Skip to main content

The Independent Inquiry into Child Sexual Abuse (IICSA)


  • Implemented a secure CMS
  • Underpinned by DevOps methodologies and tooling
  • Used Agile delivery

 

Who are they?

The Independent Inquiry into Child Sexual Abuse (IICSA) was set up because of serious concerns that some organisations had failed and were continuing to fail to protect children from sexual abuse. Their remit is huge, but as a statutory inquiry, they have the authority to address issues that have persisted despite previous inquiries and attempts at reform.

 

What did they need?

IICSA required the development of a new case management system. Previously they had used Excel spreadsheets, Outlook tasks and SharePoint to gather information. This was no longer fit for purpose.

 

Naturally, the information within the system was also extremely sensitive, which meant the data could only be handled by people with the relevant security clearances. The system also needed to be run in an official environment and adhere to CESG's Cloud Security Guidance guidelines.

 

What did Zaizi do?

Using an Agile (Scrum) delivery method, we took development quickly through Discovery, Alpha, Beta and transition to Live, building a correspondent management system. An Agile coach from Zaizi supported the whole IICSA team. 

The service was underpinned by DevOps methodologies and tooling, underpinned by intrinsic automation, continuous integration/delivery and pipeline management.  This maintained system integrity and met the strict security guidelines while removing overhead and costs.

 

Making use of tools such as JIRA, Confluence and Google Hangouts, we grew and maintained a tightly aligned team throughout the Agile delivery. We delivered the MVP (minimum viable product) on time to meet the critical business requirements of IICSA and the UK government.

 

What was the outcome?

IICSA now has a secure CMS operating at 99.9% availability. The benefits:

  • Improved response times
  • Provided management information
  • Records all correspondence coming into the inquiry
  • Protects highly sensitive data
  • Is highly scalable