Overview
This is a repackaged open source software wherein additional charges apply for extended support with a 24 hour response time. Redis, a highly regarded open source, in-memory data structure store, is celebrated for its speed and versatility. It serves as a database, cache, and message broker, facilitating rapid data processing and management for a wide range of applications. Redis's ability to handle high-speed transactions, analytics, and real-time applications makes it indispensable for dynamic, data-intensive environments. Configured meticulously by Hardened Images, this image adheres to the Security Technical Implementation Guides (STIG), the definitive standards for secure configuration. These protocols are universally applicable, crafted through a consensus-driven, collaborative approach and validated by government, business, industry, and academic sectors. Crucially, compliance with STIG standards promotes adherence to a wide array of cybersecurity frameworks. Specifically designed for system and application administrators, security professionals, auditors, help desk staff, and platform deployment teams, this Redis image is optimized to streamline the development, deployment, evaluation, or security enhancement of applications using this Linux system. It strategically boosts operational efficiency and significantly reduces the time, cost, and risk associated with deploying your organization's AWS solutions. As a trusted partner for small to medium-sized businesses, Hardened Images is committed to securing a robust cloud presence for its clients. Specializing in cloud virtual machines, we equip you with the knowledge and tools needed to launch your projects with the utmost security and confidence.
Highlights
- Fortified following the rigorous standards of a STIG Benchmark, crafted through a collaborative, consensus-based process and endorsed by both government entities and businesses for its unparalleled security and reliability. This underscores the benchmark's effectiveness in safeguarding critical infrastructure and sensitive data, making it a cornerstone in the pursuit of robust cybersecurity defenses.
- Hardening is a process of limiting potential weaknesses that make systems vulnerable to cyber attacks.
- Every Hardened Images image is updated at launch with the up to the minute security upgrades and patches making sure you are always running the most secure version available.
Details
Typical total price
$0.134/hour
Features and programs
Financing for AWS Marketplace purchases
Pricing
- ...
Instance type | Product cost/hour | EC2 cost/hour | Total/hour |
---|---|---|---|
m6g.medium | $0.10 | $0.038 | $0.138 |
m6g.large | $0.10 | $0.077 | $0.177 |
m6g.xlarge | $0.10 | $0.154 | $0.254 |
m6g.2xlarge | $0.10 | $0.308 | $0.408 |
m6g.4xlarge | $0.10 | $0.616 | $0.716 |
m6g.8xlarge | $0.10 | $1.232 | $1.332 |
m6g.12xlarge | $0.10 | $1.848 | $1.948 |
m6g.16xlarge | $0.10 | $2.464 | $2.564 |
m6g.metal | $0.10 | $2.464 | $2.564 |
m6gd.medium | $0.10 | $0.045 | $0.145 |
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp2) volumes | $0.10/per GB/month of provisioned storage |
Vendor refund policy
At the moment, we're unable to offer refunds, but you're free to terminate your instance at any time to avoid further charges. We're here to help if you have any questions about managing your service!
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (Arm) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Initial release of Redis on Hardened Ubuntu 24.04 AMI.
Additional details
Usage instructions
##Connecting to the VM: ##
To connect to your instance, you will need to use SSH over port 22. The default username for connecting is ubuntu. For further information about the standard AWS method of connecting to an instance, see information described here: https://docs.thinkwithwp.com/AWSEC2/latest/UserGuide/AccessingInstances.html
Regarding Security Configurations
Utilizing hardened images necessitates a nuanced approach due to their advanced security configurations and access controls, which may require additional adjustments for compatibility with specific workflows or applications. These images, designed with enhanced security measures to minimize vulnerabilities, offer superior protection compared to baseline images without pre-configured security settings. However, integrating them seamlessly into your operations might involve collaboration with security experts or the providers for customization, ensuring both robust security and operational functionality. This extra step, while requiring more initial setup, positions hardened images as a more secure and compliant foundation for deployments, ultimately offering a significant advantage over baseline images by saving time and resources in achieving a secure, compliant, and efficient infrastructure.
Additional Details
-
No additional external resources are required for the product to function
-
There are no security keys or credentials in place that need to be rotated
-
There is no customer data that is collected in order for this software to function
Resources
Vendor resources
Support
Vendor support
Included with every Hardened Images virtual machine is a dedicated, passionate world-class support team. Have a question? Just reach out! We love to help. Email support is available directly at support@hardenedimages.com .
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.