Listing Thumbnail

    Hardened Red Hat Enterprise Linux 8 image with DISA STIG Benchmarks

     Info
    Sold by: Madarson IT 
    This product has charges associated with it for security hardening. This AWS-based ec2 is pre-configured with the latest Red Hat Enterprise Linux 8 image, hardened and optimized for security and to help address DISA STIG compliance needs.
    Listing Thumbnail

    Hardened Red Hat Enterprise Linux 8 image with DISA STIG Benchmarks

     Info
    Sold by: Madarson IT 

    Overview

    This is a repackaged software product wherein additional charges apply for hardening. This AWS-based ec2 comes pre-configured with the latest Red Hat Enterprise Linux 8 image that is optimized for security, featuring advanced hardening measures to help protect against vulnerabilities and to help ensure compliance with DISA STIG best practices. The Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) Benchmarks are a comprehensive set of cybersecurity standards aimed at enhancing the security of information systems within the Department of Defense (DoD) and other federal agencies. These benchmarks provide detailed guidance on configuring and managing systems, networks, and software to ensure they meet stringent security requirements. By adhering to STIGs, organizations can mitigate vulnerabilities, prevent unauthorized access, and ensure compliance with government security policies. STIGs are essential for maintaining the integrity, confidentiality, and availability of critical systems and data in environments that demand the highest level of security.

    Key Features Ensure Compliance with Security Standards: DISA STIGs aim to ensure that systems, networks, and applications comply with stringent security standards and policies mandated by the Department of Defense (DoD) and other federal agencies. This helps maintain a consistent and robust security posture across all information systems. Mitigate Security Risks and Vulnerabilities: STIGs provide specific configuration guidelines and best practices designed to minimize vulnerabilities and protect against potential cyber threats. By following STIGs, organizations can reduce the risk of unauthorized access, data breaches, and other security incidents. Why use Madarson IT Red Hat Enterprise Linux images? Madarson IT certified images are always up to date, secure, follow industry standards, and are built to work right out of the box.

    Highlights

    • Standardized Security Configuration: STIGs provide detailed configuration guidelines to secure a wide range of technologies, including operating systems, cloud platforms, databases, and network devices. These standards ensure that systems are hardened against vulnerabilities, reducing the risk of attack.
    • Compliance and Auditing: STIGs are critical for compliance with DoD cybersecurity policies. Organizations must regularly assess systems against STIG benchmarks to maintain their Authority to Operate (ATO), ensuring that they meet federal security requirements like the Federal Information Security Management Act (FISMA).
    • Continuous Updates and Automation: DISA regularly updates STIGs to reflect new vulnerabilities and evolving cybersecurity threats. Automation tools, such as SCAP (Security Content Automation Protocol) and Ansible STIG roles, help organizations efficiently apply and monitor STIG compliance across systems.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Rhel 8.10

    Typical total price

    This estimate is based on use of the seller's recommended configuration (m5.large) in the US East (N. Virginia) Region. View pricing details

    $0.165/hour

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Hardened Red Hat Enterprise Linux 8 image with DISA STIG Benchmarks

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (96)

     Info
    • ...
    Instance type
    Product cost/hour
    EC2 cost/hour
    Total/hour
    t2.small
    $0.02
    $0.038
    $0.058
    t2.medium
    $0.04
    $0.075
    $0.115
    t2.large
    $0.04
    $0.122
    $0.162
    t2.xlarge
    $0.08
    $0.243
    $0.323
    t2.2xlarge
    $0.16
    $0.486
    $0.646
    t3.small
    $0.04
    $0.05
    $0.09
    t3.medium
    $0.04
    $0.07
    $0.11
    t3.large
    $0.04
    $0.112
    $0.152
    t3.xlarge
    $0.08
    $0.224
    $0.304
    t3.2xlarge
    $0.16
    $0.448
    $0.608

    Additional AWS infrastructure costs

    Type
    Cost
    EBS General Purpose SSD (gp3) volumes
    $0.08/per GB/month of provisioned storage

    Vendor refund policy

    There is no refund policy for this image.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    Hardened Red Hat Enterprise Linux 8 image with DISA STIG Benchmarks.

    Additional details

    Usage instructions

    Allow inbound SSH access in your security group (TCP port 22) To connect to your instance using the Amazon EC2 console: Open the Amazon EC2 console at https://console.thinkwithwp.com/ec2/ .

    In the navigation pane, choose Instances.

    Select the instance and choose Connect. Choose the EC2 Instance Connect tab. For Connection type, choose Connect using EC2 Instance Connect. Access the ec2 with the default username: "ec2-user"

    Support

    Vendor support

    To speak with us about private offers, audit or your compliance needs, please contact us at info@madarsonit.com .

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to write a review for this product.