Infrastructure Readiness (TRI)
TRI assesses connectivity, hosting, resilience, cybersecurity and operational maturity. While baseline connectivity exists across most MDAs, risks are concentrated in hosting fragmentation and weak disaster recovery.
What to prioritise first (triage)
Hosting Landscape
Distribution of systems by hosting model and cloud provider share.
Hosting Model (On-Prem / Hybrid / Cloud)
Cloud Provider Share (Cloud-hosted systems)
Interpretation
- On-prem and hybrid typically carry higher operational burden (patching, backups, physical security, power, and cooling).
- Cloud adoption is present, but benefits depend on standard governance, security baselines, and DR/test discipline.
Resilience & Recovery
Disaster recovery arrangements remain the primary operational risk in the infrastructure stack.
Recommended actions
- Stand up shared DR and backup services for high-risk systems.
- Standardize DR testing schedules, evidence capture, and reporting.
- Prioritize migration of suitable workloads to the Government Shared Cloud (with controls).
DR breakdown (drill-down)
| DR status | % of MDAs |
|---|---|
| Dedicated DR Site | 20% |
| Partial / Planned DR | 25% |
| No DR | 55% |
Use this table to cross-check the chart values against the report.
Connectivity & Network Quality
Drill-down views for connectivity redundancy (ISP count) and network stability ratings captured in the assessment.
Connectivity Redundancy (ISP Count, n=63)
Network Stability Rating (n=192)
ISP count drill-down table
| ISP count | % of MDAs |
|---|---|
| 1 ISP | 70% |
| 2 ISPs | 30% |
Single-ISP dependency is a common outage driver; prioritise redundancy for critical sites.
Stability rating drill-down table
| Rating | Count | Percentage |
|---|---|---|
| Excellent | 35 | 18.2% |
| Good | 93 | 48.4% |
| Average | 64 | 33.3% |
Good+ totals 66.7% (Excellent+Good). Use this for KPI tracking over time.
Cybersecurity Baseline
Desktop review indicates strong HTTPS uptake but weaker secure configuration posture.
How to use this baseline
- Maintain HTTPS but add configuration hardening and routine scanning for common weaknesses.
- Prioritise shared services: DNS, certificates, monitoring, and vulnerability management.
- Use Desktop Review indicators as repeatable KPIs for improvement cycles.
See Desktop Review page for full indicator set.