Listing Thumbnail

    Hardened Ubuntu 22.04 for x86_64

     Info
    Deployed on AWS
    The solution goes beyond compliance by offering a Ubuntu server with comprehensive security hardening by default, covering everything from applications to the Linux kernel. With VED threat mitigation, you can rest assured that your digital assets are protected against advanced threats.

    Overview

    Ubuntu is a well-maintained GNU/Linux distribution that is cloud native friendly. Our AMI product features a Ubuntu server with comprehensive security hardening applied by default. By implementing CIS and STIG benchmarks, this product can help you achieve compliance with regulations such as PCI-DSS and GDPR. Here's some basic info about the product:

    • Ubuntu 22.04, x86_64
    • Security baselines including CIS and STIG, making compliance integration with your business easy
    • Wazuh agent for SIEM (Security information and event management) and XDR (Extended detection and response) monitoring
    • ClamAV anti-virus
    • AIDE, for file system integrity management
    • Auditd for monitoring
    • VED (Vault Exploit Defense), for Linux kernel runtime protection. This feature is designed to protect your digital assets from advanced threats such as 0-day Linux kernel exploits, privilege escalation, container escape, and rootkits.
    • DNSCrypt-proxy, supporting DNSCrypt relays, local DNS-over-HTTPS, and more.
    • The current password policy requires changing passwords every 60 days
    • ETC

    Highlights

    • Security hardening by default.
    • Easily integrate with PCI-DSS/GDPR/ETC compliance
    • Cutting-edged Linux runtime protection

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Ubuntu 22.04

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Hardened Ubuntu 22.04 for x86_64

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (32)

     Info
    Dimension
    Cost/hour
    t3.medium
    Recommended
    $0.05
    m4.xlarge
    $0.05
    t2.large
    $0.05
    m4.10xlarge
    $0.05
    m6i.4xlarge
    $0.05
    m4.2xlarge
    $0.05
    m4.16xlarge
    $0.05
    t3.large
    $0.05
    m6i.8xlarge
    $0.05
    m6i.large
    $0.05

    Vendor refund policy

    We do not support refund but you can feel free to cancel subscription.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    This version has been optimized to accommodate less strict firewall/iptables rules to better support the provision of Docker/container environments. We do not provide rootless mode of Docker due to two reasons: 1) It has higher risk by enabling unprivileged user namespaces. 2) It's user's decision to make. VED can provide some protection even under unprivileged user namespaces is enabled. Additionally, v1.6 now includes support for DNSCrypt to enhance DNS privacy protection.

    Additional details

    Usage instructions

    Usage Instructions: To connect to your instance, you will need to use SSH or standard AWS methods as described: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AccessingInstancesLinux.html 

    1, Update the system to the latest version: #apt update && apt upgrade -y

    2, Please change all passwords Linux system accounts (ubuntu and root via cmd-line "passwd" or "sudo passwd").

    3, VED is loaded at start up by default.

    4, Install Wazuh agent via: ./agent-deployment.sh WAZUH_SERVER_IP_ADDR

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Compliance and Auditing, Operating Systems, Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Security Baseline Implementation
    CIS and STIG benchmarks applied for compliance with PCI-DSS and GDPR regulations
    Linux Kernel Runtime Protection
    VED (Vault Exploit Defense) for protection against 0-day Linux kernel exploits, privilege escalation, container escape, and rootkits
    Security Monitoring and Detection
    Wazuh agent for SIEM and XDR monitoring, Auditd for system monitoring, and ClamAV anti-virus engine
    File System Integrity Management
    AIDE for file system integrity verification and monitoring
    DNS Security
    DNSCrypt-proxy supporting DNSCrypt relays and local DNS-over-HTTPS encryption
    Security Hardening Standard Compliance
    Container image hardened according to CIS Benchmark Level 1 profile with consensus-based security configuration guidance
    Regulatory Compliance Support
    Alignment with PCI DSS, FedRAMP, DoD Cloud Computing SRG, FISMA, and select NIST publications requirements
    Pre-configured Security Controls
    Hardened account and local policies, firewall configuration, and computer-based and user-based administrative templates pre-applied
    Conformance Assessment and Reporting
    Includes CIS-CAT Pro assessment reports, package inventory files, and exception documentation for benchmark compliance verification
    Regular Security Maintenance
    Monthly patching aligned with software vendor updates to maintain alignment with latest security standards
    Security Technical Implementation Guides Compliance
    Configuration adheres to STIG guidelines, which are vendor-neutral standards developed through consensus-based approach and recognized across government, business, industry, and academia.
    Attack Surface Minimization
    Pre-configured safeguards and security controls are implemented by default to reduce attack surfaces and enhance overall security posture.
    Multi-Framework Compliance Foundation
    STIG-based configuration serves as a foundation for compliance with multiple cybersecurity frameworks and industry-specific security requirements.
    Ubuntu 22.04 Base Operating System
    Built on Ubuntu 22.04 Linux distribution as the underlying operating system.
    Pre-configured Security Controls
    System comes meticulously preconfigured with security controls and hardened configurations to eliminate manual security setup requirements.

    Contract

     Info
    Standard contract

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.