Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

ACSC Essential Eight Compliant Oracle Linux 8 ARM

ACSC Essential Eight Compliant Oracle Linux 8 ARM

By: Foundation Security Latest Version: 1.0.0
Linux/Unix
Linux/Unix

Product Overview

The Australian Cyber Security Centre's (ACSC) Essential Eight is a set of strategies to mitigate cybersecurity incidents. These strategies are designed to help organizations protect their systems against a wide range of cyber threats. Compliance with the ACSC Essential Eight is crucial for organizations looking to strengthen their cybersecurity posture and safeguard sensitive information. The framework includes essential measures such as application whitelisting, patching applications, configuring Microsoft Office macro settings, user application hardening, restricting administrative privileges, patching operating systems, multi-factor authentication, and daily backups.

This Oracle Linux 8 virtual machine image is hardened with hundreds of security controls built-in to ensure the confidentiality, integrity, and availability of sensitive data. With this preconfigured Oracle Linux 8 image, companies can easily deploy an ACSC Essential Eight-compliant environment, reducing the time and resources required for security implementation. Foundation Security's image is regularly updated to keep up with the latest security threats and compliance regulations, providing customers with confidence that their data is well-protected. This offering is ideal for organizations that need a secure and compliant environment to protect their sensitive information and ensure compliance with the ACSC Essential Eight framework.

Foundation Security has a team of industry experts with deep knowledge of security and compliance regulations. This ensures that their virtual machine image is well-designed and implemented with the highest level of security standards. Additionally, their experienced team provides ongoing support to ensure their customers' security needs are met. As proud AWS Partners, Foundation Security's images are used by several Fortune 500 companies, demonstrating the reliability and trustworthiness of their solutions.

Version

1.0.0

Operating System

Linux/Unix, Other 8

Delivery Methods

  • Amazon Machine Image

Pricing Information

Usage Information

Support Information

Customer Reviews