CIS Hardened Image Level 1 on Red Hat Enterprise Linux 8 (ARM) logo

CIS Hardened Image Level 1 on Red Hat Enterprise Linux 8 (ARM)

This product has charges associated with the pre-built hardening to the CIS Benchmarks™ and recurring maintenance. The CIS Hardened Images® are hardened in accordance with the associated CIS Benchmarks, an industry best practice for secure configuration. Reduce cost, time, and risk by building your AWS solution with CIS AMIs.

AWS

Discover software listings available in AWS Marketplace from MaxTechnologies. Request a private offer for custom pricing, and make your purchases in AWS Marketplace using your AWS account.

The CIS Hardened Image Level 1 ARM on Red Hat Enterprise Linux 8 is a pre-configured image built by the Center for Internet Security (CIS®) for use on Amazon Elastic Compute Cloud (Amazon EC2). It is a pre-configured, security-hardened image that aligns with the robust security recommendations, the CIS Benchmarks, making it easier for organizations to meet regulatory requirements.

Not only is this image pre-hardened to the CIS Benchmarks guidance, but it is also patched monthly in alignment with the updates from the software vendor.

Key Benefits Enhanced Security: Mitigates risks like malware, denial of service, and authorization issues by following globally-recognized secure configuration guidance to support your cloud security posture management (CSPM) program. Compliance Readiness: Helps your organization comply with PCI DSS, FedRAMP, DoD Cloud Computing SRG, FISMA, select NIST publications, and more. Faster Deployment: Pre-configured according to CIS Benchmarks, allowing you to deploy secure virtual machine images. Consistency Across Environments: Ensures consistent security configurations across development, testing, and production environments, reducing drift and compatibility risks. Cost Efficiency: Lowers remediation efforts, reduces attack surface, and minimizes business loss from security incidents. Easier Maintenance: Regular updates ensure that your systems are always in line with the latest security standards and software patches.

This image is hardened against the corresponding Level 1 profile which is intended to be practical and prudent, provide a clear security benefit, and not inhibit the utility of the technology beyond acceptable means. No packages are installed on or removed from this image outside of those already present on the base image or as recommended in alignment with the corresponding CIS Benchmark recommendations.

To demonstrate conformance to the CIS Red Hat Enterprise Linux 8 Level 1 Benchmark, industry-recognized hardening guidance, each image includes an HTML report from CIS Configuration Assessment Tool (CIS-CAT® Pro). Each CIS Hardened Image contains the following files: BaseCIS-CATReport.html - this provides a report of CIS-CAT Pro run against the instance before any change is made by CIS (e.g., software updates, CIS hardening). basevm.txt - this provides a list of the packages resident on the instance prior to any change being made by CIS (e.g., software updates, CIS hardening). CIS-CAT_Report.html - this provides a report of CIS-CAT Pro run against the instance after the corresponding CIS Benchmark was applied to the image. Exceptions.txt - this provides a list of recommendations that are not applied because the configuration of those recommendations may inhibit the use of this image in this CSP, require environment-specific expertise, or hinder the integration of this image with CSP services or extensions. afterhardening.txt - this provides a list of packages resident on the instance after the corresponding CIS Benchmark was applied to the image.

These reports are located in /home/CISHardenedReports.

For customized pricing options or private offers, reach out to us at cloudsecurity@cisecurity.org.

To learn more or access the corresponding CIS Benchmark, please visit https://www.cisecurity.org/cis-benchmarks or sign up for a free account on our community platform, CIS WorkBench, https://workbench.cisecurity.org/.

Related Products
SoftNAS - High Performance NFS/CIFS/iSCSI Cloud NAS logo

SoftNAS - High Performance NFS/CIFS/iSCSI Cloud NAS

Buurst SoftNAS provides cloud storage performance, security, high availability, and support for the most extensive set of storage protocols in the industry: NFS, CIFS/SMB-AD, iSCSI. Your data is our number one priority.

Cloud Security Posture Management - Consulting and Implementation logo

Cloud Security Posture Management - Consulting and Implementation

Bedroc provides consulting, and co-implements with a PasS provider. We collaborate with our select software vendor by vetting the client solution required given the environment constraints. Bedroc provides cloud security analysis, posture management, remediation a full implementation and an option for continuous implementation service. This aligns with an adaptive security strategy to provide ongoing threat and posture management (CSPM) services. We utilize Amazon cloud-native build, terraform and a selected 3rd party SaaS vendor partner for ongoing software management and monitoring on the client's environment.

Cloud Security Assessment Review – FORTBRIDGE logo

Cloud Security Assessment Review – FORTBRIDGE

FORTBRIDGE offers comprehensive cloud security assessment services to identify potential risks and misconfigurations in your cloud infrastructure. Our expert consultants provide tailored solutions for AWS, Azure, and GCP, helping you enhance your cloud security posture and protect critical data.

CIS Hardened Image Level 1 on Rocky Linux 9 logo

CIS Hardened Image Level 1 on Rocky Linux 9

This product has charges associated with the pre-built hardening to the CIS Benchmarks™ and recurring maintenance. The CIS Hardened Images® are hardened in accordance with the associated CIS Benchmarks, an industry best practice for secure configuration. Reduce cost, time, and risk by building your AWS solution with CIS AMIs.