Overview
This is a repackaged software product wherein additional charges apply for hardening. This AWS-based ec2 comes pre-configured with the latest Red Hat Enterprise Linux 8 image that is optimized for security, featuring advanced hardening measures to help protect against vulnerabilities and to help ensure compliance with DISA STIG best practices. The Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) Benchmarks are a comprehensive set of cybersecurity standards aimed at enhancing the security of information systems within the Department of Defense (DoD) and other federal agencies. These benchmarks provide detailed guidance on configuring and managing systems, networks, and software to ensure they meet stringent security requirements. By adhering to STIGs, organizations can mitigate vulnerabilities, prevent unauthorized access, and ensure compliance with government security policies. STIGs are essential for maintaining the integrity, confidentiality, and availability of critical systems and data in environments that demand the highest level of security.
Key Features Ensure Compliance with Security Standards: DISA STIGs aim to ensure that systems, networks, and applications comply with stringent security standards and policies mandated by the Department of Defense (DoD) and other federal agencies. This helps maintain a consistent and robust security posture across all information systems. Mitigate Security Risks and Vulnerabilities: STIGs provide specific configuration guidelines and best practices designed to minimize vulnerabilities and protect against potential cyber threats. By following STIGs, organizations can reduce the risk of unauthorized access, data breaches, and other security incidents. Why use Madarson IT Red Hat Enterprise Linux images? Madarson IT certified images are always up to date, secure, follow industry standards, and are built to work right out of the box.
Highlights
- Standardized Security Configuration: STIGs provide detailed configuration guidelines to secure a wide range of technologies, including operating systems, cloud platforms, databases, and network devices. These standards ensure that systems are hardened against vulnerabilities, reducing the risk of attack.
- Compliance and Auditing: STIGs are critical for compliance with DoD cybersecurity policies. Organizations must regularly assess systems against STIG benchmarks to maintain their Authority to Operate (ATO), ensuring that they meet federal security requirements like the Federal Information Security Management Act (FISMA).
- Continuous Updates and Automation: DISA regularly updates STIGs to reflect new vulnerabilities and evolving cybersecurity threats. Automation tools, such as SCAP (Security Content Automation Protocol) and Ansible STIG roles, help organizations efficiently apply and monitor STIG compliance across systems.
Details
Typical total price
$0.165/hour
Features and programs
Financing for AWS Marketplace purchases
Pricing
- ...
Instance type | Product cost/hour | EC2 cost/hour | Total/hour |
---|---|---|---|
t2.small | $0.02 | $0.038 | $0.058 |
t2.medium | $0.04 | $0.075 | $0.115 |
t2.large | $0.04 | $0.122 | $0.162 |
t2.xlarge | $0.08 | $0.243 | $0.323 |
t2.2xlarge | $0.16 | $0.486 | $0.646 |
t3.small | $0.04 | $0.05 | $0.09 |
t3.medium | $0.04 | $0.07 | $0.11 |
t3.large | $0.04 | $0.112 | $0.152 |
t3.xlarge | $0.08 | $0.224 | $0.304 |
t3.2xlarge | $0.16 | $0.448 | $0.608 |
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp3) volumes | $0.08/per GB/month of provisioned storage |
Vendor refund policy
There is no refund policy for this image.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Hardened Red Hat Enterprise Linux 8 image with DISA STIG Benchmarks.
Additional details
Usage instructions
Allow inbound SSH access in your security group (TCP port 22) To connect to your instance using the Amazon EC2 console: Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/ .
In the navigation pane, choose Instances.
Select the instance and choose Connect. Choose the EC2 Instance Connect tab. For Connection type, choose Connect using EC2 Instance Connect. Access the ec2 with the default username: "ec2-user"
Resources
Vendor resources
Support
Vendor support
To speak with us about private offers, audit or your compliance needs, please contact us at info@madarsonit.com .
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.