Overview
This is a repackaged open source software wherein additional charges apply for extended support with a 24 hour response time. In order to receive support, please email support@hardenedimages.com .
This image comes meticulously preconfigured by Hardened Images, adhering to the Security Technical Implementation Guides (STIG), which set the gold standard for secure configuration. These guidelines are vendor-neutral, developed through a collaborative, consensus-based approach, and recognized by government, business, industry, and academia alike. Importantly, STIG standards also serve as a robust foundation for compliance with a wide range of cybersecurity frameworks. Tailored for system and application administrators, security experts, auditors, help desk staff, and platform deployment professionals, this image is optimized for those looking to develop, deploy, evaluate, or secure applications leveraging this Linux system. It significantly enhances operational efficiency, while also mitigating time, cost, and risk associated with deploying your organization's AWS solutions.
As a trusted consulting ally for small to medium-sized businesses, Hardened Images empowers you to establish and maintain a secure presence in the cloud. We are your dedicated experts in cloud virtual machines, enabling you to commence your projects with the assurance of top-tier security.
Highlights
- Superior Protection: Hardened images are specifically engineered to enhance security, incorporating pre-set safeguards and minimizing attack surfaces by default, offering a secure starting point for any deployment.
- Ready-to-Deploy Compliance: These images are built to conform to high-security standards and regulations right from the start, facilitating easier compliance with industry-specific security requirements without additional customization.
- Cost and Time Savings: Adopting hardened images streamlines the setup process by reducing the need for extensive security configurations and ongoing maintenance, allowing teams to launch secure environments quickly and efficiently, saving both time and operational costs.
Details
Typical total price
$0.142/hour
Features and programs
Financing for AWS Marketplace purchases
Pricing
- ...
Instance type | Product cost/hour | EC2 cost/hour | Total/hour |
---|---|---|---|
t2.large | $0.10 | $0.093 | $0.193 |
t2.xlarge | $0.10 | $0.186 | $0.286 |
t2.2xlarge | $0.10 | $0.371 | $0.471 |
t3.nano | $0.10 | $0.005 | $0.105 |
t3.micro AWS Free Tier | $0.10 | $0.01 | $0.11 |
t3.small | $0.10 | $0.021 | $0.121 |
t3.medium Recommended | $0.10 | $0.042 | $0.142 |
t3.large | $0.10 | $0.083 | $0.183 |
t3.xlarge | $0.10 | $0.166 | $0.266 |
t3.2xlarge | $0.10 | $0.333 | $0.433 |
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp2) volumes | $0.10/per GB/month of provisioned storage |
Vendor refund policy
At the moment, we're unable to offer refunds, but you're free to terminate your instance at any time to avoid further charges. We're here to help if you have any questions about managing your service!
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Initial release of Hardened Rocky Linux 8 AMI.
Additional details
Usage instructions
##Connecting to the VM: ##
To connect to your instance, you will need to use SSH over port 22. The default username for connecting is rocky. For further information about the standard AWS method of connecting to an instance, see information described here: https://docs.thinkwithwp.com/AWSEC2/latest/UserGuide/AccessingInstances.html
Regarding Security Configurations
Utilizing hardened images necessitates a nuanced approach due to their advanced security configurations and access controls, which may require additional adjustments for compatibility with specific workflows or applications. These images, designed with enhanced security measures to minimize vulnerabilities, offer superior protection compared to baseline images without pre-configured security settings. However, integrating them seamlessly into your operations might involve collaboration with security experts or the providers for customization, ensuring both robust security and operational functionality. This extra step, while requiring more initial setup, positions hardened images as a more secure and compliant foundation for deployments, ultimately offering a significant advantage over baseline images by saving time and resources in achieving a secure, compliant, and efficient infrastructure.
Additional Details
-
No additional external resources are required for the product to function
-
There are no security keys or credentials in place that need to be rotated
-
There is no customer data that is collected in order for this software to function
Resources
Vendor resources
Support
Vendor support
Included with every Hardened Images virtual machine is a dedicated, passionate world-class support team. Have a question? Just reach out! We love to help. Email support is available directly at support@hardenedimages.com .
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.