External Website Hosting
EUK Hosting
The UKRR website used to be (pre-2010) hosted on Shared Hosting provided by EUK Hosting. This was also used for e-mail for certain people.
At some point around 2010 this was to be replaced with a dedicated server in order to host a data portal developed by Afzal. At this point we believe the Shared Hosting package was cancelled - although it remained active and indeed there was some confusion about what was being served from where.
During this time - and since - the CPANEL associated with the account has been used to manage a number of domain names including nurturebiobank.org and http://renalreg.org . See https://renalregistry.atlassian.net/wiki/spaces/INFRA/pages/955220081
When we moved to AIMES hosting the website moved to being hosted there - at which point we discovered the Shared Hosting was still active, yet we weren’t being charged for it. We have left this as-is not wanting the DNS hosts to be disrupted.
It may not be possible to access the CPANEL via the NBT network now due to it using a non-standard port for SSL.
123 Hosting
This was originally used for some Shared Hosting with the idea that it could be used as a Status page while things were being moved to AIMES but was never setup.
Since then it’s been used to register some domain names.
Tollon / Elite Hosting
This is primarily used to provide hosting for two Windows Web applications - ATTOM & ALPHA developed by Abi, a former NBT employee.
The systems work by using Windows 2008(?) based hosting with a SQL Server database on a shared server. In order to secure the data each individual field in the database is encrypted by the web application.
Moodle
This is a third party service used to host training materials. It is setup to use a sub-domain of the thinkkidneys.nhs.uk domain.
Tasks
Identify an optimal website hosting service. Individual user accounts and different roles is important.
Consolidate all the domain names on that service.
Delete the EUK Hosting Shared Hosting.
Check if ATTOM/ALPHA are still running. If so them running on Windows 2008(?) is likely a security vulnerability. They have not been included in any of the penetration testing.