protected service areas, with user identity checks at login and role verification for sensitive operations. Account-level controls are enforced for both member and administration actions. Authentication and authorisation decisions are linked directly to service permissions and scheme-level access boundaries.

Principle 11

External Interface Protection

Public and integrated interfaces are protected by validation, controlled request handling and transaction verification controls. Payment-facing integrations use signed and validated mechanisms to reduce the risk of tampering or fraudulent callbacks. Input handling and request gating are applied to reduce exploitability through external endpoints.

Principle 12

Secure Service Administration

Administrative tools are separated from public interfaces and require authenticated access. Sensitive actions such as billing updates, account controls and permission changes are processed through restricted workflows. Administrative event records support traceability for operational assurance and incident review.

Principle 13

Audit Information For Users

Schemelink provides user-facing account and billing visibility, including invoice and payment status records, with supporting notifications where required. The platform captures operational logs and user-notifiable events to support transparency, reconciliation and accountability for security-relevant service activity.

Principle 14

Secure Use Of The Service

Schemelink supports secure customer operation through documented workflows, account controls and clear administrative functions. Service guidance, policy pages and operational notices help users apply secure practices in day-to-day use. The platform is structured to minimise unsafe defaults and support responsible handling of sensitive scheme information.

Continuous Improvement

Schemelink treats cloud security as an ongoing programme rather than a one-time milestone. Controls are reviewed against changing threats, technical updates and customer requirements. Where gaps are identified, remediation actions are prioritised and implemented through controlled release and operational governance processes.

For due diligence requests, compliance questionnaires or evidence enquiries, contact Schemelink support.