Overview
This is a repackaged software product wherein additional charges apply for hardening, security configuration, and support.
WHAT IS NEXTCLOUD
Nextcloud is the leading open-source self-hosted collaboration platform. It provides file sync and sharing, calendar, contacts, video calls, document editing (Collabora/OnlyOffice), and 100+ apps through the Nextcloud App Store.
Nextcloud is a full Google Workspace or Microsoft 365 replacement for organizations that require data sovereignty or GDPR compliance.
WHY SELF-HOST YOUR FILE COLLABORATION PLATFORM
Google Drive, Dropbox, and Microsoft 365 process your files on third-party infrastructure in jurisdictions you may not control. For GDPR-regulated organizations, healthcare, legal, or any team with strict data residency requirements, self-hosted Nextcloud is the only fully compliant option.
All file data stays on your EBS volume. No third-party processors. You control backups, retention, and access policies.
ENHANCED SECURITY OUT OF THE BOX
A production Nextcloud deployment requires correct database configuration, Redis caching, PHP-FPM tuning, and Nginx hardening. This Lynxroute AMI pre-configures all of these for you at first boot.
WHAT THIS AMI ADDS
Security hardening:
- Admin credentials generated at first boot - unique per instance
- Certbot pre-installed - HTTPS with Let's Encrypt in one command
- MariaDB database accessible from localhost only
- Redis unix socket - session cache and file locking
- UFW firewall - ports 22, 80, 443 only
- fail2ban - SSH brute-force protection
- AppArmor - mandatory access control
OS hardening (CIS Level 1):
- CIS Ubuntu 24.04 LTS Level 1 benchmark applied via ansible-lockdown
- auditd - system call auditing
- SSH hardening - PasswordAuthentication disabled, key-only access
- Kernel hardening - SYN cookies, ASLR, rp_filter, TCP BBR
- IMDSv2 enforced - SSRF protection
Compliance artifacts (inside the AMI):
- SBOM - CycloneDX 1.6 software bill of materials at /etc/lynxroute/sbom.json
- CIS Conformance Report - OpenSCAP HTML report at /etc/lynxroute/cis-report.html
- Tailored CIS profile at /usr/share/doc/lynxroute/CIS_TAILORED_PROFILE.md
Quick Start:
- Launch instance (t3.medium required)
- Open Security Group - allow TCP 80 and TCP 443 from your IP
- Point your domain A record to the instance public IP
- SSH: ssh -i key.pem ubuntu@<PUBLIC_IP>
- Wait 60-90 seconds for first-boot setup to complete (credentials are generated at boot)
- Read credentials: sudo cat /root/nextcloud-credentials.txt
- Enable HTTPS: sudo certbot --nginx -d YOUR_DOMAIN
- Open your domain in the browser and log in
Highlights
- GDPR-compliant file collaboration: all data stays on your infrastructure, no third-party processors - files, calendar, contacts, and collaboration tools fully self-hosted.
- CIS Level 1 hardened Ubuntu 24.04 LTS: auditd, fail2ban, AppArmor, SSH key-only, IMDSv2 enforced, SBOM and CIS Conformance Report included for compliance teams.
- Production-ready stack: Nginx + MariaDB + PHP 8.3 + Redis pre-configured, Certbot pre-installed for Let's Encrypt HTTPS - complete Google Drive alternative in minutes.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
|---|---|
t3.medium Recommended | $0.02 |
t3.large | $0.03 |
m6i.xlarge | $0.05 |
m6i.large | $0.03 |
m6i.2xlarge | $0.07 |
Vendor refund policy
We do not offer refunds for this product. AWS infrastructure charges (EC2, EBS, data transfer) are billed separately by AWS and are not refundable by us.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Version 33.0.2 - Initial release (April 2026)
- Nextcloud 33.0.2 on Ubuntu 24.04 LTS
- CIS Level 1 hardening applied (ansible-lockdown/UBUNTU24-CIS)
- Nginx + MariaDB + PHP 8.3 + Redis pre-configured
- Admin credentials generated at first boot - unique per instance
- Certbot pre-installed for Let's Encrypt HTTPS
- UFW firewall pre-configured (ports 22, 80, 443 only)
- fail2ban, auditd, AppArmor pre-configured
- SBOM (CycloneDX 1.6) at /etc/lynxroute/sbom.json
- CIS Conformance Report (OpenSCAP) at /etc/lynxroute/cis-report.html
- Tailored CIS profile at /usr/share/doc/lynxroute/CIS_TAILORED_PROFILE.md
- IMDSv2 enforced
Additional details
Usage instructions
- Launch instance (t3.medium required)
- Open Security Group - allow TCP 80 and TCP 443 from your IP
- Point your domain A record to the instance public IP
- SSH: ssh -i key.pem ubuntu@<PUBLIC_IP>
- Wait 60-90 seconds for first-boot setup to complete (database init, credentials generation)
- Read credentials: sudo cat /root/nextcloud-credentials.txt
- Get trusted HTTPS: sudo certbot --nginx -d your.domain.com
- Open https://your.domain.com and log in
Resources
Vendor resources
Support
Vendor support
Visit us online: https://lynxroute.com
For Nextcloud documentation: https://docs.nextcloud.com/server/latest/admin_manual/
For Nextcloud upstream issues (bugs, features, apps): https://github.com/nextcloud/server/issues
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.