EPCC offers two distinct sets of services to store and process sensitive and confidential data: EPCC Safe Haven Services and EIDF Confidential Data Workspace. EIDF provides many services to store and process non-sensitive and non-confidential data, including EIDF Virtual Desktops. In the table below we compare the features of three services. EPCC offers two distinct sets of services to store and process sensitive and confidential data: EPCC Safe Haven ServicesEIDF Confidential Data WorkspaceEIDF provides many services to store and process non-sensitive and non-confidential data, including EIDF Virtual Desktops. In the table below we compare the features of three services. FeatureEPCC Safe Haven ServicesEIDF Confidential Data WorkspaceEIDF Virtual DesktopAccreditationISO27001 accreditedYesYesYesDigital Economy Act 2017 accreditedYesNoNoNHS Digital Toolkit self-accreditedYesNoNoCyber Security self-accreditedYesYesYesAssistance with 3rd- party penetration testingYesNoNoData and usage policies & agreementsStorage of unconsented identifiable special-category PIIYesNoNoStorage of de-identified or consented PIIYesYesNoAgreements and policiesTRE Service Agreement (available upon request)EIDF usage and data policies 5EIDF usage and data policies 5Project leads and managers has sudo (super/admin user) access on virtual machinesNoYesYesProject lead and managers can transfer data in and out of virtual desktopsNoYesYesProject users can transfer data in and out of their virtual desktopNoNoYesEPCC supportHelpdesk tickets to resolve issues that require EPCC staff to login to the virtual machines or interact with project data (e.g., upgrade software in a VM to newer version, copy data into storage)YesNoNoHelpdesk tickets to resolve issues that do not require EIDF staff to login to the virtual machines (e.g., not able to login to a desktop)YesYesYesSetup and bootup the virtual infrastructureYesYesNoData wrangling (ingress, clean, filter, transform, egress) or analysis (train/test models, quality-check, disclosure tests)No4No4No4Dedicated service manager for the projectYesNoNoInfrastructure cost20TB storage includedYesNo2No21/3 server includedYesNo1No1Electricity costEqual share of entire SHS costIncluded in cost of each infrastructure componentIncluded in cost of each infrastructure componentStaff costsEqual share of entire SHS cost + cost to cover share of helpdesk ticket loadIncluded in cost of each infrastructure componentIncluded in cost of each infrastructure componentProject leads and managers can switch on/off use of virtual servicesNoYesYesBackups and disaster recoveryInfrastructure disaster recovery included to different mediaNo6No6No614-days rolling backups on same mediaYesNoNoAdditional compute resourcesSafe Haven GPU ClusterYes1NoNoSafe Haven CPU ClusterYes1NoNoEIDF GPU ServiceNoIn development1Yes 1EIDF Cirrus (CPU)NoNoYes 1Target costs (not price!)Approx guidance on cost per annum£200,000 3£30,000 3£15,000 3 1 Billed in units per hour depending on the type of virtual machine (#cores, #GPUs, #memory, #VM-storage) and GPU/CPUs, e.g., GPU-hours reserved on the SHS GPU Cluster. 2 Billed in TB-hours per month where price depends on type of storage used, VAT, commercial or academic.3 Prices depend both on the type of customer (internal or external to university, grant collaborator or not, commercial or public sector) and the type and amount of resources the customer requires. Here we provide typical costs. Our pricing is based on staff costs, electricity, licenses, capital depreciation, overheads, estates, VAT, etc.4 Data wrangling, data analyses and software/infrastructure engineering tasks can be performed by EPCC staff and are separately agreed and costed in a contract.5 Users are responsible for managing the access to the Confidential Data Workspace VMs including Router management. The EIDF team are not responsible for any unauthorised or unexpected access to VMs including ingress or egress of data or network traffic. The EIDF team will not be able to assist with any issues arising from unauthorised access to VMs or data sharing.6 Disaster recovery copies can be arranged and will be costed in addition. This article was published on 2026-03-25